| Name | Title | Contact Details |
|---|
Roadmunk was inspired by a problem our founders experienced personally: there was no simple way for product managers to build, share and align on the roadmap. As we got to know our users, we discovered that roadmapping is not one-size-fits-all. Companies make roadmaps of all shapes, sizes and types—it`s a powerful and essential tool for alignment. Our goal is to make strategic roadmapping quick, effective and collaborative across an entire organization.
JASK, the company that empowers security analysts with AI, uses advanced algorithms to deliver end-to-end network monitoring -- surfacing and triaging the most relevant attacks while providing a clear picture of the attack surface. Deployed in hours and continuously updated through the cloud, JASK injects an agile sensing and investigation layer into existing technologies that empowers security analysts to make informed decisions faster and with more precision. By accelerating discovery, analysis, and triage, JASK allows security operations teams to work with more leverage and focus on increasingly smarter, ever-evolving threats. JASK is backed by Dell Technologies Capital, TenEleven Ventures, and Battery Ventures and is headquartered in San Francisco, California.
Adirondack Data Systems is a Albany, NY-based company in the Computers and Electronics sector.
Visual Soft is a Vienna, VA-based company in the Computers and Electronics sector.
Even by conservative estimates, over 20 billion connected devices are expected to be in use by the year 2020. Unfortunately, such promise of innovation and growth has been accompanied by concerns of visibility, vulnerability, and service disruptions – the same concerns that traditional IT security solutions cannot address. That is why ZingBox was founded. At ZingBox, we recognize that to realize the full benefit of IoT devices requires a revolutionary approach to security. Rather than being handcuffed by traditional IT security philosophy, we designed an IoT security solution from the ground up specifically to secure IoT environments. Our solution is non-intrusive, clientless, cloud-based, and out-of-band. These features are not simply the benefits of our solution – they are the underlying principle.