CTOs on the Move

Network Techniques

www.networktechniques.net

 
Network Techniques is a Burlington, CT-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

Infranet Technologies Group

Infranet Technologies Group is a Wilmington, NC-based company in the Computers and Electronics sector.

OMNIMED

OMNIMED™ is an innovative medical technology company committed to saving lives by improving patient outcomes while reducing healthcare costs, inefficiencies and risks. Headquartered in Nashville, Tennessee, the company collaborates with prestigious organizations such as Johns Hopkins University Applied Physics Laboratory, BDO Center for Healthcare Excellence and Innovation and BDO Digital and Maya HTT, to solve complex industry challenges – like the management of modern surgical suites.

RizePoint

RizePoint At-a-Glance RizePoint mobile and cloud-based software help organizations improve the quality, safety, and sustainability of their products, services, and facilities. RizePoint`s software is used by 5 of the top 8 hospitality brands and 5 of the top 8 food service brands. RizePoint serves more than 387,000 users in 120 countries and territories, speaking 40 languages: 105,000 food service restaurants 27,000 hotels and resort properties 13,000 grocery and retail stores. RizePoint is the global leader in Quality Experience Management SaaS solutions. RizePoint software creates a hub of valuable compliance information to align organizational focus on brand protection. Dedicated to helping our customers deliver a positive brand experience, RizePoint serves more than 2 million audits with 300 million questions answered annually. Considered the industry standard for food service, hospitality, and retail, RizePoint is headquartered in Salt Lake City, Utah.

Amtek Consulting

Amtek Consulting is a Dallas, TX-based company in the Computers and Electronics sector.

AppGuard

AppGuard is a revolutionary new approach to prevent breaches from threats that traditional anti-virus software is not equipped to face, including fileless malware, botnets, polymorphic malware, weaponized documents, targeted attacks, in-memory attacks, ransomware, phishing, watering-holes, drive-by-downloads, and other undetectable advanced threats.