CTOs on the Move

Teledata Systems and Services

www.teledata-usa.com

 
Teledata Systems and Services is one of the leading companies in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

peritusinc.com

peritusinc.com is a Santa Barbara, CA-based company in the Computers and Electronics sector.

B2 Technology and Consulting Services

B2 Technology and Consulting Services is a Falls Church, VA-based company in the Computers and Electronics sector.

ReliaSource

ReliaSource is a Technology-Centric Business Solutions Company specializing in, System Engineering and Integration, Relocation, Rollout and Logistic Services, Security and Information Assurance, Business Transformation Services, Intelligence Programs.

Suku

Suku is on the mission to accelerate the adoption of real Web3. To get there, Suku is creating an ecosystem that interconnects web3 communities, that powers unique experiences, and utility, and provides simple tools to better onboard users into Web3. All, powered by SUKU. By creating an ecosystem with shared incentives for all web3 communities, Suku is fostering a space of collaboration and interoperability like never seen before in Web3.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.