CTOs on the Move

Princeton Identity

www.princetonidentity.com

 
Princeton Identity is the identity management company that makes security more convenient, accurate and reliable than ever before. Using iris recognition and other biometric technology, Princeton Identity enables businesses, global organizations and borders to simplify identity management, resulting in improved safety and protection.
  • Number of Employees: 25-100
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details

Similar Companies

NQ Mobile

NQ Mobile Inc. is a leading global provider of consumer and enterprise mobile Internet services. NQ Mobile`s portfolio of offerings includes mobile security and productivity, mobile search, mobile games and advertising applications for the consumer market and consulting, mobile platforms, and mobility management services for the enterprise market. NQ Mobile maintains dual headquarters in Dallas, Texas, USA and Beijing, China.

CheapAntiVirus.com Cheap Computer Security Softwares Irvine,CA

CheapAntiVirus.com Cheap Computer Security Softwares Irvine,CA is a Irvine, CA-based company in the Computers and Electronics sector.

Cavirin

Cavirin protects your digital assets across the enterprise hybrid cloud by delivering CyberPosture Intelligence. We permit enterprises to maintain their `golden security posture` via continuous visibility, automated scoring against the widest set of industry best practices, regulations, and benchmarks, and remediation leveraging predictive analytics and by integrating security into the DevOps cycle.

ADI Global

As a leading distributor of security and low voltage products, ADI offers the solutions, support and services dealers need to grow in today’s market. ADI represents more than 500 top industry manufacturers and offers thousands of items in stock every day at its 99 locations across North America.

GreatHorn

Built on a foundation of machine learning and automation, GreatHorn delivers the industry`s most effective and comprehensive email security solution, and can be deployed and operational in less than 5 minutes. With its proprietary dataset built from hundreds of millions of uniquely analyzed threats, GreatHorn combines the intelligence, fidelity and precision necessary to prevent attacks from becoming breaches.