| Name | Title | Contact Details |
|---|---|---|
Alex R |
Chief Information Security Officer | Profile |
John Cannava |
Vice President, Technology and Strategic Programs | Profile |
Richard Bird |
Chief Customer Information Officer | Profile |
Bernard Harguindeguy |
Chief Technology Officer | Profile |
Robb Reck |
Chief Information Security Officer | Profile |
Zykos Technology Group is a Denville, NJ-based company in the Software and Internet sector.
Cornerpost Software is a Jonesville, VA-based company in the Software and Internet sector.
Easi Document Integration (EDI) is a Houston, TX-based company in the Software and Internet sector.
"Innovative solutions to complex problems require carefully constructed teams. That`s why ours mix equal parts strategy, design, and engineering, with R&D as a shared responsibility. Beneath this highly collaborative, iterative environment lies a passion for studying people that helps us craft experiences they love. We`ve helped many of the world`s leading brands – including Audi, Cisco, Google, and Philips – cut through the clutter and prioritize their technology investments to align with their brand, business objectives and users` needs."
Courion has rebranded the company, changing its name to Core Security, to reflect the company’s strong commitment to providing enterprises with market-leading, threat-aware, identity, access and vulnerability management solutions that enable actionable intelligence and context needed to manage security risks across the enterprise. Core Security’s analytics-driven approach to security enables customers to manage access and identify vulnerabilities, in order to minimize risks and maintain continuous compliance. Solutions include Multi-Factor Authentication, Provisioning, Identity Governance and Administration (IGA), Identity and Access Intelligence (IAI), and Vulnerability Management (VM). The combination of these solutions provides context and shared intelligence through analytics, giving customers a more comprehensive view of their security posture so they can make more informed, prioritized, and better security remediation decisions.