| Name | Title | Contact Details |
|---|
We like to think of ourselves as advisors first and technology providers second. We only succeed when our clients succeed, and that`s why our driving force, every day, is to help you find the best way forward. We bring our knowledge, passion, and experience to transform the way that you do business and deliver lasting results.
JPS Computer Services is a Hawthorne, NJ-based company in the Computers and Electronics sector.
Kotori Technologies is a Goose Creek, SC-based company in the Computers and Electronics sector.
SuccessKPI is a pure SaaS analytics platform for any contact center platform and text analytics. Using this rich BI tool, users can improve business outcomes through the Artificial Intelligence driven Playbook Builder. Customers can get started in minutes and transform performance with actionable analytics.
Founded in 2014 by the industry`s top cybersecurity experts, Binary Defense is on a mission to change the security industry for the better and help organizations defend against threats of all kinds. We believe that the best defense against cyber threats uses a human-driven, technology-assisted approach. We protect businesses of all sizes through our advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence. Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. The founder of Binary Defense, David Kennedy, also founded TrustedSec which specializes in information security services including penetration testing. The cutting edge, white hat hackers noticed almost every organization with monitoring capabilities really struggled, especially when using an MSSP. Countless attacks went undetected, and breaches were missed which left companies wondering what to do. As a result, Binary Defense was first put into motion in July of 2012 with the development of our Managed Detection, Deception and Response software (Binary Defense Vision) based on profiling how attackers think. A number of years of development, marrying up attack intelligence with our extensive threat intelligence, has made our product the best consolidation of technologies in the industry to predict, prevent, detect, deceive and respond to attacks.