| Name | Title | Contact Details |
|---|
Expedient is a cloud and data center infrastructure as a service (IaaS) provider with local operations in Pittsburgh, PA; Baltimore, MD; Boston, MA; Cleveland, OH; Columbus, OH; Indianapolis, IN; Memphis, TN and Phoenix, AZ. Ranked as one of the Top 3 managed services providers worldwide on Channel Futures MSP 501 list, Expedient`s converged solutions enable clients to focus on strategic business innovation, while the Expedient team handles operation of the information technology needed to support it. Expedient data centers are compliant with the Health Insurance Portability and Accountability Act (HIPAA) as well as the Payment Card Industry Data Security Standard (PCI DSS). Service Organization Control (SOC) reports are published annually for all locations.
CASK TECHNOLOGIES is a San Diego, CA-based company in the Computers and Electronics sector.
Ashling Partners is a professional services & technology firm that drives efficiency gains and process improvement through Robotic Process Automation (RPA) and targeted Artificial Intelligence (AI). We work with leading intelligent process automation technologies to drive continual process improvement and better employee engagement for our clients.
Exalt is a Alpharetta, GA-based company in the Computers and Electronics sector.
BlueVoyant combines outstanding talent from the private sector and from the cyber intelligence services of the U.S., Israel, and the U.K. to provide a critical additional layer of defense to companies managing their own cyber threat protection. We have unique capabilities to identify actionable threat intelligence from outside your perimeter, so that your company can protect itself from advanced cyber attacks. In addition, BlueVoyant provides complete Managed Cybersecurity Services to make managing your defenses more efficient. BlueVoyant`s experts have led some of the most high-profile investigations into attacks perpetrated by criminal and nation state adversaries. We have experience with corporate investigations involving ransomware, malware infections, insider threat, data theft, and business email compromise