CTOs on the Move

Wavefront

www.wavefront.com

 
Wavefront is a cloud-based, next-generation solution for managing data centers. The product concept is based on a “big data” approach invented at Google and refined at Twitter that involves real-time processing of high-frequency system measurements. Using Wavefront, engineers from IT, technical operations, application development, and security/compliance teams can ask almost any question of their systems and receive answers in real-time.
  • Number of Employees: 100-250
  • Annual Revenue: $0-1 Million

Executives

Name Title Contact Details

Funding

Wavefront raised $11.5M on 02/16/2016
Wavefront raised $52M on 10/25/2016

Similar Companies

ASA International

ASA International is a Framingham, MA-based company in the Software and Internet sector.

JW Player

JW Player is the New York-based startup that pioneered video on the web and is now innovating for the future. Started in 2008 as the world`s first open source video player, today the company`s customers span the globe across 193 countries and range from Fortune 500 companies to individual bloggers. The company`s flagship product, JW Player, is live on more than 2 million sites with 17 billion video streams to a billion monthly unique viewers across all devices — phones, tablets, and desktops. Nearly five percent of all video streams worldwide are delivered through JW Player. In addition to the player, the company`s services include video hosting and streaming, advertising, and analytics.

Magna Computer Corp

Magna Computer Corp is a Orlando, FL-based company in the Software and Internet sector.

Zinio Systems

Zinio Systems is a San Francisco, CA-based company in the Software and Internet sector.

Damballa

Damballa offers the leading advanced threat protection solutions for identifying criminal actors in enterprise networks and malware-infected subscribers in carrier networks. Damballa was founded in 2006 by security researchers at Georgia Tech, who anticipated that anti-virus, blacklists and signature-based approaches to security would become marginalized and could never serve as the end-all for protecting computing devices and corporate networks.