CTOs on the Move

Ingeniux Corporation

www.ingeniux.com

 
Ingeniux Corporation is a Seattle, WA-based company in the Software and Internet sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million
  • www.ingeniux.com
  • 2121 5th Ave 5th Floor
    Seattle, WA USA 98121
  • Phone: 206.788.4305

Executives

Name Title Contact Details

Similar Companies

Barkly Protects

Barkly is re-inventing endpoint security. Based in Boston, Barkly identifies and stops modern sophisticated attacks on endpoint devices without sacrificing employee performance or productivity. Its speed and simplicity allows IT administrators to install, monitor, and customize reporting with efficiency and ease.

ReliSource US

ReliSource US is a Bedford, MA-based company in the Software and Internet sector.

QuestionPro

With over 2.5 million users across 40 countries, we are a leading provider of online survey software that allows our users to generate the insights they need to make better business decisions.

Teletype GPS Co.

Teletype GPS Co. is a Boston, MA-based company in the Software and Internet sector.

Courion

Courion is the market leader in identity and access governance and administration (IGA), from provisioning to governance to identity analytics and intelligence (IAI). In 2015, Courion acquired Core Security to form the only company that can continuously and comprehensively monitor both infrastructure vulnerability and access risk. Core Security provides the industry`s first comprehensive attack intelligence platform offering advanced analytics to prioritize, validate and seek to eliminate security threats. Many of the world’s largest enterprises and organizations rely on Courion’s solutions to confidently provide an access governance process that ensures compliance to thousands of employees while protecting critical company data and assets from unauthorized access. Now with the addition of Core Security’s solutions, these same enterprises and security professionals can focus on the most likely threats to their business by modeling, simulating and testing the actions of an actual attacker.