| Name | Title | Contact Details |
|---|---|---|
Theodore Peterson |
Director - Information Security | Profile |
Dixon Gould |
Chief Information Officer and Chief Information Security Officer | Profile |
Dynexus Technology™ is a stealth-mode company, developing innovative IIoT products and services that connect people with advanced sensor-based enterprise data to transform operations through anytime, anywhere access to critical business intelligence.
iPass is a global Wi-Fi roaming market leader for enterprise employees and service provider subscribers. We knit the world`s commercial Wi-Fi networks together to create a single global Wi-Fi network. With the massive acceleration of the broader Wi-Fi industry, where every mobile phone, tablet and laptop is Wi-Fi enabled, and where Wi-Fi has become the preferred connectivity option for billions of devices, we believe that we are uniquely positioned to take advantage of the expanding global demand for Wi-Fi services.
ITOTS Networks is a Silver Spring, MD-based company in the Computers and Electronics sector.
ACQUIRED CONSULTING is a Jacksonville, FL-based company in the Computers and Electronics sector.
Echelon was born with a purpose; the belief that security and privacy are basic human rights. We founded our firm on the idea that cybersecurity isn`t something that a professional services firm can dabble in. The threats we face are constantly evolving and that calls for experts that place their full focus on the problem with full organizational support. Cybersecurity, privacy and technology risk present major threats that disrupt our way of life. We take this personally and see it as our calling to stem the tide. We are all in. We offer a suite of services such as: - Offensive Security & Testing - Audits, Assessments & Compliance - vCISO - Defensive Security Our Service Delivery Model: ASSESS: Understand the current state of your cybersecurity and technology risk posture through tailored assessments designed specifically for your organization, by our team of experts. COMPLY: Provide organizational stakeholders, business leaders and customers peace of mind by demonstrating an effective security and technology risk posture through unbiased and independent assessments. Our experts will help you and your organization cut through the complexity of cybersecurity standards, frameworks and regulations through efficient and effective risk management exercises. BUILD: Enhance or augment your current cybersecurity and technology risk capabilities by partnering with our experts to help you engineer solutions to your biggest risk areas, build processes that make improvements sustainable and provide overall enhanced organizational cybersecurity maturity.