| Name | Title | Contact Details |
|---|
Protegrity protects the world`s most sensitive data wherever it resides. Our industry-leading solutions allow businesses to finally tap into the value of their data and accelerate digital transformation timelines – without jeopardizing individuals` fundamental right to privacy. For more than 20 years, Protegrity has delivered innovative, data-centric protection for the most sensitive data of the largest brands on the planet. We free businesses from the constraints associated with accessing and leveraging data to create better customer experiences, make intelligence-supported decisions, and fuel innovation. Data knows no boundaries and Protegrity`s technology is built for data ubiquity. Protegrity is headquartered in Salt Lake City, Utah.
Rem-Tronics Inc is a Silver Creek, NY-based company in the Computers and Electronics sector.
Frame gives you a single place to run any Windows app in the cloud.
Primetech Solutions Inc is a Cerritos, CA-based company in the Computers and Electronics sector.
Advanced Cyber Security is a pioneer in endpoint security, with patented, proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement. Its products provide a first line of defense to a companys layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Securitys Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments. Advanced Cyber Securitys EndpointLock product, which will be integrated into McAfee ePolicy Orchestrator, provides important desktop protection features. The keystroke encryption feature encrypts every keystroke at the point of origin to mitigate the risk of undetected keylogging malware from stealing corporate credentials and sensitive data. An anti-screen scraping technology prevents software from taking screen shots of a users desktop, and the kernel compromise feature monitors the operating system kernel to prevent compromises.