Name | Title | Contact Details |
---|---|---|
Jaeho Hwang |
DIA CIO Infrastructure Service Lead | Profile |
Andrew McDermott |
DHMSM Chief Information Security | Profile |
Nikolay Petrov |
Information System Security Officer | Profile |
Hunter Bosch |
Information System Security Officer | Profile |
Christopher P. |
Information System Security Officer | Profile |
Morpheus Data is one of the first infrastructure-agnostic cloud management platforms and true DevOps solutions made for the enterprise. Created for today`s technology leaders by top IT, DevOps and Engineering minds, Morpheus Data lets these leaders manage their most important workflows, servers, clouds, apps, and more from a single, easy to use, interface. One-click provisioning, automatic logging, monitoring and backup, intuitive alerts and easy security policies are a few ways Morpheus is helping customers. Morpheus Data`s founding team consists of some of the most sought after talent in the industry with experience that includes AT&T, Cisco, EMC, ServiceNow, Intuit and others.
Celerium protects important industry sectors and their members by augmenting and leveraging cyber threat intelligence to more actively defend against cyber threats and attacks. Celerium`s flagship solution, Cyber Defense Network, is a unique community collaboration experience combining communities, processes, and underlying technology to accelerate defensive actions for its members. Members are empowered to create, share, and receive threat information easily and rapidly, assess and prioritize relevant responses to cyber threats, and feed high-quality threat intelligence directly into key security technologies, significantly enhancing their value and member responsiveness. Celerium powers the next generation of information-sharing organizations, including ISAOs and ISACs. Relied on by government agencies, enterprise risk management teams, CISOs, and SOC analysts, Celerium supports all critical infrastructure and market sectors.
Webfinity Studios is a Portland, OR-based company in the Computers and Electronics sector.
Echelon was born with a purpose; the belief that security and privacy are basic human rights. We founded our firm on the idea that cybersecurity isn`t something that a professional services firm can dabble in. The threats we face are constantly evolving and that calls for experts that place their full focus on the problem with full organizational support. Cybersecurity, privacy and technology risk present major threats that disrupt our way of life. We take this personally and see it as our calling to stem the tide. We are all in. We offer a suite of services such as: - Offensive Security & Testing - Audits, Assessments & Compliance - vCISO - Defensive Security Our Service Delivery Model: ASSESS: Understand the current state of your cybersecurity and technology risk posture through tailored assessments designed specifically for your organization, by our team of experts. COMPLY: Provide organizational stakeholders, business leaders and customers peace of mind by demonstrating an effective security and technology risk posture through unbiased and independent assessments. Our experts will help you and your organization cut through the complexity of cybersecurity standards, frameworks and regulations through efficient and effective risk management exercises. BUILD: Enhance or augment your current cybersecurity and technology risk capabilities by partnering with our experts to help you engineer solutions to your biggest risk areas, build processes that make improvements sustainable and provide overall enhanced organizational cybersecurity maturity.
Advanced Cyber Security is a pioneer in endpoint security, with patented, proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement. Its products provide a first line of defense to a companys layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Securitys Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments. Advanced Cyber Securitys EndpointLock product, which will be integrated into McAfee ePolicy Orchestrator, provides important desktop protection features. The keystroke encryption feature encrypts every keystroke at the point of origin to mitigate the risk of undetected keylogging malware from stealing corporate credentials and sensitive data. An anti-screen scraping technology prevents software from taking screen shots of a users desktop, and the kernel compromise feature monitors the operating system kernel to prevent compromises.