| Name | Title | Contact Details |
|---|
Pearson IT provide strategic consulting services in the area of system integration, advanced network management solutions and application delivery strategies, along with the ability to execute those IT solutions. Our consultants specialize in network installation, information security, Microsoft and Cisco support, help desk administration management systems integration, software package implementation, application development and more. As one of the leading IT consulting firms in the US, our technicians can offer both breadth and depth of technical skills whether you need help with strategy, needs analysis, project management or implementation. We handle both short-term and long-term consulting projects.
Trusted by more than 500,000 companies, Mineral is the HR and compliance leader for growing businesses. Our proactive solutions take the guesswork out of HR and compliance, giving clients peace of mind. We combine data, technology, and human expertise to drive innovation and personalized guidance.
Climb Technology creates innovative, web-based applications to help companies increase sales and improve customer experience through multi-channel marketing. Our SaaS tools help local businesses reach local customers who are searching for their products and services. We help you grow web traffic and exposure, build customer loyalty, increase efficiencies and profits. Our partner company, JBS Custom Software Solutions, develops custom software solutions for a wide range of clients ranging from small technology start-ups to large Fortune 500 retailers. Since 1999, JBS has been focused on e-commerce, content management systems, call center applications, fulfillment and warehouse systems.
Sisu is your complete business intelligence and sales engagement platform for real estate brokerages. Display all of your transaction and actitivity data in elegant dashboards.
Apiiro helps security teams & developers proactively remediate critical risks in cloud-native applications such as design flaws, secrets, IaC misconfigurations, API & OSS vulnerabilities across the software supply chain.