Name | Title | Contact Details |
---|
Founded in 2014, Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications. Headquartered in Paris, Vierzon, New York and Hong Kong, Ledger has a team of 170 professionals developing a variety of products and services to safeguard cryptocurrency assets for individuals and companies – including the Ledger hardware wallets line already sold in 165 countries.
L5 Solutions is a Indianapolis, IN-based company in the Computers and Electronics sector.
The leading Product Information Management (PIM) solution to accelerate your online business. Increase sales & cut costs with powerful automation capability. PIM: Master products and syndicate through multiple distribution channels with the Jasper PIM. A central set of product data to manage, decorate and automate the feed of eCommerce websites, print catalogs, ERP systems and trading partners. Speed time to market, optimize merchandising, scale for growth, build brand equity and ensure absolute product accuracy across all channels. Coordinate automated communication among e-commerce related business systems, including ERP, EDI, POS, DAM, fulfillment and eCommerce channels with the Jasper PIM. Ensure compatibility and harmony between best-of-breed solutions without the need to start from scratch. Jasper builds bridges and creates rules to make your systems work in unison. We serve the Canadian, US and International markets. We`d love to hear from you and discuss how we can help!
Sylantro is a Campbell, CA-based company in the Computers and Electronics sector.
Trinity Cyber, Inc. is a US based corporation that invents and sells technology to solve the most difficult cyber security challenges. The company patented the first ever technology that can deeply interrogate full-session network traffic in full application layer context and modify it for security in-line, at network speed. The company`s products and services range across several multibillion dollar market segments including network detection and response (NDR), managed detection and response (MDR), intrusion prevention systems (IPS), threat hunting services, threat intelligence (TI), data loss prevention (DLP), content disarm and reconstruction (CDR), and deception technology.