| Name | Title | Contact Details |
|---|
Innovative Emergency Management is a Durham, NC-based company in the Computers and Electronics sector.
Merchandise Mgmt. Systems is a Indianapolis, IN-based company in the Computers and Electronics sector.
24By7Security, Inc. focuses on the privacy and security implications of the assets of an enterprise. We believe that Cyber Security needs to be priority ONE across all functions of the enterprise. A sound Cyber Security strategy defends against the next generation of security threats by addressing people, processes & technology, as well as third parties/ business partners. We provide Cyber Security-related services in the areas of Strategy, Internal Audit Support, Assessments, Remediation and Training. Our goal is to avoid unnecessary risk to businesses and prevent the next generation of threats that could undermine the stability of companies. We serve multiple industries such as Education, Hospitality, Financial, Insurance, Government, Law Firms, Healthcare, Retail and Entertainment. We specialize in reactive, proactive and counteractive services such as security risk assessments, data breach assessments, operationalizing policies and procedures, containment, eradication and remediation efforts, forensics, vulnerability assessments, testing, Security awareness training, part-time CISO and Privacy Officer services, post-incident activity, and more.
Atiss is a Davidsonville, MD-based company in the Computers and Electronics sector.
Founded in 2014, IronNet Cybersecurity is a global cybersecurity leader that is revolutionizing how enterprises, industries, and governments secure their networks. IronNet takes the skills of its top-notch cybersecurity operators with their real-world, public and private sector, offensive and defensive cyber experience, and integrates their deep tradecraft knowledge into its industry-leading products to solve the most challenging cyber problems facing industry today. IronNet`s solutions leverage behavioral analytics, machine learning, and artificial intelligence techniques to help public and private enterprises across critical infrastructure detect unknown threats. Our ability to share the derived raw intelligence with peer enterprises in real-time and at machine speed, uniquely enables industries and governments to collectively defend against well-funded nation state and cyber criminal threats.