CTOs on the Move

Data-Tronics

www.data-tronics.com

 
Established in 1962, the role of Data-Tronics has grown along with the growth of Arkansas Best. The company assists ABF and the other subsidiaries of Arkansas Best Corporation in meeting their corporate goals by providing innovative and up-to-date
  • Number of Employees: 250-1000
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details

Similar Companies

I2b Networks

I2b Networks is a San Diego, CA-based company in the Computers and Electronics sector.

iboss

The network perimeter has eroded, making traditional gateway security appliances ineffective at securing users who are no longer bound by network boundaries. Built on a proprietary containerized architecture designed 100% for the cloud, iboss cloud secures user Internet access from anywhere, including in and out of your physical network perimeter. Users are always connected to iboss cloud, regardless of device or location, to ensure all Internet traffic is secured for compliance, web filtering, malware defense and data loss at all times. Since iboss cloud lives in the cloud, security goes where users go with elastic and instant scaling to meet the demands of the cloud-first future.

DIAMONDWATER

DIAMONDWATER is a Willow Spring, NC-based company in the Computers and Electronics sector.

Cherokee Information Services

Cherokee Information Services, Inc.(CIS) is an award winning, rapidly growing, high technology company. We provide a full range of ADP, management, and multimedia integration services to both Government and Industry customers. In addition to systems,

Hoxhunt

Hoxhunt is a human risk management platform that goes beyond security awareness to drive behavior change and measurably lower risk. We combine AI and behavioral science to create individualized micro-training experiences people love. Employees learn to detect and report advanced phishing attacks. Operations teams respond fast with limited resources. And security leaders gain outcome-driven metrics to document reduced cybersecurity risk.