Name | Title | Contact Details |
---|---|---|
Eddie Torres |
VP, North America Cybersource Ecommerce, Every Day Spend and Emerging Sales | Profile |
Foodsaleseast is a Fort Mill, SC-based company in the Software and Internet sector.
Magnet Forensics is a global leader in the development of digital investigation software that acquires, analyzes and shares evidence from computers, smartphones, tablets and IoT related devices. Magnet Forensics has been helping law enforcement fight crime, protect assets and guard national security since 2009. Magnet Forensics has become a trusted partner for thousands of the world`s top law enforcement, government, military and corporate organizations in over 92 countries. Court-admissible evidence recovered by Magnet Forensics tools has been used to support a wide-variety of investigations including cybercrimes, child exploitation, terrorism, human resource disputes, fraud, and intellectual property theft.
PostHog was founded by James and Tim on January 23rd, 2020. We started working together on a startup in August 2019 with the first idea being to help engineers manage technical debt. It didn`t work out, but we realized the power of treating growth as an engineering problem. We also knew that many engineers struggle to understand their impact on their users.
LYNX Medical Systems is a Bellevue, WA-based company in the Software and Internet sector.
Courion has rebranded the company, changing its name to Core Security, to reflect the company’s strong commitment to providing enterprises with market-leading, threat-aware, identity, access and vulnerability management solutions that enable actionable intelligence and context needed to manage security risks across the enterprise. Core Security’s analytics-driven approach to security enables customers to manage access and identify vulnerabilities, in order to minimize risks and maintain continuous compliance. Solutions include Multi-Factor Authentication, Provisioning, Identity Governance and Administration (IGA), Identity and Access Intelligence (IAI), and Vulnerability Management (VM). The combination of these solutions provides context and shared intelligence through analytics, giving customers a more comprehensive view of their security posture so they can make more informed, prioritized, and better security remediation decisions.