Name | Title | Contact Details |
---|
Xenosoft Technologies is a Dallas, TX-based company in the Computers and Electronics sector.
HOSTING delivers secure, compliant managed cloud services and open technologies that empower organizations to transform their businesses and lead their industries. We provide customers with unmatched security, support and compliance expertise across a broad portfolio of solutions including public cloud, private cloud, hybrid IT and dedicated environments. Our mission is simple – to provide the best customer experience for companies running mission-critical applications in the cloud, supported by the industry’s best team. HOSTING set the bar in introducing a complete unified cloud solution on the AWS and Microsoft Azure cloud platforms. The HOSTING Unified Cloud™ provides customers with unprecedented flexibility to develop, run and manage custom applications in the cloud without the burden of vendor lock-in. Based on our experience serving 200 healthcare customers, HOSTING led the way in developing the HOSTING Healthcare Cloud™ - a secure, fully managed cloud solution that meets and exceeds compliance requirements for HIPAA, PCI, SOC 2 and SOC 3. HOSTING is headquartered in Denver, Colorado, with offices and data centers throughout the United States. Our superior infrastructure, innovative solutions, certified information security and compliance teams, and industry-leading customer satisfaction scores have been consistently recognized by Gartner Inc. in its Cloud-Enabled Managed Hosting Magic Quadrant. HOSTING is also ranked #14 in the MSPmentor Top 501 Global Edition of managed service providers.
Coins International is a Washington, DC-based company in the Computers and Electronics sector.
Techlogix is a Woburn, MA-based company in the Computers and Electronics sector.
Cloudentity extends identity to your APIs and provides continual, contextual authorization at a transaction level, ensuring that APIs—both internal and external—are continuously monitored and access is assessed based on risk and threat intelligence. By leveraging our internal trust engine, and integrations with third-party solutions, we can ensure that each authorization request at an API transaction-level is valid and that suspicious activity is blocked or upgraded to require additional measures of approval Transactional MFA)