| Name | Title | Contact Details |
|---|---|---|
Art Feldman |
Chief Financial Officer | Profile |
Greg McCord |
Chief Information Security Officer | Profile |
AES-IntelliNet is a Peabody, MA-based company in the Computers and Electronics sector.
QDivision is a team of highly capable, highly motivated individuals solving complex problems in the transportation and moving industry through the application of user centered design and cutting edge technology. At QDivision, innovation and technology are core components of our products. Our brilliant software engineers are given the freedom to use their talents and creativity to apply technology in the most effective and efficient manner possible. Our mission is simple: Identify, develop and leverage cutting edge technology for the benefit of the transportation and moving industries.
THRAX Computer Solutions is a Austin, TX-based company in the Computers and Electronics sector.
Zenlayer offers on-demand edge cloud services in over 250 PoPs around the world, with expertise in fast-growing emerging markets like India, China and South America. Businesses utilize Zenlayer`s global edge cloud platform to instantly improve digital experiences for their users with ultra-low latency and worldwide connectivity on demand.
At Redpoint Cybersecurity, we are constantly interfacing with our affiliates and our customers, who range from individuals across over a dozen industries (including Architecture, Construction, Engineering, Financial Services, Legal, Manufacturing, Private Client Services, and Real Estate) to privately-held companies and government agencies at the state and local levels, in order to better understand their operational and technical risks and to help them optimize their security protocols and practices. Redpoint applies well-established information security methodologies and frameworks, including the CIS Top 20 Critical Controls and the NIST Cybersecurity Framework. 100% of our penetration testers (ethical hackers) are OSCP-certified and possess deep, domain-specific expertise, including network security testing, wireless security testing, web application testing, and mobile device security assessments. In addition to understanding technical hacking techniques, which enables us to approach your company`s environment as an attacker would, we have in-depth experience with the major security frameworks and the development of cyber regulations.