| Name | Title | Contact Details |
|---|
En Pointe Technologies is a Gardena, CA-based company in the Computers and Electronics sector.
HOSTING delivers secure, compliant managed cloud services and open technologies that empower organizations to transform their businesses and lead their industries. We provide customers with unmatched security, support and compliance expertise across a broad portfolio of solutions including public cloud, private cloud, hybrid IT and dedicated environments. Our mission is simple – to provide the best customer experience for companies running mission-critical applications in the cloud, supported by the industry’s best team. HOSTING set the bar in introducing a complete unified cloud solution on the AWS and Microsoft Azure cloud platforms. The HOSTING Unified Cloud™ provides customers with unprecedented flexibility to develop, run and manage custom applications in the cloud without the burden of vendor lock-in. Based on our experience serving 200 healthcare customers, HOSTING led the way in developing the HOSTING Healthcare Cloud™ - a secure, fully managed cloud solution that meets and exceeds compliance requirements for HIPAA, PCI, SOC 2 and SOC 3. HOSTING is headquartered in Denver, Colorado, with offices and data centers throughout the United States. Our superior infrastructure, innovative solutions, certified information security and compliance teams, and industry-leading customer satisfaction scores have been consistently recognized by Gartner Inc. in its Cloud-Enabled Managed Hosting Magic Quadrant. HOSTING is also ranked #14 in the MSPmentor Top 501 Global Edition of managed service providers.
glaser technology, Inc. is a Chicago, IL-based company in the Computers and Electronics sector.
Vangent is one of the leading companies in the Computers and Electronics sector.
Cyera is the next generation data security platform that empowers security teams to manage and protect all of their company`s sensitive data. The platform provides visibility and insight into your data, identities, and access, and delivers actionable guidance to remediate threats stemming from exposure, vulnerabilities, and misconfigurations. The most common use cases include incident response - detecting data exposures and suspicious data access - and attack surface minimization - enforcing least privileged access and removing unnecessary data.