CTOs on the Move

Eagle Technology Management

www.eagletm.com

 
Eagle Technology Management, Inc. is a Cedar Rapids, IA-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million
  • www.eagletm.com
  • PO Box 11100
    Cedar Rapids, IA USA 52410
  • Phone: 515.237.5555

Executives

Name Title Contact Details

Similar Companies

UNIVERSE RESOURCES

UNIVERSE RESOURCES is a Somerset, NJ-based company in the Computers and Electronics sector.

SuiteBox

SuiteBox has a range of solutions to speed and simplify digital workflow and customer experiences and interactions. We combine many singular technologies together and embed them along with our patented products and concepts inside mobilized business process. Suitebox has developed a number of unique patented processes. For example on a tablet device or smart phone we can offer selectively recordable 2 way video, along with simultaneous document or URL uploads which both parties can amend and manipulate and store securely back into any CRM or cloud storage system. Our primary markets are banking, finance, insurance and human resources. But our solutions are also being rapidly deployed in many other verticals including accounting, construction, education and health.

Blade Network

Blade Network is a Santa Clara, CA-based company in the Computers and Electronics sector.

Hostnet

Hostnet is a Richardson, TX-based company in the Computers and Electronics sector.

Trinity Cyber

Trinity Cyber, Inc. is a US based corporation that invents and sells technology to solve the most difficult cyber security challenges. The company patented the first ever technology that can deeply interrogate full-session network traffic in full application layer context and modify it for security in-line, at network speed. The company`s products and services range across several multibillion dollar market segments including network detection and response (NDR), managed detection and response (MDR), intrusion prevention systems (IPS), threat hunting services, threat intelligence (TI), data loss prevention (DLP), content disarm and reconstruction (CDR), and deception technology.