| Name | Title | Contact Details |
|---|
Sphera is the largest, global provider of software and information services in the operational risk, environmental performance and product stewardship markets. For more than 30 years, we have helped 2,500+ customers and 100,000+ users in 70 countries optimize workflows and navigate the complex and dynamic global regulatory structure.
Synechron, one of the fastest-growing digital, business consulting & technology services providers, is a $350 million firm based in New York. Since inception in 2001, Synechron has been on a steep growth trajectory. With 5,000+ professionals operating in 16 countries across the world, it has presence across USA, Canada, UK, France, The Netherlands, Switzerland, Luxembourg, Serbia, Germany, Italy, UAE, Singapore, Hong Kong, Japan, Australia and Development Centers in India.
AIT Resource Group is a Hoffman Estates, IL-based company in the Computers and Electronics sector.
Total ProSource is a Cincinnati, OH-based company in the Computers and Electronics sector.
Advanced Cyber Security is a pioneer in endpoint security, with patented, proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement. Its products provide a first line of defense to a companys layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Securitys Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments. Advanced Cyber Securitys EndpointLock product, which will be integrated into McAfee ePolicy Orchestrator, provides important desktop protection features. The keystroke encryption feature encrypts every keystroke at the point of origin to mitigate the risk of undetected keylogging malware from stealing corporate credentials and sensitive data. An anti-screen scraping technology prevents software from taking screen shots of a users desktop, and the kernel compromise feature monitors the operating system kernel to prevent compromises.