Name | Title | Contact Details |
---|---|---|
Devin Ertel |
Chief Information Security Officer | Profile |
Nikhil Sathe |
Chief Technology Officer | Profile |
Ray Everett |
Chief Privacy Officer | Profile |
Selim Aissi |
Chief Information Security Officer | Profile |
Sachin Dhawan |
Chief Technology Officer | Profile |
Aether Wire and Location is a Nicasio, CA-based company in the Computers and Electronics sector.
Unified Office, Inc. is a leading provider of SDN-based hybrid cloud managed Voice-over-IP (VoIP) and Unified Communications services to small and medium-sized businesses (SMBs). Unified Office`s Total Connect Now(SM) service architecture was purpose-built from the ground up to deliver the highest quality of experience and availability, leveraging the latest in extensible business VoIP communications technology and cloud-based infrastructure to enhance SMB workforce productivity. Their cloud-based intelligent network incorporates Unified Office`s unique adaptive Highest Quality Routing™ (HQR) for end-to-end service quality, and Business Continuity “shadowing” to ensure high availability operation over one or more redundant broadband links.
We are the world`s first U.S. Government certified secure interactive infrastructure monitoring solution to protect the most critical infrastructures and assets around the globe. CyberSecure IPS was initially started to meet the need for Layer 1 security for secure and classified networks. Our fiber-optics based software and solutions quickly became the gold standard for meeting the strictest DoD compliance standards. Now our patented solutions are servicing both the Government and Commercial sectors as we find new ways to apply our technology.
24 Hour Tek is a San Francisco, CA-based company in the Computers and Electronics sector.
BLACKOPS Cyber -BOC, is the world`s largest private sector CyberHUMINT™ Counter-Terrorism Team.Our intelligence portfolios are leveraged by CT agencies worldwide. BOC, is an internationally-based counter-terrorism group that specializes in intel collection, threat analysis and digital weapons. Its cyber operations consist of collecting actionable threat intelligence, advanced analytics, cyber warfare using offensive capabilities, surveillance and providing situational awareness.