| Name | Title | Contact Details |
|---|
Cyware`s innovative Cyber Fusion solutions enable security teams to proactively stop threats, connect the dots on security incidents, and dramatically reduce response time. By enabling threat intelligence automation and collaboration, combined with any-to-any orchestration and AI-driven case management, Cyware improves security outcomes for enterprises, government agencies, and MSSPs.
Rhino was founded to give renters everywhere greater financial freedom to plan and enjoy their lives. We eliminate the need for traditional security deposits by replacing them with smart, affordable insurance so renters can maintain control of their cash. Instead of a large upfront cash security deposit, renters pay Rhino a small monthly fee, and Rhino insures the property owner for damages that might occur and lost rent. To date, we are offered in over 1 million homes, and we have saved renters over $250 million in cash.
We offer an extremely diverse range of products that include adhesive papers and films for seals and labels, automobile-use products, window films, semiconductor-related tapes and equipment, LCD-related products, color papers for envelopes and release papers and films.
CU*Answers, Inc is a Grand Rapids, MI-based company in the Computers and Electronics sector.
HAWK Defense provides an innovative Big Data Security Analytics(BDSA) platformthat allows enterprisesto maketimely, well-informed security decisions from the ever-growing aggregations of logged data. Hawk’seyeConsoftware solution bridges the gap between legacy SIEM and Big Data Analytics with a massively scalable architecture that delivers high-speed data ingestion and a highly efficient patented analytics engine. HAWK Defense customers benefit from rapid installation and setup times, simple administration, out-of-the-box analytics, and dynamic threat intelligence feeds. TheeyeConsolution supports the securityanalyst a ‘single pane of glass’with insight to indicators of compromise that were previously undetectable, support to validate, prioritize, and respond to increasingly sophisticated cyber threats. eyeContechnology is also used to ensure compliance with a myriad of mandates such as PCI DSS, NERC CIP, GLBA, FISMA, HIPAA, SOX and GPG 13.