| Name | Title | Contact Details |
|---|
CDM Software is a Grand Junction, CO-based company in the Computers and Electronics sector.
Intive is a global digital powerhouse headquartered in Munich, Germany. With a challenging, exploratory and agile mindset and international teams of software, design and business experts, intive partners with market leaders in accelerating digital transformation for products and services of tomorrow. intive`s solutions driven by world-class innovation add value along the whole application lifecycle – from product conceptualization to its maintenance. The company`s operations include 14 development centers and 8 design studios in Germany, Poland, the UK, the USA and Argentina, as well as regional offices in France, Spain and Sweden. intive won the trust of the world`s largest companies such as Audi, BASF, BMW, Credit Suisse, Discovery, Disney, Esprit, Facebook, Google, ING, Viacom and Vorwerk.
VIVA USA is a Rolling Meadows, IL-based company in the Computers and Electronics sector.
PineApp is a New York, NY-based company in the Computers and Electronics sector.
24By7Security, Inc. focuses on the privacy and security implications of the assets of an enterprise. We believe that Cyber Security needs to be priority ONE across all functions of the enterprise. A sound Cyber Security strategy defends against the next generation of security threats by addressing people, processes & technology, as well as third parties/ business partners. We provide Cyber Security-related services in the areas of Strategy, Internal Audit Support, Assessments, Remediation and Training. Our goal is to avoid unnecessary risk to businesses and prevent the next generation of threats that could undermine the stability of companies. We serve multiple industries such as Education, Hospitality, Financial, Insurance, Government, Law Firms, Healthcare, Retail and Entertainment. We specialize in reactive, proactive and counteractive services such as security risk assessments, data breach assessments, operationalizing policies and procedures, containment, eradication and remediation efforts, forensics, vulnerability assessments, testing, Security awareness training, part-time CISO and Privacy Officer services, post-incident activity, and more.