CLOs on the Move

ReversingLabs

www.reversinglabs.com

 
ReversingLabs delivers the Software Supply Chain Security platform for dev and SOC teams, empowering modern software development and security operations center teams to protect their software releases and organizations from sophisticated software supply chain security attacks, malware, ransomware and other threats. The ReversingLabs Titanium Platform analyzes any file, binary or object including those that evade traditional security solutions. It`s a hybrid-cloud, privacy centric, platform that unifies Dev and SOC teams with transparent and human readable threat analysis, arming developers, DevSecOps, SOC analysts and threat hunters to confidently respond to software tampering and security incidents. ReversingLabs data is used by more ...
  • Number of Employees: 250-1000
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details

Similar Companies

servmatix

servmatix is a Draper, UT-based company in the Computers & Electronics sector.

Sendachi

Sendachi is a technology and services company specializing in DevOps, Continuous Delivery, and transformational programs.

AES-IntelliNet

AES-IntelliNet is a Peabody, MA-based company in the Computers and Electronics sector.

Booksy

Booksy is a robust mobile booking solution for small businesses specializing in the health and beauty industry.

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe–today, tomorrow and long into the future. Offering the first quantum key distribution network in the United States, Quantum Xchange enables organizations to send unhackable data over long distances using the laws of quantum physics. Leveraging the proven secure Quantum Key Distribution (QKD) method and its own proprietary Trusted Node technology, Quantum Xchange`s future-proof, data-transmission infrastructure addresses the shortcomings inherent with modern-day encryption. These include the ability for keys to be intercepted, corrupted or exposed during transmission, plus the imminent threat of quantum computers breaking current encryption keys.