| Name | Title | Contact Details |
|---|
Viewpoint is a provider of innovative construction-specific software solutions to the global construction and capital project industries. Viewpoint provides the tools needed to improve project profitability and visibility, manage risk, and effectively collaborate with the entire project team.
August designs smart home access products and services that are safer than traditional keys, make life easier, and put you in control of your front door from anywhere in the world. With August products, you can create virtual keys to your home and easily grant access to housecleaners, dog walkers, delivery services, guests, friends, and family—and control how long that access lasts—all from your smartphone. August products work together, integrate with other smart devices and services, and are designed to fit naturally and elegantly into the home. Founded by technology entrepreneur Jason Johnson and renowned designer Yves Béhar, August has raised $50 million in funding to date and is headquartered in San Francisco, California.
Obispo Software is a San Luis Obispo, CA-based company in the Software and Internet sector.
Apcera is the market leading enterprise-grade container management platform — driven by security and policy — that gives IT leaders the confidence and control to drive innovation and move faster, securely. Built for cloud-native as well as legacy applications, Apcera lets IT teams containerize, deploy, orchestrate and govern a vast range of workloads across on-premises, cloud and hybrid environments. Fully integrated and completely turnkey, only Apcera offers industry-leading agility and time-to-value without sacrificing security or control. Apcera enables key enterprise use cases including deploying Docker in production securely and at scale, legacy application modernization and hybrid cloud mobility. Global 2000 companies use Apcera to lower CapEx and OpEx, improve time to market and reduce risk.
Enveil is a pioneering data security company protecting Data in Use. Performing actions such as search and analytics have historically required decryption, creating points of exposure.