CTOs on the Move

Astound

www.astound.ai

 
Astound`s mission is to make enterprise service excellent for all employees by automating the resolution of common issues using cognitive technologies like AI, natural language processing, and machine learning.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million
  • www.astound.ai
  • 111 Independence Drive
    Menlo Park, CA USA 94025
  • Phone: 650.242.0020

Executives

Name Title Contact Details

Funding

Astound raised $15.5M on 04/23/2019

Similar Companies

On-Site Solutions

On-Site Solutions is a Sterling, VA-based company in the Computers and Electronics sector.

Base One Technologies

Base One Technologies is a New Rochelle, NY-based company in the Computers and Electronics sector.

Vonage Business

We specialize in the unique communication needs for businesses, so we understand a robust, easily-customized & scalable phone system is more than a desire these days, it is a requirement for success. Unlike expensive traditional systems, our cloud-based hosted solutions tie together high-quality voice services and robust features at a very affordable price. Our solutions are designed to grow with you as your business evolves, adding just the services you need, when you need them. Please visit us on our website for more information about what VoIP and Hosted IP-PBX solutions are and how they can empower you and your business.

Aries Network Inc

Aries Network Inc is a Burbank, CA-based company in the Computers and Electronics sector.

CyberCatch

CyberCatch Holdings, is a cybersecurity company that provides a proprietary, artificial intelligence-enabled (AI) Software-as-a-Service (SaaS) solution that enables continuous compliance and cyber risk mitigation to organizations in critical segments, so they can be safe from cyber threats. The CyberCatch platform focuses on solving the root cause of why cyberattacks are successful: security holes from control deficiencies. It first helps implement all mandated and necessary controls, then the platform automatically and continuously tests the controls from three dimensions (outside-in, inside-out and social engineering) to find control failures so one can fix them promptly to stay compliant and safe from attackers.