| Name | Title | Contact Details |
|---|---|---|
Greg Buretz |
Chief Technology Officer | Profile |
Klipfolio is a rapidly growing new entrant in the cloud dashboard segment of the business intelligence market. Without help from IT, business users with Excel-level skills can build their own dashboards to monitor the key metrics they need to run and improve their businesses. With hundreds of data sources, dozens of visualizations, and the ability to calculate and create data mashups, Klipfolio has the flexibility to expose insights and answers as unique as each business---at a very cost-effective $20 per user per month. Launched in 2012, and privately-held, Klipfolio has already added over 2,000 customers including marketing agencies, financial services, healthcare, consumer goods and not-for-profits who are using dashboards to run better, more data-driven businesses.
Netlify is a platform that allows developers to develop and deploy websites and apps quickly. It offers a serverless platform that brings integrations and APIs together. Netlify hosts static websites, automates the build process, and integrates with Gi...
Changing your view of the world. Innovative IC processing solutions for image and video systems.
Broadband Learning Corp is a Salt Lake City, UT-based company in the Software and Internet sector.
LookingGlass Cyber Solutions delivers unified threat protection against sophisticated cyber attacks to global enterprises and government agencies by operationalizing threat intelligence across its end-to-end portfolio. Scalable threat intelligence platforms and network-based threat response products consume our machine-readable data feeds to provide comprehensive threat-driven security. Augmenting the solutions portfolio is a worldwide team of security analysts who continuously enrich our data feeds and provide customers unprecedented understanding and response capability into cyber, physical and 3rd party risks. Prioritized, relevant and timely insights enable customers to take action on threat intelligence across the different stages of the attack life cycle.