CTOs on the Move

Lodestone

www.lodestone.com

 
Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response. The cornerstones of Lodestone; experience, intelligence, and uncommon performance, are centered around our people, capability and unconventional way of providing clients with a cyber security advantage. Lodestone`s experts have honed their approach and tools to enable resistance, disrupt intrusion, obstruct bad actors and provide peace of mind to their clients. Determination to provide the best cyber defense leads all of us. Our team is comprised of investigative talent from several of the world`s largest firms and ...
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million
  • www.lodestone.com
  • 320 East Main Street
    Lewisville, TX USA 75057
  • Phone: 203.307.4984

Executives

Name Title Contact Details
Francisco Donoso
Chief Technology Officer Profile

Similar Companies

eCalton

eCalton, Inc. is a Vero Beach, FL-based company in the Computers and Electronics sector.

Freedom Solutions Group

Freedom Solutions Group is a Richmond, VA-based company in the Computers and Electronics sector.

Indegy

Indegy, a leader in industrial cyber security, protects industrial control system (ICS) networks from cyber threats, malicious insiders and human error.

Housecalls Network

Housecalls Network is a Eden Prairie, MN-based company in the Computers and Electronics sector.

Trinity Cyber

Trinity Cyber, Inc. is a US based corporation that invents and sells technology to solve the most difficult cyber security challenges. The company patented the first ever technology that can deeply interrogate full-session network traffic in full application layer context and modify it for security in-line, at network speed. The company`s products and services range across several multibillion dollar market segments including network detection and response (NDR), managed detection and response (MDR), intrusion prevention systems (IPS), threat hunting services, threat intelligence (TI), data loss prevention (DLP), content disarm and reconstruction (CDR), and deception technology.