| Name | Title | Contact Details |
|---|
Solvere One is a Sterling, VA-based company in the Computers and Electronics sector.
Apogee IT Services provides managed IT services to more than 150 companies and organizations throughout western PA, Boston, and the northeast and mid-Atlantic regions. Founded in 1990, Apogee has successfully provided managed IT services and technology support for 25 years. Building IT | Securing IT | Supporting IT | Improving IT - Building IT and infrastructure the right way, the first time, every time. - Strategic, thoughtful IT security that protects and gives peace of mind. - First-rate customer service relentlessly chasing perfection. - Helping your business day-to-day and plan for the future. At Apogee, client service is always top of mind. So is developing world-class IT talent. Our career development track and internship opportunities make Apogee IT Services a place where top IT professionals can continue to grow and work with the best.
QCM Technologies Inc is a Scottsdale, AZ-based company in the Computers and Electronics sector.
Technology Specialists is a Beaverton, OR-based company in the Computers and Electronics sector.
24By7Security, Inc. focuses on the privacy and security implications of the assets of an enterprise. We believe that Cyber Security needs to be priority ONE across all functions of the enterprise. A sound Cyber Security strategy defends against the next generation of security threats by addressing people, processes & technology, as well as third parties/ business partners. We provide Cyber Security-related services in the areas of Strategy, Internal Audit Support, Assessments, Remediation and Training. Our goal is to avoid unnecessary risk to businesses and prevent the next generation of threats that could undermine the stability of companies. We serve multiple industries such as Education, Hospitality, Financial, Insurance, Government, Law Firms, Healthcare, Retail and Entertainment. We specialize in reactive, proactive and counteractive services such as security risk assessments, data breach assessments, operationalizing policies and procedures, containment, eradication and remediation efforts, forensics, vulnerability assessments, testing, Security awareness training, part-time CISO and Privacy Officer services, post-incident activity, and more.