CTOs on the Move

STI Computer Services

www.sticomputer.com

 
STI Computer Services is a Norristown, PA-based company in the Computers and Electronics sector.
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details

Similar Companies

Chesapeake Technology International.

CTI is dedicated to building quality defense solutions for the warfighter. CTI`s solutions are the preferred standard in our mission space due to our unique application of agile methodologies, utility-driven design, and iterative, hands-on development with our users. Here at CTI, we believe in the power of collaborative development with government, industry, and academia. CTI is a platform company under the Bluestone Investment Partner portfolio. Bluestone invests in lower middle-market companies in the defense and government services arena. The extensive industry-focus and experience of our firm`s principals and investors offers unique insights and value to the management teams of our portfolio companies. Few private equity firms offer the combination of industry-focused intellectual and investment capital that Bluestone has assembled.

webTiers

webTiers is a Centennial, CO-based company in the Computers and Electronics sector.

Sygnetics

Sygnetics, Inc is a Rochester Hills, MI-based company in the Computers and Electronics sector.

PEOPLE'S ADVOCACY

PEOPLE'S ADVOCACY is a Fairfax, VA-based company in the Computers and Electronics sector.

CounterFlow AI

CounterFlow AI is addressing the growing network visibility gap created by the rise of encrypted traffic. Its ThreatEye® cloud-native analytics integrate cryptanalysis, packet dynamics, and machine learning techniques to identify patterns associated with network faults, anomalies, and threats in real-time. Unlike subversive SSL decryption methods, ThreatEye`s approach preserves privacy and renders deep insights into both encrypted and unencrypted traffic. Offered on a subscription basis, CounterFlow`s software is designed for hybrid cloud deployments to easily extend the visibility of network and security operations across an entire enterprise.