| Name | Title | Contact Details |
|---|
Inriver transforms product information into a profit making asset at every touchpoint along the entire product journey. With growing demands on product data, B2B and B2C enterprises need a centralized software solution that supports the entire product cycle, from sourcing to recycling and every stage in between. The multi-tenant inriver platform scales with any digital ecosystem to equip your value chain with a single source of truth PIM solution, built-in digital shelf analytics (DSA), and a range of industry-leading integrations. Only with the centralized inriver platform can you meet the evolving needs of commerce and futureproof your business ambitions. Join the 1,600+ global brands powering their entire product journeys with inriver.
Zycus Inc. is one of the leading companies in Software and Internet industry. Zycus Inc. is based in Princeton, NJ. You can find more information on Zycus Inc. at www.zycus.com
Hansen Information Technologies is a Rancho Cordova, CA-based company in the Software and Internet sector.
Encore Software Services is a Minneapolis, MN-based company in the Software and Internet sector.
Courion has rebranded the company, changing its name to Core Security, to reflect the company’s strong commitment to providing enterprises with market-leading, threat-aware, identity, access and vulnerability management solutions that enable actionable intelligence and context needed to manage security risks across the enterprise. Core Security’s analytics-driven approach to security enables customers to manage access and identify vulnerabilities, in order to minimize risks and maintain continuous compliance. Solutions include Multi-Factor Authentication, Provisioning, Identity Governance and Administration (IGA), Identity and Access Intelligence (IAI), and Vulnerability Management (VM). The combination of these solutions provides context and shared intelligence through analytics, giving customers a more comprehensive view of their security posture so they can make more informed, prioritized, and better security remediation decisions.