| Name | Title | Contact Details |
|---|---|---|
Jeremy Katz |
Cofounder and CTO | Profile |
Jonathan Slaughter |
Security Governance Officer | Profile |
Andrea Malagodi |
Chief Technology Officer | Profile |
Macs Software Na, Inc. is a Canonsburg, PA-based company in the Software and Internet sector.
Bushel enables clear and simple business for grain facilities and their growers. Through integrating into a grain facility`s accounting system, Bushel provides growers with instant access to scale tickets, contracts, prepaids, commodity balances, cash bids, and market information through grain facility-branded apps.
Indigo Olive Software is a Wheaton, IL-based company in the Software and Internet sector.
Vaxxine Computer Systems Inc. is a St Catharines, ON-based company in the Software and Internet sector.
Ostrich Birdseye is a unified qualitative and quantitative cyber risk management application (based on industry-standard benchmarks NIST, CIS, ISO) that allows you to quickly assess, prioritize and quantify your organization`s financial and operational risks in real-time, in one place. Built by cybersecurity experts—and based on industry-standard benchmarks (NIST, CIS, ISO) and our proprietary OCRF format—Birdseye is designed to drive action and communication among stakeholders and equip you with the business-critical information you need to improve your cybersecurity posture. Unlike other Cyber Risk Management Providers (CMRPs), Ostrich delivers a single, unified platform for cyber risk analysis, management, reporting and mitigation: SaaS-delivered cyber security program assessments (Enterprise, Business unit, Product line, Office) Benchmarking against established best-practice frameworks [Cyber Security Framework (CSF), ISO 27001, NIST 800-53, COBIT, 18 CIS Critical Security Controls (CSC-18)] Consistent and simple-to-understand progress tracking against established compliance benchmarks for your industry Board-level security dashboards and tactical checklists Granular sector and leader comparisons Custom-tailored security solutions and strategies Real-time API connections to top security tools for data-driven risk posture calculations Comprehensive reporting and scoring that you can share with clients, insurers and third parties Self-paced consulting services