CTOs on the Move

ArcSight

www.arcsight.com

 
ArcSight, an HP company, is a leading global provider of security and compliance management solutions that intelligently identify and mitigate cyber threat and risk for businesses and government agencies.
  • Number of Employees: 250-1000
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details

Similar Companies

iDerive

iDerive is a company that provides advanced end-to-end holistic ecommerce marketplace analytics, IT services, and IT consulting.

UserZoom

In business since 2007, UserZoom offers an all-in-one, multi channel and agile approach to managing customer experiences by enabling Businesses to cost-effectively plan, research, design, and measure Customer Experience and User Experience, on a unified software platform. We offer an on-demand web-based solution, which empowers CX, UX and Marketing Professionals to cost-effectively manage and conduct sophisticated online research projects. We help them zoom in on the Customer Experience. UZ Mobile is the most powerful solution for Mobile Customer Experience Management. Listen to the voice of your mobile customers, conduct usability testing and UX research on both iOS and Android and on both phones and tablets. Half of Fortune`s Most Admired Enterprises are Using UserZoom`s Research Suite. They use us to conduct remote usability testing, test their prototypes, or measure customer satisfaction.

Carbon Black

Carbon Black is the leading provider of next-generation endpoint security. Carbon Black`s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 13 million endpoints under management, Carbon Black has more than 3,600 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.