CTOs on the Move


 
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million
  • www.tachus.com
  • 2407, Timberloch Pl
    The Woodlands, TX USA 77380
  • Phone: 832.791.1100

Executives

Name Title Contact Details

Similar Companies

Visible

Visible is the future of phone service with no stores, no annual contracts, and no foot-long bills. Get unlimited data, talk, and text on Verizons 4G LTE Network for just $40/month. Its everything you would want out of your phone plan and nothing you...

Model Metrics

Model Metrics, Inc. is a Chicago, IL-based company in the Computers and Electronics sector.

BigID

Data drives business. Data is the critical factor for all businesses - not just to persevere, but to continue to innovate. Every type of organization – from retail to financial services to manufacturing to technology – is now a digital enterprise, driven by data. BigID’s data intelligence platform helps organizations proactively discover, manage, protect, and get more value from their regulated, sensitive, personal, and critical data across their data landscape. BigID’s data intelligence platform enables organizations to know their enterprise data and take action for privacy, protection, and perspective.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.