CTOs on the Move

Symmetry Systems

www.symmetry-systems.com

 
Symmetry Systems is a new kind of security company in an age where security breaches and ransomware attacks are becoming a daily occurrence. We apply machine learning with precision and speed to help our customers better understand and protect their large fleets of data stores, identities and applications in a hybrid cloud environment. Our goal is to provide visibility and actionability to security and engineering organizations that are globally responsible for managing data and identity management risk. We do all of this without impacting production, goto market or productivity speeds, while creating symmetry and balance between Engineering and Security. We ...
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details

Similar Companies

VeraSafe

VeraSafe provides trust seals, website security scanning, privacy certification and PCI scanning for websites worldwide. http://www.VeraSafe.com

IoT.nxt

Home - The IoT.nxt solution allows businesses to create a technology-agnostic, digital overview of their entire organisation and draw insight from the data their connected ‘things’ generate.

OCTOPUS XR

OCTOPUS XR is a company that operates a business marketplace connecting companies with the leading extended reality (XR) hardware, software, and professional service solutions.

Data Solutions

From on-boarding to exit testing, employee engagement, and 360 feedback and all managed and accessed on a single platform.

Finjan Holdings

Through our subsidiary, Finjan, Inc., the Company owns a portfolio of patents, related to software that proactively detects malicious code and thereby protects end users from identity and data theft, spyware, malware, phishing, trojans and other online threats. Finjan`s mission is to invest in innovation and encourage the development of core intellectual property. Founded in 1997, Finjan developed and patented technology that is capable of detecting previously unknown and emerging threats on a real-time, behavior-based basis, in contrast to signature-based methods of intercepting only known threats to computers, which were standard in the online security industry during the 1990`s.