| Name | Title | Contact Details |
|---|
Outcome Health advances society through technologies that change behavior to positively shape the human condition. Tracking to deliver its platform to 70% of all healthcare practices domestically by 2020, Outcome Health aspires to activate the best health outcome possible for every person in the world. Founded in 2006 by Rishi Shah and Shradha Agarwal as ContextMedia, Outcome Health embeds actionable information and intelligence into healthcare decision making. The company has doubled each year in its scale of technology implementation at outpatient health care facilities, business partnerships with global life sciences and medical device companies, product innovation and team growth. Decision platforms such as digital anatomy boards, interactive educational tablets and mobile connectivity in consultation rooms deliver measurable outcomes through actionable intelligence on conditions, treatments and lifestyle changes to improve the quality of life. Outcome Health has been named an Inc 5000 Fastest Growing Company in America, a Top Company Culture by Entrepreneur Magazine, and a Top 20 Workplace in Healthcare by Fortune.
Sector 5® education & business technology connects people, making all forms of communication—including business transactions, video sharing, and mobile browsing—faster and less expensive. The work often involves designing, testing, maintaining, and improving computer software, hardware, systems, and networks.
Cloud Creek Systems is a Agoura Hills, CA-based company in the Computers and Electronics sector.
Sphera is the largest, global provider of software and information services in the operational risk, environmental performance and product stewardship markets. For more than 30 years, we have helped 2,500+ customers and 100,000+ users in 70 countries optimize workflows and navigate the complex and dynamic global regulatory structure.
Cloudentity extends identity to your APIs and provides continual, contextual authorization at a transaction level, ensuring that APIs—both internal and external—are continuously monitored and access is assessed based on risk and threat intelligence. By leveraging our internal trust engine, and integrations with third-party solutions, we can ensure that each authorization request at an API transaction-level is valid and that suspicious activity is blocked or upgraded to require additional measures of approval Transactional MFA)