| Name | Title | Contact Details |
|---|---|---|
Roger Colon |
Director of Cybersecurity | Profile |
E Touches is a leader of in-cloud event management software. Founded in 2008, the event management technology company has more than 900 customers in 35 countries. Covering every major function in the event planning lifecycle, the multi-lingual and multi-currency software has 15 modules for registration, budgeting, surveying, mobile app and more. Headquartered in the United States, the company has three wholly-owned subsidiaries in the United Kingdom, Australia and the United Arab Emirates.
Access to clinically reliable, contactless data collection has never been more valuable. Biostrap offers a customizable digital health solution to meet your needs.
Tangelo, LLC. is a Atlanta, GA-based company in the Software and Internet sector.
Computer Cafe Internet Services is a Manchester, TN-based company in the Software and Internet sector.
FireEye provides the world`s only malware control system designed to secure networks from targeted malware. The FireEye platform is deployed in over 40 countries and more than 1,000 customers and partners, including over 25 percent of the Fortune 100. FireEye has pioneered the next generation of threat protection to help organizations protect themselves from being compromised. Cyber attacks have become much more sophisticated and are now easily bypassing traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways, compromising the majority of enterprise networks. The FireEye platform supplements these legacy defenses with a new model of security to protect against the new breed of cyber attacks. The company has been involved with dismantling cybercriminal infrastructure, including some of the world`s largest botnets as well as web hosting provider McColo, which was responsible for a significant amount of malware and botnets. FireEye also produces "Malware Intelligence Lab," an industry security blog covering the latest trends in cybercrime, Web 2.0 attacks, Advanced Persistent Threats (APTs), and malware.