| Name | Title | Contact Details |
|---|
Akasha Imaging is an early stage (stealth) start-up, backed by top VCs. We`re leveraging advances in imaging and deep learning to create computer vision systems that can robustly handle all types of materials in any environment with unmatched accuracy - enabling robots to see better.
Dorado Systems, a commanding force in the industry of Healthcare EDI, offers cutting edge technology to accelerate the connection between providers and a multitude of insurance carriers, vendors and clearinghouses, utilizing both real time and batch processing. Dorado Systems has created a secure, economical and efficient web-based system to simplify the connection between our clients and hundreds of payers instantaneously. Our dynamic suite of data exchange solutions saves our clients resources to be used best where they are needed in patient care.
Communication Concepts is a Fort Lauderdale, FL-based company in the Computers and Electronics sector.
CounterFlow AI is addressing the growing network visibility gap created by the rise of encrypted traffic. Its ThreatEye® cloud-native analytics integrate cryptanalysis, packet dynamics, and machine learning techniques to identify patterns associated with network faults, anomalies, and threats in real-time. Unlike subversive SSL decryption methods, ThreatEye`s approach preserves privacy and renders deep insights into both encrypted and unencrypted traffic. Offered on a subscription basis, CounterFlow`s software is designed for hybrid cloud deployments to easily extend the visibility of network and security operations across an entire enterprise.
Atlantic Data Security is dedicated to providing our clients with the security solutions and services needed to best mitigate risk and maintain a healthy security posture. With the objective of being a trusted security advisor, we take the time to understand the unique needs and goals of our clients and then overcome the challenges in our collective way. Some of the more common challenges we see today are shortages of resources along with the difficulty in keeping up with the rapidly changing threat landscape.