CTOs on the Move

Endgame

www.endgame.com

 
Endgame`s converged endpoint security platform is transforming security programs - their people, processes and technology - with the most powerful endpoint protection and simplest user experience, ensuring analysts of any skill level can stop targeted attacks before information theft. Endgame unifies prevention, detection, and threat hunting to stop known and unknown attacker behaviors at scale with a single agent.
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million
  • www.endgame.com
  • 3101 Wilson Boulevard Suite 500
    Arlington, VA USA 22201
  • Phone: 703.650.1250

Executives

Name Title Contact Details
James Butler
Chief Technology Officer Profile

Similar Companies

Convergent Information Security Solutions

Convergent Information Security Solutions is a full service Information Technology Service Provider with a business focus on Information Technology Security and is based in Lexington, South Carolina. CISS has provided technical and security services for organizations and businesses located throughout the United States.

Network Data Security Experts

NDSE is a growing IT Support and managed security services provider, specializing in IT security and consulting in Richmond and Charlotte. With locations in Richmond, VA and Charlotte, NC, we leverage technology to increase operational efficiency & security to facilitate the growth of our partners` businesses. NDSE`s primary objective is to take the ambiguity out of the IT conversation and associated support costs. We handle any and all IT needs for a monthly flat-rate fee. Our goal is to convert unpredictable, soft IT expenses to budget-friendly hard costs. NDSE continuously seeks new partnership opportunities with businesses interested in a new perspective on IT solutions. With over 20 years of industry experience, we help businesses discern the value of investing in a true technology partner.

SignalSense

SignalSense exists to increase the fidelity of security alerts and expand on what can be detected in enterprise networks. The challenges facing those responsible for securing networks have increased exponentially in the last few years -- both from the sophistication of the threats seen, the explosion of agile development and the distribution of applications across varied environments. This is further compounded by the move to public cloud environments, where traditional inspection methods don’t exist. The challenges of delivering high fidelity security visibility into these environments will require new types of security tools that are just now being developed. Machine learning and neural networks, combined with new scalable methods of data collection and processing will provide the opportunity to keep up with the pace of growth in these new agile environments. The foundation of the SignalSense approach is an investment in data science that leverages a variety of machine learning methods, including deep learning, and GPU capacity to classify, characterize and profile network traffic. This enhances detection of threat and compromise, saving valuable investigation time for network security operators.

Pelco

With a long and prestigious history of offering high-quality, innovative products and exceptional customer service, Pelco by Schneider Electric has become the most sought-after supplier in the video security industry. Founded in 1957 and headquartered in Clovis, California, Pelco continues its never-ending pursuit of 100% customer satisfaction.   Since 2007, Pelco has been part of Schneider Electric, a global specialist in energy and security management. Coming together as one, Pelco and Schneider Electric offer a unique ability to provide customers with an unmatched combination of solutions for infrastructure and security. Today, Pelco employs about 2,200 people worldwide, with resellers in 130 countries.

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks. Zimperium is the first and only company to provide a complete mobile security system that continuously runs on the device to provide visibility, security and management for iOS and Android devices. With its non-intrusive approach, users can be confident that their data and their privacy are protected at all times, both on and off the corporate network. Finally, a mobile security system that solves the unique challenges of securing a mobile device without draining the battery or relying on an Internet connection.