Name | Title | Contact Details |
---|
Data Storage Corporation (DTST on NASDAQ) is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data within their objectives. Through its four data centers and by leveraging leading technologies, DSC delivers and supports a broad range of premium solutions for both Windows and IBM iSeries environments that assist its clients save time and money, gain more control of and better access to data and enable the highest level of security for that data. The company`s solutions include: high availability replication services, email storage and archival, email compliance solutions for e-discovery, off-site data backup and recovery, electronic vaulting, virtualized recovery, continuous data protection, data de-duplication, telecom recovery services and virtual tape libraries. Headquartered in Melville, N.Y., DSC offers its solutions and services to business, government, education and healthcare industries by leveraging leading technologies, such as virtualization, cloud computing and cloud storage.
Fishtech is a data-driven cybersecurity solutions provider for any computing platform. We identify gaps and solutions to help organizations minimize risk, maintain compliance, and increase efficiency. Fishtech Group includes the Security-as-a-Service operation CYDERES and the security analytics firm Haystax of McLean, VA. Our venture partners are Perch Security of Tampa, FL, and Foresite of Overland Park, KS.
Transim is a Portland, OR-based company in the Computers and Electronics sector.
Disaster Survival Planning is a Camarillo, CA-based company in the Computers and Electronics sector.
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited.