| Name | Title | Contact Details |
|---|---|---|
Ben Denkers |
Senior Vice President of Information Security and Privacy Services | Profile |
David Bailey |
Director of Security Services | Profile |
Since 2003, Prime Care Technologies has equipped long-term care providers with flexible hosting, managed services and cloud software that evolve based on industry demand. Based in Atlanta with 150 employees and 200+ healthcare/IT partnerships, its technology-driven solutions are installed in 6,500+ facilities. With deep multi-vendor interoperability expertise, including the integration of 70+ healthcare applications and 3,500+ EDI payers, Prime Care Technologies offers the leading data warehouse and claims clearinghouse in post-acute care.
Iveda enables cloud video surveillance by licensing its Sentir® video and data management platform, utilizing proprietary video streaming and Big Data storage technology. Iveda enables a recurring revenue model by licensing Sentir to service providers for plug-and-play cloud video offering to their customers. Iveda has a SAFETY Act Certification from the Department of Homeland Security as a Qualified Anti-Terrorism Technology Provider.
Sito Systems is a San Francisco, CA-based company in the Computers and Electronics sector.
Kaiser and Associates IT Consulting is a Vista, CA-based company in the Computers and Electronics sector.
TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.