CTOs on the Move

Bongo WIreless Inc

www.bongowireless.com

 
Bongo WIreless Inc is a Markham, ON-based company in the Computers and Electronics sector.
  • Number of Employees: 0-25
  • Annual Revenue: $1-10 Million
  • www.bongowireless.com
  • E Unit 2 Markham Ontario L 3150 Highway 7 5A1 Canada
    Markham, ON CAN L3R 5A1
  • Phone: 905.477.0000

Executives

Name Title Contact Details

Similar Companies

IdenTrust, Inc.

IdenTrust, Inc. is one of the leading companies in the Computers and Electronics sector.

Security Validation

Security Validation is a leading managed security provider servicing more than 1,500 across the globe. At Security Validation we are "Your Trusted Advisor."

Procysive

Procysive is a Durham, NC-based company in the Computers and Electronics sector.

Zocalo Engineering

Zocalo Engineering, Ltd. is a Grand Rapids, MI-based company in the Computers and Electronics sector.

SignalSense

SignalSense exists to increase the fidelity of security alerts and expand on what can be detected in enterprise networks. The challenges facing those responsible for securing networks have increased exponentially in the last few years -- both from the sophistication of the threats seen, the explosion of agile development and the distribution of applications across varied environments. This is further compounded by the move to public cloud environments, where traditional inspection methods don’t exist. The challenges of delivering high fidelity security visibility into these environments will require new types of security tools that are just now being developed. Machine learning and neural networks, combined with new scalable methods of data collection and processing will provide the opportunity to keep up with the pace of growth in these new agile environments. The foundation of the SignalSense approach is an investment in data science that leverages a variety of machine learning methods, including deep learning, and GPU capacity to classify, characterize and profile network traffic. This enhances detection of threat and compromise, saving valuable investigation time for network security operators.