| Name | Title | Contact Details |
|---|
Telvisio is a San Mateo, CA-based company in the Software and Internet sector.
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black`s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 13 million endpoints under management, Carbon Black has more than 3,600 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.
When I Work is a market leader in hourly workforce management that provides businesses a fully integrated scheduling, time tracking and team messaging solution. Trusted by over 150,000 workplaces worldwide, When I Work ensures reliable shift coverage, engaged employees, and faster decisions — giving everybody what they need to be successful at work. Managing, scheduling, and coordinating hourly teams is time-consuming, complicated, and expensive. Back office spreadsheets and disjointed systems have plagued hourly workplaces for decades — resulting in high labor costs, painful inefficiency and employee turnover. When I Work changes everything with integrated scheduling, time tracking, and team messaging. It`s a complete employee management solution that ensures reliable shift coverage, engaged employees, and faster decisions.
ACTEK is a Birmingham, AL-based company in the Software and Internet sector.
Private Access, Inc.'s transformative technology platform helps to create an environment of trust by addressing key privacy issues that have impeded the release of data that is otherwise inaccessible, and empowering consumers to establish dynamic privacy directives and consents for both data holders and data seekers