CTOs on the Move

POST Computer Systems

www.pocosys.com

 
POST Computer Systems is a Wilbraham, MA-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million
  • www.pocosys.com
  • 2400 Boston Rd
    Wilbraham, MA USA 01095
  • Phone: 413.596.5177

Executives

Name Title Contact Details

Similar Companies

Open Technologies

Open Technologies is a Urbandale, IA-based company in the Computers and Electronics sector.

Stallard Technologies

Stallard Technologies is a Overland Park, KS-based company in the Computers and Electronics sector.

Ventura Solutions

Ventura Solutions, Inc is a Hanover, MD-based company in the Computers and Electronics sector.

Celerium

Celerium protects important industry sectors and their members by augmenting and leveraging cyber threat intelligence to more actively defend against cyber threats and attacks. Celerium`s flagship solution, Cyber Defense Network, is a unique community collaboration experience combining communities, processes, and underlying technology to accelerate defensive actions for its members. Members are empowered to create, share, and receive threat information easily and rapidly, assess and prioritize relevant responses to cyber threats, and feed high-quality threat intelligence directly into key security technologies, significantly enhancing their value and member responsiveness. Celerium powers the next generation of information-sharing organizations, including ISAOs and ISACs. Relied on by government agencies, enterprise risk management teams, CISOs, and SOC analysts, Celerium supports all critical infrastructure and market sectors.

Cloudentity

Cloudentity extends identity to your APIs and provides continual, contextual authorization at a transaction level, ensuring that APIs—both internal and external—are continuously monitored and access is assessed based on risk and threat intelligence. By leveraging our internal trust engine, and integrations with third-party solutions, we can ensure that each authorization request at an API transaction-level is valid and that suspicious activity is blocked or upgraded to require additional measures of approval Transactional MFA)