| Name | Title | Contact Details |
|---|
TRMI Systems Integration is a Accord, NY-based company in the Computers and Electronics sector.
AgileBlue Cerulean is an AI-based SOC|SOAR platform that uses the power of AI to make cybersecurity more responsive and adaptive. Our AI technology accelerates detection and increases the speed of response, while at the same time providing human touch. Our AI-driven platform provides the perfect combination of automation and people, allowing us to mitigate your cyber risk by moving quickly and confidently.
CollabraLink is a fast growing 8(a)/SDB certified technology consultancy. Founded in 2003 by IT industry veterans, the firm earned immediate success by delivering exponential ROI on a multimillion-dollar engagement at a Fortune 100 global technology company. Repeated successes followed, with the firm often salvaging projects begun by its largest competitors. CollabraLink clients include some of the largest organizations in the country including several Federal agencies such as US Army, Federal Aviation Administration, US Department of Treasury, US Department of Education, and many others. CollabraLink maintains a corporate office in Hinsdale, Illinois, as well as project offices near the National Capital Region in Fairfax, Virginia.
PacketViper provides unique Deception, Intelligence, and Defense capabilities to internal and external networks. Our advanced detection methods such as Virtual Minefields, Interactive Forensics Modules, and unique geo-targeting together eliminate an upwards of 70% of the traffic volume with surgical precision and ease. DECEPTION At PacketViper, we wanted to bring something new to the table other than simple country blocking or the same third-party sourced intelligence. Our solution provides nimble deception capabilities for perimeters/interiors that are self-sustaining and reacting intelligence eco-systems capable of attracting, confusing, and detecting attackers while adjusting its defense posture in real-time. DEFENSE Our patented defensive capability provides unique geo-targeting that reduces logging and alerting without creating more false positives far beyond all geo capable solutions on the market today. Proper geo-targeting requires more than just blocking a country, network port, or static lists obtained from third-party sources. Our strategy includes your own threat intelligence gained using deception, sensors, and reactive geo-intelligent zones in real-time. INTELLIGENCE Our unique intelligence capabilities are not seen in a single solution together. We turn the "actionable" reporting into "applied" real-time intelligence. PacketViper comes with a point and click customizable dashboard, interactive real-time logging, NetCheck, country, and company traffic managers. Quickly recall, alert, schedule, and store data using our interactive Advanced Analytics, analyzers, and traffic summary modules. PacketViper not only eliminates the millions of known bad IP addresses sourced from third parties but also brings awareness to the customer of what IP address is trying to access their network. Our solution provides actual geo-targeting while deceiving, detecting, and reacting to the other unknown hundreds of millions of new threats coming.
Advanced Cyber Security is a pioneer in endpoint security, with patented, proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement. Its products provide a first line of defense to a companys layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Securitys Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments. Advanced Cyber Securitys EndpointLock product, which will be integrated into McAfee ePolicy Orchestrator, provides important desktop protection features. The keystroke encryption feature encrypts every keystroke at the point of origin to mitigate the risk of undetected keylogging malware from stealing corporate credentials and sensitive data. An anti-screen scraping technology prevents software from taking screen shots of a users desktop, and the kernel compromise feature monitors the operating system kernel to prevent compromises.