CTOs on the Move

Bizteon

www.bizteon.com

 
Bizteon is a Woodbridge, NJ-based company in the Software and Internet sector.
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million
  • www.bizteon.com
  • 300 Kimball St
    Woodbridge, NJ USA 07095
  • Phone: 832.220.3900

Executives

Name Title Contact Details

Similar Companies

Camunda

Open source platform for BPMN workflow and DMN decision automation. Download now.

Medhira Enterprises

Medhira Enterprises is a Long Island City, NY-based company in the Software and Internet sector.

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations. Axiad IDS was founded by industry experts with extensive backgrounds in developing, deploying, and managing identity and access management solutions. We have experienced first-hand the challenges associated with implementing and managing mission-critical identity systems, and are experts in overcoming those challenges, enabling their success. We are driven by our customers’ business needs, addressing business objectives with innovative and cost-effective solutions. Axiad IDS was founded in 2010 and is headquartered in Santa Clara, CA.

RevenueWell

Connect with patients, boost office productivity, and get more out of your day with RevenueWell’s dental practice marketing and patient communication solutions.

Carbon Black

Carbon Black is the leading provider of next-generation endpoint security. Carbon Black`s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 13 million endpoints under management, Carbon Black has more than 3,600 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.