CTOs on the Move

HID Global

www.hidglobal.com

 
HID powers the trusted identities of the world`s people, places and things. Every day millions of people in more than 100 countries use our products and services to securely access physical and digital places. Over 2 billion things that need to be identified, verified and tracked are connected through HID Global`s technology. We make it possible for people to transact safely, work productively and travel freely. We work with governments, universities, hospitals, financial institutions and some of the most innovative companies on the planet—helping them to create trusting and trusted physical and digital environments so that they and the people ...
  • Number of Employees: 1K-5K
  • Annual Revenue: $250-500 Million

Executives

Name Title Contact Details

Similar Companies

Tharon Valencia Telecommunications

Tharon Valencia Telecommunications is a Logan, UT-based company in the Computers and Electronics sector.

Identiv

Identiv is a global leader in seamless authentication and security solutions. We verify frictionless access and anywhere operations, protect identities from malicious attacks, secure intellectual property, and drive IoT innovation. Our platform encompasses RFID and NFC, cybersecurity, and the full spectrum of physical access, video, and audio security. We digitally secure the physical world.

Convergent Solutions Inc

Convergent Solutions Inc is a Alexandria, VA-based company in the Computers and Electronics sector.

KPM Technology

KPM Technology is a Springfield, MO-based company in the Computers and Electronics sector.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.