| Name | Title | Contact Details |
|---|
Crexi is a marketplace and technology platform that consolidates commercial real estate solutions into a unified ecosystem - designed to streamline the CRE process from listing to closing.
Trowbridge & Trowbridge delivers transformational technology solutions that anticipate emerging requirements, increase operational efficiencies and improve mission performance. A fast-growing woman-owned and managed business, our solutions are instrumental in helping our defense, national security, intelligence and civilian agency customers increase the safety and security of the nation and improve services to citizens. Whether its driving change through next-generation modernization, deploying collaborative cloud environments, delivering trusted cybersecurity architectures, rapidly developing new and legacy applications, or successfully navigating data center consolidation—our full life cycle solutions deliver measurable results and successful outcomes. We offer our government clients the best of both worlds: a mature infrastructure that has proven itself handling large programs and an agile organization that supports rapid decision making. This unique combination of process and execution is vital to helping our clients meet dynamic challenges in todays rapidly changing world. At the center of everything we do is our corporate culture founded on integrity, empowerment and teamwork. We are committed to the success of our clients, employees, partners and the communities.
Optrics Engineering is a Edmonton, AB-based company in the Computers and Electronics sector.
Internet Presence Consulting Inc. is a Darien, IL-based company in the Computers and Electronics sector.
Cloudentity extends identity to your APIs and provides continual, contextual authorization at a transaction level, ensuring that APIs—both internal and external—are continuously monitored and access is assessed based on risk and threat intelligence. By leveraging our internal trust engine, and integrations with third-party solutions, we can ensure that each authorization request at an API transaction-level is valid and that suspicious activity is blocked or upgraded to require additional measures of approval Transactional MFA)