CTOs on the Move

Eliassen

www.eliassen.com

 
Eliassen Group has been driving the success of our clients, consultants, and employees within Technology Staffing and Consulting Services since 1989. For 25 years, we have been at the forefront of innovation by uniting talented people and quality solutions within successful companies to help them attain their business objectives. Our solution oriented approach to understanding your needs ensures that we identify and represent the best possible talent available in the market, personally selected and matched to your requirements by our highly-tenured, extraordinarily capable recruiting team. Our consulting divisions include expertise focused on Agile, Biometrics & Data Solutions, Government Services, Healthcare ...
  • Number of Employees: 1K-5K
  • Annual Revenue: $500M-1 Billion
  • www.eliassen.com
  • 55 Walkers Brook Drive 6th Floor
    Reading, MA USA 01867
  • Phone: 800.354.2773

Executives

Name Title Contact Details
Sally Bauer
Senior Vice President of Cloud Services Profile
Robert Waddell
Executive Vice President and Chief Information Officer Profile

Similar Companies

Conexco Communications Inc

Conexco Communications Inc is a Shreveport, LA-based company in the Computers and Electronics sector.

Millionminds

Millionminds is a Cerritos, CA-based company in the Computers and Electronics sector.

Echelon Risk + Cyber

Echelon was born with a purpose; the belief that security and privacy are basic human rights. We founded our firm on the idea that cybersecurity isn`t something that a professional services firm can dabble in. The threats we face are constantly evolving and that calls for experts that place their full focus on the problem with full organizational support. Cybersecurity, privacy and technology risk present major threats that disrupt our way of life. We take this personally and see it as our calling to stem the tide. We are all in. We offer a suite of services such as: - Offensive Security & Testing - Audits, Assessments & Compliance - vCISO - Defensive Security Our Service Delivery Model: ASSESS: Understand the current state of your cybersecurity and technology risk posture through tailored assessments designed specifically for your organization, by our team of experts. COMPLY: Provide organizational stakeholders, business leaders and customers peace of mind by demonstrating an effective security and technology risk posture through unbiased and independent assessments. Our experts will help you and your organization cut through the complexity of cybersecurity standards, frameworks and regulations through efficient and effective risk management exercises. BUILD: Enhance or augment your current cybersecurity and technology risk capabilities by partnering with our experts to help you engineer solutions to your biggest risk areas, build processes that make improvements sustainable and provide overall enhanced organizational cybersecurity maturity.

NEAR Protocol

NEAR is a blockchain protocol designed to bridge the adoption gap for mainstream commercial DApps.

NETSCOUT

Guard against disruptions in network availability & application performance. NETSCOUT threat intelligence, DDoS mitigation & security protect networks world-wide.