| Name | Title | Contact Details |
|---|
Magnolia Audio Video is a Bellevue, WA-based company in the Software and Internet sector.
Datas Transfer is a San Francisco, CA-based company in the Software and Internet sector.
D3 Security has been at the forefront of security orchestration, automation, and response since before the term SOAR was even invented. As a global leader among independent SOAR vendors, we`ve helped many of the largest companies in the world transform their security operations with automation. In our 10-year history, we have been a global leader in case management, incident response, and now cutting-edge SOAR that is an invaluable tool in fighting today`s cyber threats. D3 is always innovating, with new features, integrations, and technological breakthroughs. We were the first SOAR platform to fully embed the MITRE ATT&CK matrix for TTP-based analysis and correlation. Our Event Pipeline is also the first of its kind: a powerful asset for enterprises, MSSPs, and MDR providers that streamlines alert triage so that only genuine threats get escalated to human analysts—resulting in a 90% or greater reduction in alert volume. D3`s success in the SOAR market has led to the company more than doubling in size over just a few years. The company is headquartered in Vancouver, Canada, with employees all around the world.
SoftWriters Inc. is a Allison Park, PA-based company in the Software and Internet sector.
Courion has rebranded the company, changing its name to Core Security, to reflect the company’s strong commitment to providing enterprises with market-leading, threat-aware, identity, access and vulnerability management solutions that enable actionable intelligence and context needed to manage security risks across the enterprise. Core Security’s analytics-driven approach to security enables customers to manage access and identify vulnerabilities, in order to minimize risks and maintain continuous compliance. Solutions include Multi-Factor Authentication, Provisioning, Identity Governance and Administration (IGA), Identity and Access Intelligence (IAI), and Vulnerability Management (VM). The combination of these solutions provides context and shared intelligence through analytics, giving customers a more comprehensive view of their security posture so they can make more informed, prioritized, and better security remediation decisions.