CTOs on the Move

Sedona Technologies

www.shawsridge.com

 
Sedona Technologies is a Moline, IL-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

RS

RS is a Newark, CA-based company in the Computers and Electronics sector.

LightSPEED Technologies

LightSPEED Technologies, Inc is a Tualatin, OR-based company in the Computers and Electronics sector.

CyberGRX

The CyberGRX Third Party Cyber Risk Management (TPCRM) platform enables enterprises to cost-effectively and collaboratively identify, assess, mitigate and monitor third party cyber risk exposure across its entire vendor, partner and customer ecosystem. The CyberGRX Exchange removes the enormous assessment burden on third parties today by operating the market`s first cyber risk assessment exchange. Founded by former CISO`s, CyberGRX is backed by world-class investors, CyberGRX Design Partners (Aetna, ADP, Blackstone, MassMutual and other top companies) with some of the most trusted names in cybersecurity. Based in Denver, Colorado, we`re backed by Google Ventures, The Blackstone Group, Allegis Capital, TenEleven Ventures, Rally Ventures, ClearSky Ventures and our design partners.

Internet Presence Consulting

Internet Presence Consulting is a Darien, IL-based company in the Computers and Electronics sector.

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm with leading expertise financial services, pharmaceutical, nuclear, energy, and healthcare. Lynx security professionals have a unique mix of business, risk, and technology skills. Our consultants are experienced in the selection, design and implementation of multiple security technologies. We provide extensive risk management, security and compliance solutions, including: risk-based security consulting, risk assessments, compliance programs, penetration testing, social engineering, policy development, feasibility studies, product selection, rules and policy development, network re-engineering, installation and configuration, report and analysis temple development, post implementation security testing, and performance tuning. We serve enterprises looking to re-engineer your infrastructure, deploy a key management framework or simply `harden` existing systems we have the skills to assist you.