CTOs on the Move

Shift Technology

www.shift-technology.com

 
Shift Technology provides insurance companies with an innovative SaaS solution to improve and scale fraud detection. The analyses performed by Shift are fast and thorough, quantitative and qualitative. Its efficient algorithms are tailored to reproduce fraud handlers` deductive reasoning, making investigations quicker and easier than ever.
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details
Jerome Razniewski
Chief Information Security Officer Profile

Similar Companies

Sandvine

Sandvine Corporation (Sandvine) develops and markets network management equipment and solutions for broadband and wireless providers.

HARRIS, RON

HARRIS, RON is a Oklahoma City, OK-based company in the Computers and Electronics sector.

Computer And Network Support

Computer And Network Support is a Alexandria, VA-based company in the Computers and Electronics sector.

Civic

Civic Secures & Protects Identities. We believe in giving businesses and individuals the tools to control and protect identities. Through our decentralized architecture with the blockchain and biometrics on the mobile device, our platform enables users to share and manage their fully verified identity data. Our new ecosystem will reduce the overall cost of KYC, remove inefficiencies, enhance security and privacy, greatly improve user experience and disrupt the current identity verification supply chain.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.