Name | Title | Contact Details |
---|
CIS® (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. The CIS Controls™ and CIS Benchmarks™ are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continuously refined and verified by a volunteer, global community of experienced IT professionals. Our CIS Hardened Images are virtual machine emulations preconfigured to provide secure, on-demand, and scalable computing environments in the cloud. CIS is home to both the Multi-State Information Sharing and Analysis Center® (MS-ISAC®), the go-to resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center™ (EI-ISAC™), which supports the cybersecurity needs of U.S. State, Local and Territorial elections offices.
AD-WATCH is a Toronto, ON-based company in the Computers and Electronics sector.
Namogoo`s unique technology detects and blocks Digital Malware that is hijacking your customer journey online.
Pica8 is the industry`s open networking software alternative to Cisco for the enterprise. Pica8`s AmpCon Controller for centralized management and automation and PicOS Software Switches for networking and security have successfully replaced Cisco DNA Center and Catalyst Switches for campus and access networks within Fortune 500 enterprises. Pica8 software is deployed at over 1,000 customers in over 40 countries.
Zenedge is a leading, global provider of cloud-based, artificial intelligence-driven cybersecurity solutions. Zenedge solutions are powered by proprietary artificial intelligence (AI) technology, inspecting web traffic in real-time, identifying threats and behavior anomalies and dynamically updating security postures accordingly – enabling enterprises to take an adaptive and proactive approach to securing their networks.