CTOs on the Move


 
Everyday organizations make countless business decisions aimed to boost organizational performance. Unfortunately, most of these decisions are made without knowing the real tradeoffs against risk exposure. RiskVision solutions enable organizations to leverage the knowledge of risk to optimize performance and investment decisions.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

Awake Security

Awake Security provides the only advanced security analytics solution that delivers deep visibility and answers to questions that cannot even be asked today, improving productivity tenfold. The company`s patent-pending Security Knowledge Graph™ data model uses machine learning and data science to automate painstaking analyses expert investigators perform. It identifies and tracks network entities as humans think of them and highlights entity attributes, relationships, behaviors and activities. This enables analysts to proactively detect, hunt, investigate and respond to threats. Awake is built on a foundation of more than two years of research with hundreds of security professionals and more than a dozen security teams.

Tigera

Tigera delivers solutions for secure application connectivity for the cloud native world. Tigera technology is used by the world`s largest enterprises and public cloud providers to power connectivity for application development and deployment and to address the connectivity and security challenges that arise in at-scale production.

Namogoo

Namogoo`s unique technology detects and blocks Digital Malware that is hijacking your customer journey online.

Source 44 Consulting

Source 44 Consulting is a Markham, ON-based company in the Computers and Electronics sector.

Cyphort

In the battle against advanced malware threats, you are not alone. We`re cyber security experts who want to be your advanced persistent threat superheroes. We can help you respond to the avalanche of network attacks, prioritize your work, and go after the really harmful security threats that are targeting your enterprise.