CTOs on the Move

ZeroEyes

www.zeroeyes.com

 
ZeroEyes delivers a proactive, human-verified A.I. gun detection software solution that integrates into existing security cameras and mitigates mass shootings and gun-related violence by reducing response times, providing actionable intelligence with images and delivering clarity among chaos – ultimately saving lives. ZeroEyes` patented solution has been recognized by the U.S. Department of Homeland Security (DHS) as a promising anti-terrorism technology and is the first video analytics technology to receive SAFETY Act DT&E Designation. Founded by Navy SEALs and Special Operations military veterans, ZeroEyes delivers accurate and real-time actionable intelligence about the brandishing of a gun near or in an occupied area ...
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million
  • www.zeroeyes.com
  • 555 East North Lane Building C, Suite 5050
    Conshohocken, PA USA 19428
  • Phone: 267.435.8073

Executives

Name Title Contact Details

Similar Companies

CTI Technology

Since 2004, CTI Technology has become a trusted IT advisor in the Chicagoland area. We assist businesses with the planning/setup for their IT infrastructure.

traffk

Traffk is focused on re-engineering the basic building blocks of insurance, beginning with underwriting. Traffk provides alternative insurance data that boost predictive accuracy in modeling and actuarial development, underwriting, and internal inter-d...

BetterHelp

BetterHelp is an online portal that provides direct-to-consumer access to behavioral health services.

Finjan Holdings

Through our subsidiary, Finjan, Inc., the Company owns a portfolio of patents, related to software that proactively detects malicious code and thereby protects end users from identity and data theft, spyware, malware, phishing, trojans and other online threats. Finjan`s mission is to invest in innovation and encourage the development of core intellectual property. Founded in 1997, Finjan developed and patented technology that is capable of detecting previously unknown and emerging threats on a real-time, behavior-based basis, in contrast to signature-based methods of intercepting only known threats to computers, which were standard in the online security industry during the 1990`s.

Cycle Computing

Cycle Computing is the leader in Utility Supercomputing software.