CTOs on the Move

Zentry Security

www.zentrysecurity.com

 
Founded in 2019, Zentry Security provides streamlined, secure, zero-trust application access for small-to-medium enterprises with dispersed and remote workforces. Zentry Trusted Access delivers zero trust secure access from any device to any application or resource -- on-premises or in the cloud -- using simple adaptive policies for complete visibility and control. Organizations realize faster access, reduced attack surface, better compliance, and greater visibility into users and applications.
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details

Similar Companies

Server Centric Consulting

Server Centric Consulting is a Saint Louis, MO-based company in the Computers and Electronics sector.

USTAS Technologies

USTAS Technologies is a Rockville, MD-based company in the Computers and Electronics sector.

ConcertAI

ConcertAI is the leader in Real-World Evidence (RWE) and AI technology solutions for life sciences and healthcare. Our mission is to accelerate insights and outcomes for patients through leading real-world data, AI technologies, and scientific expertise in partnership with the leading biomedical innovators, healthcare providers, and medical societies.

A-TEK

A-TEK is a recognized leader in providing secure science and technology solutions for the federal government. Our scientists, analysts and information technology experts support healthcare, research, national security and defense missions worldwide. A-TEK bridges the gap between science and information technology by fostering collaboration between science and technology domain experts. Our collaborative approach enables the evaluation, integration and management of innovations such as the cloud, open source software frameworks and cyber incident detection and recovery technologies.

RiskRecon

RiskRecon enables you to control third-party risk by providing vendor security assessments that are comprehensive, actionable and available on demand. We can evaluate the security program of any organization -- SaaS, outsourcer or an in-house provider.