Name | Title | Contact Details |
---|
iWay Software, an Information Builders company, is a market leader in middleware that accelerates business integration. With facilities to integrate systems in real time, near-real time, or on a scheduled basis, iWay provides a complete reusable
For 15 years, we`ve worked with a simple philosophy: help the connected world move more smoothly, seamlessly and productively. And have a lot of fun doing it. We`re a privately held company, formed in 2001 and based in Seattle, WA, with offices around the world.
Automated Merchant Systems is a Altamonte Springs, FL-based company in the Software and Internet sector.
Medidata is leading the digital transformation of life sciences, with the world`s most used platform for clinical development, commercial, and real-world data. Powered by artificial intelligence and delivered by the #1 ranked industry experts, the Intelligent Platform for Life Sciences helps pharmaceutical, biotech, medical device companies, and academic researchers accelerate value, minimize risk and optimize outcomes. Medidata serves more than 1,000 customers and partners worldwide and empowers more than 100,000 certified users every day to create hope for millions of patients. The company was founded in 1999 and is based in New York City with additional offices in the United States, the United Kingdom, Japan, China, South Korea and Singapore.
Courion is the market leader in identity and access governance and administration (IGA), from provisioning to governance to identity analytics and intelligence (IAI). In 2015, Courion acquired Core Security to form the only company that can continuously and comprehensively monitor both infrastructure vulnerability and access risk. Core Security provides the industry`s first comprehensive attack intelligence platform offering advanced analytics to prioritize, validate and seek to eliminate security threats. Many of the world’s largest enterprises and organizations rely on Courion’s solutions to confidently provide an access governance process that ensures compliance to thousands of employees while protecting critical company data and assets from unauthorized access. Now with the addition of Core Security’s solutions, these same enterprises and security professionals can focus on the most likely threats to their business by modeling, simulating and testing the actions of an actual attacker.