| Name | Title | Contact Details |
|---|---|---|
Ruoting Sun |
Head of Technology Partnerships and Commercial Expansion | Profile |
5 To 50 Networks Inc is a Houston, TX-based company in the Computers and Electronics sector.
Solutionary reduces the information security and compliance burden, delivering flexible managed security services that align with client goals, enhancing organizations’ existing security program, infrastructure and personnel. The company’s services are based on experienced security professionals, actionable threat intelligence and the ActiveGuard service platform that provide expert security and compliance management. Solutionary works as an extension of clients’ internal teams, providing industry-leading customer service, patented technology, thought leadership, years of innovation and proprietary certifications that exceed industry standards. This client focus and dedication to customer service has enabled Solutionary to boast one of the highest client retention rates in the industry.
Trisotech is a Saint-Laurent, QC-based company in the Computers and Electronics sector.
SMITH CONSULTING GROUP is a Marietta, GA-based company in the Computers and Electronics sector.
Founded in 1999, Hub City Media is an Identity and Access Management consultancy offering advisory and implementation services, managed cloud and support services and simple, powerful, easy to integrate products. Our comprehensive U.S. based organization is equipped to partner with clients in every global location and time zone. We never outsource. With Hub City Media, you can count on a team of highly skilled software professionals working in a dynamic and collaborative environment, all drawn from our own roster of employees. Our teams are all U.S citizens, located in our New Jersey Corporate Headquarters. The innovative Hub City Media Product Development Team designs and delivers software that complement and enhance the value of our Partners security platforms, tailored to each individual client and their unique needs. We believe systems that ensure confidentiality, privacy and integrity of information should be easy to understand, simple to configure and, as a result, more secure.