CTOs on the Move

Templar Corporation

www.templarcorp.com

 
Templar Corporation is a Alexandria, VA-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

Alphanumeric Systems

Alphanumeric Systems is committed to our employees' training and certifications. Therefore, we offer comprehensive technical training and educational reimbursement programs. Alphanumeric will pay for the cost of approved technical, support, and sales

DIALOG RESEARCH and COMMUNICATIONS

DIALOG RESEARCH and COMMUNICATIONS is a Dublin, CA-based company in the Computers and Electronics sector.

Grayhair Software

GrayHair Software is an industry leader in postal solutions and compliance support. Trusted by global financial institutions, insurance companies, retailers and others. Our core competencies are in tracking, address hygiene and digital integration. We support campaign visibility and connect companies to their data and customers.

Mediacom Communications

Home - Welcome to Mediacom - Mediacoms start experience including trending news, entertainment, sports, videos, personalized content, web searches, and much more.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.