CTOs on the Move

ID Analytics

www.idanalytics.com

 
ID Analytics is a leader in credit and fraud risk solutions with patented analytics, proven expertise and real-time insight into consumer behavior. Established in 2002, our solutions provide actionable insight into credit and identity risk for enterprises that span across a number of industries. We deliver this insight through an unprecedented combination of proprietary data, patented analytics, and real-time insight into consumer behavior through the unmatched strength of the ID Network®, one of the nation’s largest networks of cross-industry consumer behavioral data. The company’s exploration into consumer identity behavior also supports an industry-leading research resource, the ID:A Labs. Every day, the largest ...
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

ABN

ABN is a Great Barrington, MA-based company in the Computers and Electronics sector.

The Aldridge Company

The Aldridge Company is a Houston, TX-based company in the Computers and Electronics sector.

NexAge Technologies USA

NexAge Technologies USA is a Jersey City, NJ-based company in the Computers and Electronics sector.

KOLAKOWSKI

KOLAKOWSKI is a Redondo Beach, CA-based company in the Computers and Electronics sector.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.