CTOs on the Move

ConectUS Wireless

www.conectus.com

 
Partner with ConectUS Wireless, a Platinum Verizon Master Agent. Start selling Verizon Wireless products and services including 5G Business Internet, Smartphones, Tablets, IoT, Failover Routers, BlueJeans, and more.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million
  • www.conectus.com
  • 3225, Grande Vista Drive
    Thousand Oaks, CA USA 91320
  • Phone: 805.480.4888

Executives

Name Title Contact Details

Similar Companies

3D Datacomm

3D Datacomm is a Fredericton, NB-based company in the Computers and Electronics sector.

TruVista

Headquartered in Chester, SC, TruVista is a leading provider of communications services to Chester, Fairfield and Kershaw counties in South Carolina, and Franklin, Hart, Rabun and Stephens counties in Georgia. We offer a wide variety of products and services to residential and business customers including: voice, Internet, cable television, security, long distance, and wireless services. Since 1897, we have been the first and foremost to serve the unique needs of our customers. Our heritage is based on providing the highest quality products and superior service to our customers through knowledgeable and dedicated local professionals. At TruVista, we are committed to being involved locally and providing connections that build relationships throughout our markets. We believe our success is best measured by the progress of the communities we serve.

TransData International

Over the past 15 years TransData has built a reputation as a high quality, performance driven, and relationship focused BPO company. These factors distinguish us and keep on serving as the basis of our success by exceeding expectations of our clients and employees.

Sovran

Sovran is a Minnesota-based technology solutions provider that is equally committed to both customer care and technology. Since 1987, Sovran has been providing customized technology solutions and ongoing services that truly focus on the goals of our customers. In addition, Sovran is now home to Minnesota's premier IT Training Center, New Horizons Computer Learning Centers Twin Cities. Sovran partners with top firms in the tech industry, including Microsoft, HP, Cisco, VMware, Nimble and more to provide our customers with unparalleled support and integrated IT services.

Halock Security Labs

HALOCK is a U.S.-based information security consultancy that is privately owned and operated out of its headquarters in Schaumburg, IL since 1996. From mid-sized to the Fortune 100, HALOCK`s clients span many industries including financial services, healthcare, legal, education, energy, SaaS/cloud, enterprise retail, and more. HALOCK is your security partner, providing both strategic and technical security offerings by combining strong thought leadership, diagnostic capabilities, and deep technical expertise with a proven ability to get things done. HALOCK helps clients prioritize and optimize their security investments by applying just the right amount of security to protect critical business assets while satisfying compliance requirements and corporate goals. HALOCK Security Labs and CIS (Center for Internet Security) have co-developed the CIS Risk Assessment Method (RAM) to help organizations find their balance between security and business while evaluating and implementing the CIS Controls. CIS RAM helps organizations define their acceptable level of risk, and determine whether their use of the CIS Controls is risk-appropriate. This method is the first to be based on the Duty of Care Risk Analysis Standard (DoCRA) to help organizations evaluate cyber risk in a way that is clear to legal authorities, regulators, executives, lay people, and security practitioners. DoCRA establishes reasonable security. CIS RAM is an information security risk assessment method that helps organizations design and evaluate their implementation of the CIS Controls. CIS RAM provides instructions, examples, templates, and exercises for conducting risk assessments. And because CIS RAM is based on the DoCRA Standard, its risk assessments meet the requirements of established information security risk assessment standards and demonstrate whether safeguards are `reasonable` and `appropriate` as regulators and judges often require.