Name | Title | Contact Details |
---|
eBay Enterprise solves your business challenges with technology, services, and a global ecosystem of digital commerce partners and developers. With an integrated portfolio of modular commerce solutions and services, you will drive new shoppers into your online and brick-and-mortar stores. Now you can engage with and sell more to today’s hyper-connected consumer. You will boost your delivery times and customer loyalty, and create meaningful interactions with your customers across their entire journey with your brand. The newly combined Enterprise and Innotrac business creates a great opportunity for retailers to leverage the expertise and capabilities of the market leader in Operations to drive customer experience.
iQurious is a Auburn, CA-based company in the Computers and Electronics sector.
CEBS is a Houston, TX-based company in the Computers and Electronics sector.
Wood Consulting Svc Inc is a Fulton, MD-based company in the Computers and Electronics sector.
At Redpoint Cybersecurity, we are constantly interfacing with our affiliates and our customers, who range from individuals across over a dozen industries (including Architecture, Construction, Engineering, Financial Services, Legal, Manufacturing, Private Client Services, and Real Estate) to privately-held companies and government agencies at the state and local levels, in order to better understand their operational and technical risks and to help them optimize their security protocols and practices. Redpoint applies well-established information security methodologies and frameworks, including the CIS Top 20 Critical Controls and the NIST Cybersecurity Framework. 100% of our penetration testers (ethical hackers) are OSCP-certified and possess deep, domain-specific expertise, including network security testing, wireless security testing, web application testing, and mobile device security assessments. In addition to understanding technical hacking techniques, which enables us to approach your company`s environment as an attacker would, we have in-depth experience with the major security frameworks and the development of cyber regulations.