CTOs on the Move


 
Datagate is a Saint Petersburg, FL-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

PESA

PESA provides encrypted AV and KVM distribution systems for ultra-high-resolution video imagery for Command and Control and Ops Center environments. PESA defends your data when it leaves your secure network enabling increased opportunities for secure collaboration. From the servers to the workstations to the displays, your multi-class critical information traversing hundreds of feet of cabling can now be encrypted, isolated and protected against potential insider threats. No longer do you have to just trust and hope – PESA provides you the technical layer that enforces your trust. You can trust PESA to defend your data inside your zero-trust environment.

Whitlock Infrastructure Solutions

Whitlock Infrastructure Solutions is a Annapolis, MD-based company in the Computers and Electronics sector.

Volterra

Volterra is a startup focused on Edge Computing and funded by leading venture firms: Khosla Ventures, Mayfield and Microsoft M12 Ventures.

Satellogic

Satellogic will democratize access to space-based services by dramatically reducing the barriers to obtain real-time satellite data, creating a new layer of world-wide awareness.

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe–today, tomorrow and long into the future. Offering the first quantum key distribution network in the United States, Quantum Xchange enables organizations to send unhackable data over long distances using the laws of quantum physics. Leveraging the proven secure Quantum Key Distribution (QKD) method and its own proprietary Trusted Node technology, Quantum Xchange`s future-proof, data-transmission infrastructure addresses the shortcomings inherent with modern-day encryption. These include the ability for keys to be intercepted, corrupted or exposed during transmission, plus the imminent threat of quantum computers breaking current encryption keys.