CTOs on the Move

Sekady Capital

www.sekady.com

 
Sekady is connecting construction through technology! We work with valued partners such as Title Companies, Fund Control Companies, Lenders, and Builders to provide centralized visibility into construction projects. Our goal is to create easy-to-use, yet innovative software solutions to arm everyone in the construction industry with the tools they need to build more efficiently, have greater visibility, and be more profitable.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million
  • www.sekady.com
  • 3405 Overland Road Suite 360
    Meridian, ID USA 83642
  • Phone: 208.452.1910

Executives

Name Title Contact Details

Similar Companies

Urban Web Design Inc

Urban Web Design Inc is a Victoria, BC-based company in the Software and Internet sector.

Replicated

Replicated is the modern way to ship multi-prem software. Replicated gives software vendors a container-based platform for easily deploying cloud-native applications inside customers` environments to provide greater security and control.

Panacea Corp

Panacea Corp is a San Diego, CA-based company in the Software and Internet sector.

SelectMinds

SelectMinds delivers Software-as-a-Service networking and referral technologies that help companies empower current and former employees as referrers of talent and new business.

Carbon Black

Carbon Black is the leading provider of next-generation endpoint security. Carbon Black`s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 13 million endpoints under management, Carbon Black has more than 3,600 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.