| Name | Title | Contact Details |
|---|
VECTOR RESOURCES is a Annandale, VA-based company in the Computers and Electronics sector.
Cloudentity extends identity to your APIs and provides continual, contextual authorization at a transaction level, ensuring that APIs—both internal and external—are continuously monitored and access is assessed based on risk and threat intelligence. By leveraging our internal trust engine, and integrations with third-party solutions, we can ensure that each authorization request at an API transaction-level is valid and that suspicious activity is blocked or upgraded to require additional measures of approval Transactional MFA)
One Hospitality System is a Georgetown, ON-based company in the Computers and Electronics sector.
Cure Forward is the vision of a small team in Cambridge, MA. We wanted to create a platform to connect patients with genomic medicine, bringing the possibilities of precision medicine directly in reach. A way to use the best of technology to help people diagnosed with life-altering disease discover all of their options. We want to make it easy for patients to understand the root cause of their conditions and put the knowledge to work. Get their data, find treatment options, including clinical trials. We felt making this happen was worth staying up all night.
24By7Security, Inc. focuses on the privacy and security implications of the assets of an enterprise. We believe that Cyber Security needs to be priority ONE across all functions of the enterprise. A sound Cyber Security strategy defends against the next generation of security threats by addressing people, processes & technology, as well as third parties/ business partners. We provide Cyber Security-related services in the areas of Strategy, Internal Audit Support, Assessments, Remediation and Training. Our goal is to avoid unnecessary risk to businesses and prevent the next generation of threats that could undermine the stability of companies. We serve multiple industries such as Education, Hospitality, Financial, Insurance, Government, Law Firms, Healthcare, Retail and Entertainment. We specialize in reactive, proactive and counteractive services such as security risk assessments, data breach assessments, operationalizing policies and procedures, containment, eradication and remediation efforts, forensics, vulnerability assessments, testing, Security awareness training, part-time CISO and Privacy Officer services, post-incident activity, and more.