CTOs on the Move

Culmen International

www.culmen.com

 
Culmen International is a Alexandria, VA-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $10-50 Million
  • www.culmen.com
  • 99 Canal Center Plz Ste 410
    Alexandria, VA USA 22314
  • Phone: 703.224.7000

Executives

Name Title Contact Details
James Chapman
Director of Information Technology Profile

Similar Companies

CMO Compliance

CMO Compliance is a Roswell, GA-based company in the Computers and Electronics sector.

Onion

Onion Corporation has developed the Omega2, a tiny Linux computer module with built-in Wifi. It is easy to use, expandable, and affordable. Developers, makers, and educators have embraced the Omega2, creating a variety of internet connected IoT projects utilizing Onion`s docks, expansion boards, and development in the browser Console tools and utilities.

CoNetrix

CoNetrix is a well-established and successful family of technology companies that began in 1977. The spirit of our culture is fostered by a service driven, strategically agile, customer-focused team of remarkable people. These individuals are characterized by high personal values, self-initiative, extraordinary resourcefulness and a love of all things with screens, ports, cables and code. The people in our companies are busy developing software, designing, supporting and hosting networks, and providing cybersecurity services. CoNetrix has partnered with industry leading companies such as Hewlett Packard, Microsoft, Cisco, VMware and Citrix to provide the highest level of reliability, functionality, and security for every customer.

Ettain Group

Ettain Group is a Charlotte, NC-based company in the Computers and Electronics sector.

Huntress

Huntress is a leading provider of advanced threat detection and actionable cybersecurity information that delivers easy to follow remediation steps into your existing ticketing system. IT Departments & MSPs worldwide use Huntress to enable their junior IT staff to confidently address cybersecurity incidents that slip past their preventive security stack. As a result, we discover breaches before they cause downtime, costly cleanup, and damaged reputations.