| Name | Title | Contact Details |
|---|---|---|
Sudhir Kalra |
Chief Data Center Operations Officer | Profile |
Adil Attlassy |
Chief Technology Officer | Profile |
At KeyLogic, we`re known for our extraordinary commitment to the success of the organizations we serve. By bringing to our clients` missions the same passion we bring to our own, we are proud to say, KeyLogic has never had a one-time federal customer; every customer has provided repeat business. This has led us to achieve significant growth every year since our founding in 1999.
Mobile Communications America is a full service communications provider for Georgia and South Carolina.
MobiChord is the Telecom Service Management company and we are changing the way telecom is managed. We do so by placing a service-oriented lens on the activities, tasks and processes involved in managing telecom.
Pivot Point Security has been architected to provide maximum levels of independent and objective information security expertise to our varied client base. Our policy of not selling product and our absolute focus on four core practice areas; Security Assessments, Ethical Hacking, Compliance Assessments, and ISMS Consulting ensures that we have the highest possible levels of competence and independence. Coupling this with our mutual benefit-centric approach has allowed us to earn the trust of our clients, many of whom we have enjoyed working with since our founding. We count amongst our satisfied client base, small family run organizations and some of the worlds largest multi-nationals. Our clients span a diverse cross-section of market sectors including Non-Profits, Pharmaceuticals, Financials, Telecommunications, and Government. Pivot Point Security has the right combination of Information Security / Compliance domain expertise, technology industry knowledge & experience, and organizational character to simplify the process of defining and executing on the best course of action so you can know you are secure and prove you are compliant.
HALOCK is a U.S.-based information security consultancy that is privately owned and operated out of its headquarters in Schaumburg, IL since 1996. From mid-sized to the Fortune 100, HALOCK`s clients span many industries including financial services, healthcare, legal, education, energy, SaaS/cloud, enterprise retail, and more. HALOCK is your security partner, providing both strategic and technical security offerings by combining strong thought leadership, diagnostic capabilities, and deep technical expertise with a proven ability to get things done. HALOCK helps clients prioritize and optimize their security investments by applying just the right amount of security to protect critical business assets while satisfying compliance requirements and corporate goals. HALOCK Security Labs and CIS (Center for Internet Security) have co-developed the CIS Risk Assessment Method (RAM) to help organizations find their balance between security and business while evaluating and implementing the CIS Controls. CIS RAM helps organizations define their acceptable level of risk, and determine whether their use of the CIS Controls is risk-appropriate. This method is the first to be based on the Duty of Care Risk Analysis Standard (DoCRA) to help organizations evaluate cyber risk in a way that is clear to legal authorities, regulators, executives, lay people, and security practitioners. DoCRA establishes reasonable security. CIS RAM is an information security risk assessment method that helps organizations design and evaluate their implementation of the CIS Controls. CIS RAM provides instructions, examples, templates, and exercises for conducting risk assessments. And because CIS RAM is based on the DoCRA Standard, its risk assessments meet the requirements of established information security risk assessment standards and demonstrate whether safeguards are `reasonable` and `appropriate` as regulators and judges often require.