Name | Title | Contact Details |
---|
MCNC is a technology nonprofit that builds, owns and operates the North Carolina Research and Education Network (NCREN), which has successfully served research, education, non-profit health care, public safety, libraries, and other community institutions with Internet connectivity and related services for more than 30 years. NCREN is the fundamental broadband infrastructure for 750 of these institutions including K-20 education in North Carolina. As one of the nation`s premier middle-mile fiber networks, MCNC leverages NCREN to customize Internet services and applications for each customer while supporting private service providers in bringing cost-efficient connectivity to rural and underserved communities in North Carolina.
Bilingual Notary Network is your nationwide signing solution for all your documents signing and notary signing services needs. Our staff has over 25 years of industry experience to help care for each borrower one at a time. Bilingual Notary Network has...
Bridge360 is a Austin, TX-based company in the Computers and Electronics sector.
Axispoint is a New York, NY-based company in the Computers and Electronics sector.
At Redpoint Cybersecurity, we are constantly interfacing with our affiliates and our customers, who range from individuals across over a dozen industries (including Architecture, Construction, Engineering, Financial Services, Legal, Manufacturing, Private Client Services, and Real Estate) to privately-held companies and government agencies at the state and local levels, in order to better understand their operational and technical risks and to help them optimize their security protocols and practices. Redpoint applies well-established information security methodologies and frameworks, including the CIS Top 20 Critical Controls and the NIST Cybersecurity Framework. 100% of our penetration testers (ethical hackers) are OSCP-certified and possess deep, domain-specific expertise, including network security testing, wireless security testing, web application testing, and mobile device security assessments. In addition to understanding technical hacking techniques, which enables us to approach your company`s environment as an attacker would, we have in-depth experience with the major security frameworks and the development of cyber regulations.