| Name | Title | Contact Details |
|---|
Simpplr is today`s modern intranet. Simpplr makes it possible for businesses to connect, align, and engage their entire workforce across the enterprise. Trusted by leading brands, including Workday, AAA, UKG, DocuSign, Eurostar, and Coursera. Our customers are achieving measurable productivity gains, increased employee engagement, and higher employee retention. Simpplr is headquartered in Redwood City, CA with offices in the UK and India, and is backed by Norwest Venture Partners and Salesforce Ventures. We are growing and looking for talented individuals who seek a smart and passionate team with one common goal...help employees be more successful at work.
Panorama Software Ltd. is a Toronto, ON-based company in the Software and Internet sector.
CloudSphere provides governance across migration planning, security posture, identity, compliance and cost management in the cloud. We are the only cloud management platform that collects the key data points that together define applications in cloud environments and correlates them to enable governance at the application level.
Vistaar Technologies is a Parsippany, NJ-based company in the Software and Internet sector.
Courion is the market leader in identity and access governance and administration (IGA), from provisioning to governance to identity analytics and intelligence (IAI). In 2015, Courion acquired Core Security to form the only company that can continuously and comprehensively monitor both infrastructure vulnerability and access risk. Core Security provides the industry`s first comprehensive attack intelligence platform offering advanced analytics to prioritize, validate and seek to eliminate security threats. Many of the world’s largest enterprises and organizations rely on Courion’s solutions to confidently provide an access governance process that ensures compliance to thousands of employees while protecting critical company data and assets from unauthorized access. Now with the addition of Core Security’s solutions, these same enterprises and security professionals can focus on the most likely threats to their business by modeling, simulating and testing the actions of an actual attacker.