CLOs on the Move

NextOp Software

www.nextopsoftware.com

 
NextOp Software is a Santa Clara, CA-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details

Similar Companies

CyberX

CyberX is a member of the IBM Security App Exchange Community and has partnered with premier solution providers worldwide including Deutsche-Telekom/T-Systems.

Procysive

Procysive is a Durham, NC-based company in the Computers and Electronics sector.

Crescendo Interactive Inc

Crescendo Interactive Inc is a Camarillo, CA-based company in the Computers and Electronics sector.

Cyveillance

Cyveillance, a world leader in cyber intelligence, provides an intelligence-led approach to security. Through continuous, comprehensive Internet monitoring and sophisticated intelligence analysis, Cyveillance proactively identifies and eliminates threats to information, infrastructure, individuals and their interactions, enabling its customers to preserve their reputation, revenues, and customer trust.   Cyveillance serves the Global 2000 and OEM Data Partners — protecting the majority of the Fortune 50, regional financial institutions nationwide, and more than 100 million global consumers through its partnerships with security and service providers that include Blue Coat, AOL and Microsoft.   Cyveillance is a wholly-owned subsidiary of QinetiQ, a FTSE250 company which uses its domain knowledge to provide technical support and know-how to customers in the global aerospace, defence and security markets.

Digital Shadows

Digital Shadows monitors and manages an organization`s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web to protect their brand, and reputation. The Digital Shadows SearchLightâ„¢ service combines scalable data analytics with human data analysts to manage and mitigate risks of an organization`s brand exposure, VIP exposure, cyber threat, data exposure, infrastructure exposure, physical threat, and third party risk, and create an up-to-the minute view of an organization`s digital risk with tailored threat intelligence.