Name | Title | Contact Details |
---|---|---|
Heath Crocker |
SVP, Information Security | Profile |
Wallace Sann |
Senior Vice President of Technical Operations | Profile |
AM LLC provides the federal government with mission-critical services in information, communications, and technology. Since 2012, AM has implemented best-practice communication, research, and information solutions in highly restricted and challenging operating environments around the globe for the Department of Defense and the Broadcasting Board of Governors as well as healthcare technology solutions here at home for the Department of Veterans Affairs. With an experienced team comprised of diverse backgrounds and skill sets, we are dedicated to working with our customers to develop and implement innovative strategies and solutions. AM partners with industry-leading companies to support contracts of various sizes. As a small business, we are employee-focused and utilize agile methodologies and processes to support our customers` unique requirements. We employ lean and efficient business operations to maximize delivery, resulting in lower cost and superior results.
Compliance Solutions International Inc. is a Buffalo Grove, IL-based company in the Computers and Electronics sector.
Toyota Information Technology Center, USA is a Mountain View, CA-based company in the Computers and Electronics sector.
At Xterra, we provide the leadership to make sure our clients’ infrastructure is not a barrier to success, but rather a significant competitive advantage. Xterra solutions fit your specific needs – from consulting to hardware, managed services or cloud infrastructure implementation services. Each helps transform your infrastructure from a cost center to a profit center – what a concept. Xterra specializes in networking, security, virtualization (server and desktop,) storage, and Microsoft products.
Your important data is always in motion, spreading to new people, applications, and devices that are outside traditional security controls. We protect data anywhere it goes in the extended enterprise. You can`t protect what you can`t see. We classify data by analyzing billions of events, not just patterns in the content, assembling a data lineage to identify and protect what other tools can`t.