| Name | Title | Contact Details |
|---|
Founded in 1995, QCI has become one of the largest technology consulting firms in our home state. Our mission is simple, we help our clients use technology to succeed. To accomplish our mission, QCI is committed to attracting the best people, partnering
BlueVoyant combines outstanding talent from the private sector and from the cyber intelligence services of the U.S., Israel, and the U.K. to provide a critical additional layer of defense to companies managing their own cyber threat protection. We have unique capabilities to identify actionable threat intelligence from outside your perimeter, so that your company can protect itself from advanced cyber attacks. In addition, BlueVoyant provides complete Managed Cybersecurity Services to make managing your defenses more efficient. BlueVoyant`s experts have led some of the most high-profile investigations into attacks perpetrated by criminal and nation state adversaries. We have experience with corporate investigations involving ransomware, malware infections, insider threat, data theft, and business email compromise
The Washington Network Inc is a Alexandria, VA-based company in the Computers and Electronics sector.
D/I LaserProducts of Dallas is a Lewisville, TX-based company in the Computers and Electronics sector.
Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm with leading expertise financial services, pharmaceutical, nuclear, energy, and healthcare. Lynx security professionals have a unique mix of business, risk, and technology skills. Our consultants are experienced in the selection, design and implementation of multiple security technologies. We provide extensive risk management, security and compliance solutions, including: risk-based security consulting, risk assessments, compliance programs, penetration testing, social engineering, policy development, feasibility studies, product selection, rules and policy development, network re-engineering, installation and configuration, report and analysis temple development, post implementation security testing, and performance tuning. We serve enterprises looking to re-engineer your infrastructure, deploy a key management framework or simply `harden` existing systems we have the skills to assist you.