| Name | Title | Contact Details |
|---|
MVP Systems Software is a Farmington, CT-based company in the Software and Internet sector.
QuickPen is a Englewood, CO-based company in the Software and Internet sector.
At hCentive, exchange technology is our business. We are singularly focused on delivering state-of-the-art exchange solutions which enhance and deepen our client`s businesses. hCentive is the first organization to build an marketplace solution from the ground-up to meet the ACA requirements. We have a deep understanding of the health insurance market and have created solutions and services that align with federal and state regulations and meet or exceed industry standards. We have solutions for the Individual, Group, Medicare and the Exchange markets. Our expertise in the healthcare market combined with experienced leadership provides a distinctive advantage to our customers. We offer a single point of accountability for health insurance organizations. Using our solutions, our customers are able to deliver their products/services to the consumer seamlessly and faster, which provides tremendous business value.
Business Solution Providers is a Demarest, NJ-based company in the Software and Internet sector.
Meet the Industry`s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. - API Risk Posture Management: Tackle API Sprawl, head on. Instantly know where you are exposed. Enjoy automatic and continuous API discovery that gives you comprehensive visibility into all APIs, sensitive data flows, and risk posture – even as your environment changes. - Stop Data Exfiltration: Detect and block all known and unknown API attacks, including internal and external API attacks, the OWASP web and API top 10, business logic abuse attacks, API abuse, API fraud, and sensitive data exfiltration. - Threat Hunting: Ensure you are ahead of attackers by searching through the transaction data lake for potential threats. Immediately discover the signs of reconnaissance and take action before the full attack.