CTOs on the Move

Hidden Camera Solutions

www.horsewatcher.com

 
Hidden Camera Solutions is a Scottsdale, AZ-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

Bell Canada

Bell Canada is a Markham, ON-based company in the Computers and Electronics sector.

BigBear.ai

BigBear.ai is the new leader in decision dominance serving the national defense and intelligence communities. The Company delivers high-end capabilities across the data and digital spectrum to deliver information superiority and decision support. BigBear.ai provides a comprehensive suite of solutions including artificial intelligence and machine learning, data science, advanced analytics, offensive and defensive cyber, data management, cloud solutions, digital engineering, and systems integration. BigBear.ai`s customers, including the U.S. Intelligence Community, Department of Defense, and U.S. Federal Government, rely on its advanced technology solutions to analyze information, manage risk, and solve complex problems, leading to better decision making. Headquartered in Columbia, Maryland, BigBear.ai has additional locations in Virginia, Massachusetts, and California.

CIOHelp Group

CIOHelp Group is a Syosset, NY-based company in the Computers and Electronics sector.

A-TEK

A-TEK is a recognized leader in providing secure science and technology solutions for the federal government. Our scientists, analysts and information technology experts support healthcare, research, national security and defense missions worldwide. A-TEK bridges the gap between science and information technology by fostering collaboration between science and technology domain experts. Our collaborative approach enables the evaluation, integration and management of innovations such as the cloud, open source software frameworks and cyber incident detection and recovery technologies.

Edgewise Networks

Edgewise was founded in 2016 to eliminate the problems of data breach and application compromise against companies` critical business applications.