| Name | Title | Contact Details |
|---|
Cycle30 is a Seattle, WA-based company in the Computers and Electronics sector.
KOLODZY CONSULTING is a Centreville, VA-based company in the Computers and Electronics sector.
Founded in 2014, HONK was built to transform the towing and roadside experience for motorists, service providers, insurance companies, and others making roadside assistance a major part of their customer retention strategy. Over the last several years, HONK has continued to invest in our core digital platform to deliver record retention rates to our roadside partners while also working with leading-edge companies to expand across various industries, including vehicle transports and marketplace logistics. Since our founding, HONK has partnered with thousands of towing and roadside service providers in turn helping millions of stranded motorists get back on the road safely.
Observe was founded by Sutter Hill Ventures in November 2017. Our founding team came from leading Enterprise SaaS and software companies that work with vast quantities of data such as Snowflake, Splunk and Wavefront.
24By7Security, Inc. focuses on the privacy and security implications of the assets of an enterprise. We believe that Cyber Security needs to be priority ONE across all functions of the enterprise. A sound Cyber Security strategy defends against the next generation of security threats by addressing people, processes & technology, as well as third parties/ business partners. We provide Cyber Security-related services in the areas of Strategy, Internal Audit Support, Assessments, Remediation and Training. Our goal is to avoid unnecessary risk to businesses and prevent the next generation of threats that could undermine the stability of companies. We serve multiple industries such as Education, Hospitality, Financial, Insurance, Government, Law Firms, Healthcare, Retail and Entertainment. We specialize in reactive, proactive and counteractive services such as security risk assessments, data breach assessments, operationalizing policies and procedures, containment, eradication and remediation efforts, forensics, vulnerability assessments, testing, Security awareness training, part-time CISO and Privacy Officer services, post-incident activity, and more.