Name | Title | Contact Details |
---|---|---|
Theodore Peterson |
Director - Information Security | Profile |
Dixon Gould |
Chief Information Officer and Chief Information Security Officer | Profile |
With over 25 years of mission-focused success, SeKON delivers cultural, operational, and technical transformation to support federal government customers including the National Institutes of Health (NIH), Substance Abuse and Mental Health Services Administration (SAMHSA), the Centers for Disease Control (CDC), Centers for Medicare and Medicaid Services (CMS) and Defense Health Agency (DHA). Our vision is “Better Health Through Innovation and Digital Transformation.”
Information Renaissance designs is a Pittsburgh, PA-based company in the Computers and Electronics sector.
Soft Logica is a Alexandria, VA-based company in the Computers and Electronics sector.
Strider is revolutionizing the way companies, governments, and research institutions protect their innovation and compete in a new era of strategic competition. Our trailblazing technology and intelligence solutions enable customers to proactively visualize, manage, and respond to state-sponsored IP theft and supply chain vulnerabilities.
Advanced Cyber Security is a pioneer in endpoint security, with patented, proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement. Its products provide a first line of defense to a companys layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Securitys Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments. Advanced Cyber Securitys EndpointLock product, which will be integrated into McAfee ePolicy Orchestrator, provides important desktop protection features. The keystroke encryption feature encrypts every keystroke at the point of origin to mitigate the risk of undetected keylogging malware from stealing corporate credentials and sensitive data. An anti-screen scraping technology prevents software from taking screen shots of a users desktop, and the kernel compromise feature monitors the operating system kernel to prevent compromises.