CTOs on the Move

A2sr Technology

www.a2sr.com

 
A2sr Technology is a Sterling Heights, MI-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million
  • www.a2sr.com
  • 33567 Lamparter Dr
    Sterling Heights, MI USA 48310
  • Phone: 586.446.1551

Executives

Name Title Contact Details

Similar Companies

Hotwire Communications

Internet Service Provider Cable TV Provider VOIP Services

Netelligent Corporation

Netelligent Corporation is a Chesterfield, MO-based company in the Computers and Electronics sector.

Spacee

Spacee believes in a post-mobile world. Using light only, the Spacee technology transforms virtually any 2D or 3D surface, into an interactive touch screen. No phones, helmets, eyeglasses, or tablets required, and nothing is installed on the actual surface. Every Spacee solution is designed to be a powerful communal experience that also delivers a deep personal connection. This results in communal frictionless experiences for physical commerce and Deviceless Mixed Reality for the masses. Spacee is a computer vision company with several fortune 50 clients and growing.

Zentra Express

Zentra Express is a Whitby, ON-based company in the Computers and Electronics sector.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.