CTOs on the Move

Ksr Software

www.ksrsoftware.com

 
Ksr Software is a Palatine, IL-based company in the Software and Internet sector.
  • Number of Employees: 25-100
  • Annual Revenue: $50-100 Million

Executives

Name Title Contact Details

Similar Companies

Alida

Creator of the world`s first CXM and Insights platform. We help turn your customers` truth into action. Alida believes in a world where customers are the ultimate source of truth. A world where the best business decisions are those made with customers, not for them. That`s why Alida created the world`s first CXM and insights platform to turn customer truth into action. For over 20 years, iconic brands like BuzzFeed, LinkedIn, and Red Bull have chosen Alida, formerly Vision Critical, as their secret weapon. Alida`s unique approach of coupling broad feedback with deep insights creates meaningful and lasting customer relationships and builds brands that stand the test of time.

Guardhat Technologies

Guardhat is a multi-product, feature-packed intelligent safety system that integrates cutting edge wearable technology and advanced proprietary software. It is equipped to detect, alert and help prevent hazardous industrial work-related incidents. It is designed to collect and analyze data to support and improve industrial worker safety programs. Guardhat. Always on guar

Harmony Information Systems

Harmony Information Systems is a Reston, VA-based company in the Software and Internet sector.

iOffice Inc

iOffice Inc is a Houston, TX-based company in the Software and Internet sector.

Core Security

Courion has rebranded the company, changing its name to Core Security, to reflect the company’s strong commitment to providing enterprises with market-leading, threat-aware, identity, access and vulnerability management solutions that enable actionable intelligence and context needed to manage security risks across the enterprise. Core Security’s analytics-driven approach to security enables customers to manage access and identify vulnerabilities, in order to minimize risks and maintain continuous compliance. Solutions include Multi-Factor Authentication, Provisioning, Identity Governance and Administration (IGA), Identity and Access Intelligence (IAI), and Vulnerability Management (VM). The combination of these solutions provides context and shared intelligence through analytics, giving customers a more comprehensive view of their security posture so they can make more informed, prioritized, and better security remediation decisions.