| Name | Title | Contact Details |
|---|
The shortest path to better software.https://www.linkedin.com/company/puppet/ Puppet is driving the movement to a world of unconstrained software change. Our revolutionary platform is the industry standard for automating the delivery and operation of the software that powers everything around us. More than 40,000 companies — including more than two thirds of the Fortune 100 — use Puppet`s open source and commercial solutions to achieve situational awareness and drive software change with confidence. Based in Portland, Oregon, Puppet is a privately held company with more than 500 employees around the world.
10X Consulting Group provides business process automation and workflow consulting focused on critical business process and business flow challenges related to enterprise resource planning (ERP). Our experience has evolved a prioritization strategy that first identifies and addresses processes with large potential cost savings to maximize their return on investment. Through meetings and discussions within focused areas of an organization and reviews of current documented processes, 10X Consulting Group will identify solutions that address day-to-day needs with high ROI potential.
Penn Systems Group, Inc. is a Edgemont, PA-based company in the Computers and Electronics sector.
Coastline Networks Inc is a Boca Raton, FL-based company in the Computers and Electronics sector.
Echelon was born with a purpose; the belief that security and privacy are basic human rights. We founded our firm on the idea that cybersecurity isn`t something that a professional services firm can dabble in. The threats we face are constantly evolving and that calls for experts that place their full focus on the problem with full organizational support. Cybersecurity, privacy and technology risk present major threats that disrupt our way of life. We take this personally and see it as our calling to stem the tide. We are all in. We offer a suite of services such as: - Offensive Security & Testing - Audits, Assessments & Compliance - vCISO - Defensive Security Our Service Delivery Model: ASSESS: Understand the current state of your cybersecurity and technology risk posture through tailored assessments designed specifically for your organization, by our team of experts. COMPLY: Provide organizational stakeholders, business leaders and customers peace of mind by demonstrating an effective security and technology risk posture through unbiased and independent assessments. Our experts will help you and your organization cut through the complexity of cybersecurity standards, frameworks and regulations through efficient and effective risk management exercises. BUILD: Enhance or augment your current cybersecurity and technology risk capabilities by partnering with our experts to help you engineer solutions to your biggest risk areas, build processes that make improvements sustainable and provide overall enhanced organizational cybersecurity maturity.