| Name | Title | Contact Details |
|---|---|---|
Keith Bussey |
Chief Technology and Information Officer | Profile |
Chenega Advanced Solutions and Engineering - CASE is a Norfolk, VA-based company in the Computers and Electronics sector.
Protegrity protects the world`s most sensitive data wherever it resides. Our industry-leading solutions allow businesses to finally tap into the value of their data and accelerate digital transformation timelines – without jeopardizing individuals` fundamental right to privacy. For more than 20 years, Protegrity has delivered innovative, data-centric protection for the most sensitive data of the largest brands on the planet. We free businesses from the constraints associated with accessing and leveraging data to create better customer experiences, make intelligence-supported decisions, and fuel innovation. Data knows no boundaries and Protegrity`s technology is built for data ubiquity. Protegrity is headquartered in Salt Lake City, Utah.
Talos Technology Consulting, Inc. is a Herndon, VA-based company in the Computers and Electronics sector.
"DataSpring offers 1-stop research solutions to ensure that market researchers around the world succeed. We provide Global Sample coverage in over 35 countries, Full Service, and a proprietary Process Automation Tool. With our 24/7 operations hub in Manila, we’re uniquely able to manage projects around the clock and support our clients with each step of the research process. "
Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm with leading expertise financial services, pharmaceutical, nuclear, energy, and healthcare. Lynx security professionals have a unique mix of business, risk, and technology skills. Our consultants are experienced in the selection, design and implementation of multiple security technologies. We provide extensive risk management, security and compliance solutions, including: risk-based security consulting, risk assessments, compliance programs, penetration testing, social engineering, policy development, feasibility studies, product selection, rules and policy development, network re-engineering, installation and configuration, report and analysis temple development, post implementation security testing, and performance tuning. We serve enterprises looking to re-engineer your infrastructure, deploy a key management framework or simply `harden` existing systems we have the skills to assist you.