CTOs on the Move

Preferred Partner

www.preferredpartner.com

 
Preferred Partner is a Indianapolis, IN-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details

Similar Companies

NetGain Technologies

NetGain Technologies is one of the top managed IT services providers in the world. We are experts in the architectural design, implementation, and management of high performance IT solutions, delivered with an exceptional level of support.

First Network Group

First Network Group is a Hayward, WI-based company in the Computers and Electronics sector.

NECINA

New England Chinese Information & Networking Association (NECINA) is a premium professional organization in New England

Tortuga Logic

Founded in 2014, Tortuga Logic, a leader in hardware security, has developed extensive expertise and powerful technologies to uncover security vulnerabilities early in the design process of semiconductor chips. The Radix line of products augments existing chip verification flows and provides broad coverage of the hardware CWE (Common Weakness Enumeration) categories – a general security taxonomy recently created by an industry consortium led by MITRE. Besides providing security products, Tortuga Logic offers advanced services to help customers to assess their hardware security risks and establish a comprehensive security program.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.