| Name | Title | Contact Details |
|---|---|---|
Justin Weeks |
Vice President of Cybersecurity | Profile |
global protection. dedicated care. 24/7 telemedicine. logistics. medical advisory solutions. Travel MedAssist Program Global MedAssist Program The Vigilint Advantage: Patient to Doctor in 30 seconds 30 Seconds IN THE NEWS May...
Perry Systems is a Englewd Clfs, NJ-based company in the Computers and Electronics sector.
Using artificial intelligence for augmenting regulatory research and ESG issues management. RegASK™`s digital platform routinely monitors, anticipates and reports updates or changes to relevant regulations with instant alerts. Our platform also allows us to zero-in on applicable regulations to identify and analyze any gaps in the compliance of a product. RegASK™ was created by the founders of SPRIM, after more than 17 years of consulting on globalization projects and researching regulatory guidelines for healthcare companies across six of the seven continents. RegASK™ is backed by a team of regulatory experts with a global perspective and years of navigating some of the most complicated regulatory hurdles in markets big and small.
Peak-Ryzex enterprise mobility solutions empower organizations to realize immediate and sustainable value from their mobile technology and printing investments, while increasing staff productivity and enhancing the customer experience. In manufacturing, retail, warehousing, distribution, logistics, transportation and field-based operations, Peak-Ryzex provides end-to-end enterprise mobility, managed services, printing, software and mobile data capture solutions for performance-driven organizations.
TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.