CTOs on the Move


 
Esker Software solutions enable intelligent access to and delivery of core business information from any data source, in any format, to any recipient. Organizations use Esker software to streamline information exchange, open new channels of
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million
  • www.esker.com
  • 1212 Deming Way Ste 350
    Madison, WI USA 53717
  • Phone: 608.828.6000

Executives

Name Title Contact Details

Similar Companies

Creatus

Creatus Inc. is a Santa Clara, CA-based company in the Software and Internet sector.

ANATOMAGE

ANATOMAGE is a San Jose, CA-based company in the Software and Internet sector.

Radware

Radware is a global leader of application delivery and application security solutions for virtual, cloud and software defined data centers. Its award-winning solutions portfolio delivers service level assurance for business-critical applications, while maximizing IT efficiency. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down

Blue Star Sports

With over 25 million users in 23 countries, Blue Star Sports (BSS) is the industry leader in youth sports management by centralizing all operations and providing a complete innovative technology platform for all national governing bodies, youth sports leagues, clubs and associations. Companies under the umbrella of Blue Star Sports include Bonzi, Pointstreak Technologies, Goalline, PrimeTime Sports, SDI Camps, LeagueLineup and RaceWire. Backed by Worldpay, Providence Equity, and other sports industry investors, Blue Star Sports is headquartered in Frisco, Texas.

Traceable AI

Meet the Industry`s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. - API Risk Posture Management: Tackle API Sprawl, head on. Instantly know where you are exposed. Enjoy automatic and continuous API discovery that gives you comprehensive visibility into all APIs, sensitive data flows, and risk posture – even as your environment changes. - Stop Data Exfiltration: Detect and block all known and unknown API attacks, including internal and external API attacks, the OWASP web and API top 10, business logic abuse attacks, API abuse, API fraud, and sensitive data exfiltration. - Threat Hunting: Ensure you are ahead of attackers by searching through the transaction data lake for potential threats. Immediately discover the signs of reconnaissance and take action before the full attack.