CTOs on the Move


 
Luxoft, an emerging global leader in application and product engineering services, helps enterprise IT organizations and software vendors navigate the rapidly changing technology landscape and build p.
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million
  • www.luxoft.com
  • 225 W 34th St Ste 1707
    New York, NY USA 10122
  • Phone: 212.964.9900

Executives

Name Title Contact Details

Similar Companies

Carpentar Technology

Carpentar Technology is a Reading, PA-based company in the Software and Internet sector.

C3 AI

C3 AI is a leading enterprise AI software provider for accelerating digital transformation. C3 AI delivers the C3 AI® Suite for developing, deploying, and operating large-scale AI, predictive analytics, and IoT applications, in addition to an increasingly broad portfolio of turnkey AI applications. The core of the C3 AI offering is a proprietary, model-driven AI architecture that dramatically enhances data science and application development.

Mountainsoft

Mountainsoft is a Canmore, AB-based company in the Software and Internet sector.

ProcessMaker

ProcessMaker is an American multinational corporation headquartered in Raleigh-Durham, North Carolina. The company specializes primarily in developing and marketing enterprise business process management (BPM) software.

Courion

Courion is the market leader in identity and access governance and administration (IGA), from provisioning to governance to identity analytics and intelligence (IAI). In 2015, Courion acquired Core Security to form the only company that can continuously and comprehensively monitor both infrastructure vulnerability and access risk. Core Security provides the industry`s first comprehensive attack intelligence platform offering advanced analytics to prioritize, validate and seek to eliminate security threats. Many of the world’s largest enterprises and organizations rely on Courion’s solutions to confidently provide an access governance process that ensures compliance to thousands of employees while protecting critical company data and assets from unauthorized access. Now with the addition of Core Security’s solutions, these same enterprises and security professionals can focus on the most likely threats to their business by modeling, simulating and testing the actions of an actual attacker.