Name | Title | Contact Details |
---|
Kuka Real Time Products is a Tustin, CA-based company in the Computers and Electronics sector.
Observable Networks is an emerging leader of network security technology solutions that identify compromised and misused networked endpoints currently escaping detection by traditional network security tools. Observable`s endpoint modeling technology includes a cloud-based service platform that uses automated security analytics and real-time traffic sensors to continuously model all endpoints on networks of any size. Observable`s security solutions empower organizations to understand normal and abnormal endpoint behaviors in their networks, so they can identify potential threats and facilitate faster remediation.
Synergy Technical is an industry-leading Microsoft partner, delivering comprehensive cloud solutions that meet the needs of today's highly connected and interactive organizations. As a Microsoft Cloud Accelerate Partner and a member of the invitation-only Azure Circle program, Synergy Technical's portfolio includes Office 365 (Exchange Online, SharePoint Online, and Lync Online), System Center 2012, Azure Infrastructure as a Service and Platform as a Service, as well as systems integration, custom web application development and maintenance.
Neural Media Inc is a Brooklyn, NY-based company in the Computers and Electronics sector.
Advanced Cyber Security is a pioneer in endpoint security, with patented, proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement. Its products provide a first line of defense to a companys layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Securitys Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments. Advanced Cyber Securitys EndpointLock product, which will be integrated into McAfee ePolicy Orchestrator, provides important desktop protection features. The keystroke encryption feature encrypts every keystroke at the point of origin to mitigate the risk of undetected keylogging malware from stealing corporate credentials and sensitive data. An anti-screen scraping technology prevents software from taking screen shots of a users desktop, and the kernel compromise feature monitors the operating system kernel to prevent compromises.