| Name | Title | Contact Details |
|---|
Learn about Corservas managed IT services and IT support based out of our network operations centers located in Trumbull, Connecticut and Orlando, Florida.
Enveyo is the leading provider of logistics data management, visibility, and shipping optimization software, helping shippers and 3PLs move their logistics forward through data-driven technology. From shipment analytics and automated carrier selection to post-purchase delivery experience management and carrier auditing, Enveyo is the only suite deploying solutions across the logistics lifecycle. Powered by a robust, enterprise data management platform, Enveyo Insights, Modeling, Cloudroute, Alerting, and Audit solutions enable organizations to make business-transforming shipping decisions.
With Twilio, unite communications and strengthen customer relationships across your business – from marketing and sales to customer service and operations.
FireEye provides the world`s only malware control system designed to secure networks from targeted malware. The FireEye platform is deployed in over 40 countries and more than 1,000 customers and partners, including over 25 percent of the Fortune 100. FireEye has pioneered the next generation of threat protection to help organizations protect themselves from being compromised. Cyber attacks have become much more sophisticated and are now easily bypassing traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways, compromising the majority of enterprise networks. The FireEye platform supplements these legacy defenses with a new model of security to protect against the new breed of cyber attacks. The company has been involved with dismantling cybercriminal infrastructure, including some of the world`s largest botnets as well as web hosting provider McColo, which was responsible for a significant amount of malware and botnets. FireEye also produces "Malware Intelligence Lab," an industry security blog covering the latest trends in cybercrime, Web 2.0 attacks, Advanced Persistent Threats (APTs), and malware.