CLOs on the Move

The Wilkins Company

www.thewilkins.company

 
We are an electronic security integrator specializing in the design, installation, monitoring, and maintenance of systems for applications that focus on one or more of the following areas: fire and intrusion detection, access control, video surveillance, environmental monitoring, doors, door hardware, including automatic openers and push buttons, as well as nurse call, paging/intercom/telephone and sound systems. We take great pride in our work and constantly strive to ensure that our products, workmanship, and services exceed the expectations of our customers.
  • Number of Employees: 0-25
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

CRST Malone

CRST Malone is a Birmingham, AL-based company in the Business Services sector.

Pakistan Nursing Council

Pakistan Nursing Council, as significant participant in the health care delivery system in the country is dedicated to provide support for the professional development and competencies of those who study Nursing, Lady Health Visitors and Midwifery. The aims of PNC also include monitoring for implementation of national standards in Nursing, Health Visitors and Midwifery education and practice by providing Registration /infrastructure and arranging continued educational opportunities for registered member.

NEXT MOVE GEAR

NEXT MOVE GEAR LLC is a Evanston, IL-based company in the Business Services sector.

Davidson Benefits

Davidson Benefits is a Tualatin, OR-based company in the Business Services sector.

Decision Zone

Organizations are currently reliant on the old security paradigm of ‘Output Level’ information by collecting, aggregating and analyzing historical event log information from data bases in response to ‘alerts’ after a breach has occurred. At Decision Zone, we made a fundamental decision to move towards the new security paradigm at the ‘Input Level’ and we created “dzAudit”. This patented security software examines business process events ‘live’ at Layer 7 of the OSI Model before the breach occurs. The software focuses on the identification of anomalies in real time and in context no matter how much data is in motion. It introduces the concept of process as a perimeter and the ability to leverage an organization’s own processes (as represented by process maps) using graph technology to encapsulate all the information necessary to make a process execute as intended. Simply put, what a process-centric approach means for an anomalous transaction is that ”if it’s not on the map, it’s not in the system.” Any such anomaly can be managed and responded to appropriately. The implications for cyber security are significant, particularly for connected smart technologies, critical infrastructure, government, military, law enforcement, health care, financial institutions, BYOD devices, and cloud services.