| Name | Title | Contact Details |
|---|
Mc Shane Group is a Richmond, VA-based company in the Business Services sector.
New Horizons Landscape is a Big Rapids, MI-based company in the Business Services sector.
PEC PROFESSIONAL SERVICES is a Manchester, TN-based company in the Business Services sector.
The Central Ohio Area Agency on Aging (COAAA) is a public agency dedicated to supporting older adults and individuals with disabilities in central Ohio. It focuses on helping these individuals live safely and independently at home by providing access to essential services and resources. COAAA serves approximately 15,000 people directly and funds services for an additional 25,000 across eight counties, including Franklin and Delaware. COAAA offers a variety of programs, including in-home services like meal delivery, personal care, and transportation. It also provides case management and care coordination for seniors. Key initiatives include MyCare Ohio for Medicare/Medicaid-eligible adults, caregiver support programs, wellness workshops, and long-term care consultations. The agency connects individuals to a wide range of resources, including utilities assistance and legal support, ensuring that older adults and their caregivers have the necessary tools for dignified living.
Organizations are currently reliant on the old security paradigm of ‘Output Level’ information by collecting, aggregating and analyzing historical event log information from data bases in response to ‘alerts’ after a breach has occurred. At Decision Zone, we made a fundamental decision to move towards the new security paradigm at the ‘Input Level’ and we created “dzAudit”. This patented security software examines business process events ‘live’ at Layer 7 of the OSI Model before the breach occurs. The software focuses on the identification of anomalies in real time and in context no matter how much data is in motion. It introduces the concept of process as a perimeter and the ability to leverage an organization’s own processes (as represented by process maps) using graph technology to encapsulate all the information necessary to make a process execute as intended. Simply put, what a process-centric approach means for an anomalous transaction is that ”if it’s not on the map, it’s not in the system.” Any such anomaly can be managed and responded to appropriately. The implications for cyber security are significant, particularly for connected smart technologies, critical infrastructure, government, military, law enforcement, health care, financial institutions, BYOD devices, and cloud services.