| Name | Title | Contact Details |
|---|
Gilham Consulting is a Solana Beach, CA-based company in the Computers and Electronics sector.
TeenSafe was created in 2011 by parents for parents to help keep their children safe and flourishing. Smartphones have become a huge part of our kids` lives. We believe that monitoring and managing their activity is an essential part of modern parenting. This belief drives our talented team to create and market solutions that help parents detect and solve many of the issues children face in the mobile social digital age, including: cyberbullying, sexting, distraction, depression, too much screen time, inappropriate apps and content, among others. Our signature Monitor product allows parents to track location, texts, deleted texts, iMessages, Kik, WhatsApp, browsing and search history, installed apps, call logs and more. And our Manage product enables parents to remotely restrict apps, camera, purchases and more on the child`s device. From our base in Santa Monica, California, we continue to innovate and deliver ground breaking and market leading services that truly make a difference to children`s outcomes.
CyberX is a member of the IBM Security App Exchange Community and has partnered with premier solution providers worldwide including Deutsche-Telekom/T-Systems.
Built on a foundation of machine learning and automation, GreatHorn delivers the industry`s most effective and comprehensive email security solution, and can be deployed and operational in less than 5 minutes. With its proprietary dataset built from hundreds of millions of uniquely analyzed threats, GreatHorn combines the intelligence, fidelity and precision necessary to prevent attacks from becoming breaches.
Virsec revolutionizes cyber security by detecting and remediating previously “indefensible” advanced memory-based attacks on critical applications and server endpoints. Using patented, non-signature based technology, Virsec is able to protect applications “full-stack” — from the memory to web layer — without generating false positives, a huge win for security teams drowning in bells and alarms or using needle in a haystack approaches. Our deterministic Trusted Execution™ approach provides runtime application visibility and protection at the CPU-level and in memory to ensure real-time detection and remediation in microseconds. Virsec is unique in its ability to detect file-less, memory corruption and even ROP chain attacks on server endpoints, as well as protecting web applications against web application attacks in one unified platform. This unprecedented level of cyber security breadth and depth enables enterprises to release applications faster and achieve advanced hacking protection, with full assurance of protection against zero-day or unidentified vulnerabilities.