| Name | Title | Contact Details |
|---|
TIW Systems is a Santa Clara, CA-based company in the Computers and Electronics sector.
DesTech Consulting and Education is a Toronto, ON-based company in the Computers and Electronics sector.
Forian provides a unique suite of SaaS solutions, data management capabilities and proprietary data and analytics to optimize and measure operational, clinical and financial performance for customers within the traditional and emerging life sciences, healthcare payer and provider segments, as well as cannabis dispensaries, manufacturers, cultivators and regulators.
Query.AI provides the market`s only security investigations control plane for modern enterprises. Its browser-based platform delivers real-time access and centralized insights across on-premises, multi-cloud, and SaaS applications, without duplicating data from its native locations. With Query.AI, security teams gain a simple and effective way to meet their security investigation and response goals while simultaneously reducing costs.
Advanced Cyber Security is a pioneer in endpoint security, with patented, proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement. Its products provide a first line of defense to a companys layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Securitys Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments. Advanced Cyber Securitys EndpointLock product, which will be integrated into McAfee ePolicy Orchestrator, provides important desktop protection features. The keystroke encryption feature encrypts every keystroke at the point of origin to mitigate the risk of undetected keylogging malware from stealing corporate credentials and sensitive data. An anti-screen scraping technology prevents software from taking screen shots of a users desktop, and the kernel compromise feature monitors the operating system kernel to prevent compromises.