CTOs on the Move

End Hunger Network

www.endhunger.com

 
End Hunger Network is a Santa Monica, CA-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

ScaleFT

ScaleFT is the Zero Trust Security company, building the next generation of cloud native solutions for the enterprise.

Lazarus Alliance

Founded in 1999, Lazarus Alliance has been on the cutting edge of IT security, risk, privacy, governance, cyberspace law and compliance leadership, innovation and services provided to the global community. With significant contributions and innovations such as The Policy Machine, SafetyNET, the Holistic Operational Readiness Security Evaluation (HORSE Project), The Security Trifecta, Your Personal CXO and many other progressive initiatives, it’s no wonder that Lazarus Alliance has become a leading international name synonymous with leadership, quality, customer service and innovation. Lazarus Alliance’s primary purpose is to help organizations attain, maintain, and demonstrate compliance and information security excellence – in any jurisdiction. Lazarus Alliance specializes in IT security, risk, privacy, governance, cyberspace law and compliance leadership solutions and is fully dedicated to global success in these disciplines.  

nAppliance Networks

nAppliance Networks is a San Jose, CA-based company in the Computers and Electronics sector.

Convergent Information Security Solutions

Convergent Information Security Solutions is a full service Information Technology Service Provider with a business focus on Information Technology Security and is based in Lexington, South Carolina. CISS has provided technical and security services for organizations and businesses located throughout the United States.

Aella Data Inc

Stellar Cyber invented the industry`s first Pervasive Breach Detection System (PBDS) with AI and Distributed Security Intelligenceā„¢, empowering organizations to proactively detect and thwart attacks on their critical data systems before damage is done.