| Name | Title | Contact Details |
|---|
Cyberklix Inc. is a Mississauga, ON-based company in the Computers and Electronics sector.
Stefanini is a global company with 30 years of experience in the market, investing in a complete innovation ecosystem to meet the main verticals and assist customers in the process of digital transformation. With robust offerings aligned with market trends such as automation, cloud, Internet of Things (IoT) and user experience (UX), the company has been recognized with several awards in the area of innovation. Today, the company has a broad portfolio of solutions that combine innovative consulting, marketing, mobility, personalized campaigns and artificial intelligence services for traditional solutions such as service desk, field service and outsourcing (BPO). With a presence in 40 countries, Stefanini was nominated for the third consecutive year as the fifth transnational company more internationalized, according to the Dom Cabral Foundation ranking of 2017.
Epitome Networks is a Henrico, VA-based company in the Computers and Electronics sector.
24By7Security, Inc. focuses on the privacy and security implications of the assets of an enterprise. We believe that Cyber Security needs to be priority ONE across all functions of the enterprise. A sound Cyber Security strategy defends against the next generation of security threats by addressing people, processes & technology, as well as third parties/ business partners. We provide Cyber Security-related services in the areas of Strategy, Internal Audit Support, Assessments, Remediation and Training. Our goal is to avoid unnecessary risk to businesses and prevent the next generation of threats that could undermine the stability of companies. We serve multiple industries such as Education, Hospitality, Financial, Insurance, Government, Law Firms, Healthcare, Retail and Entertainment. We specialize in reactive, proactive and counteractive services such as security risk assessments, data breach assessments, operationalizing policies and procedures, containment, eradication and remediation efforts, forensics, vulnerability assessments, testing, Security awareness training, part-time CISO and Privacy Officer services, post-incident activity, and more.