| Name | Title | Contact Details |
|---|
Sandvine Corporation (Sandvine) develops and markets network management equipment and solutions for broadband and wireless providers.
Dolly is the leading on-demand, final-mile delivery provider for big and bulky goods trusted by retailers like The Container Store, Lowe’s, Costco, Crate & Barrel, Big Lots!, and many more. We’ve built a national point-to-point delivery network with 10,000+ drivers (Helpers) with pickup trucks, cargo vans, and box trucks that are ready to provide on-demand delivery. Our Helpers can deliver in as little as 90 minutes after purchase or scheduled into the future in a 30 minute window of choice between the hours of 8AM and 9PM. In addition to delivery, they also provide assembly, light installation and haul-away services. Our aim is, and has always been, to provide a delivery experience that will blow your customers away.
bostnic software is a Artesia, CA-based company in the Computers and Electronics sector.
SECNAP Network Security develops information security solutions that enable the secure and private conduct of e-commerce on the Internet.
At Redpoint Cybersecurity, we are constantly interfacing with our affiliates and our customers, who range from individuals across over a dozen industries (including Architecture, Construction, Engineering, Financial Services, Legal, Manufacturing, Private Client Services, and Real Estate) to privately-held companies and government agencies at the state and local levels, in order to better understand their operational and technical risks and to help them optimize their security protocols and practices. Redpoint applies well-established information security methodologies and frameworks, including the CIS Top 20 Critical Controls and the NIST Cybersecurity Framework. 100% of our penetration testers (ethical hackers) are OSCP-certified and possess deep, domain-specific expertise, including network security testing, wireless security testing, web application testing, and mobile device security assessments. In addition to understanding technical hacking techniques, which enables us to approach your company`s environment as an attacker would, we have in-depth experience with the major security frameworks and the development of cyber regulations.