CTOs on the Move

t2.world

www.t2.world

 
t²(time²) is a decentralized world for publishing and reading, a metaverse of narratives. On t², time serves as the currency and curates subculture. Users read to earn and read to contribute.
  • Number of Employees: 0-25
  • Annual Revenue: $0-1 Million

Executives

Name Title Contact Details

Similar Companies

FQX

FQX provides a secure, efficient and compliant infrastructure for electronic negotiable instruments (eNI™).

Gold Lasso

Gold Lasso is a Gaithersburg, MD-based company in the Software and Internet sector.

Valiant Solutions

Valiant Solutions is a cybersecurity provider offering a wide range of services to the Federal Government, including security engineering, governance and compliance, cloud security, intrusion detection, and incident response. They also offer other IT s...

TransactRx

TransactRx is a leading provider of billing and transaction processing solutions for physician offices, health departments, and any other healthcare provider that administers vaccines.

Xcitium

Xcitium is used by more than 3,000 organizational customers & partners around the globe. Founded with one simple goal – to put an end to cyber breaches, Xcitium`s patented `ZeroDwell Containment technology uses Kernel API Virtualization to isolate and remove threats like zero-day malware & ransomware before they cause any damage. ZeroDwell is the cornerstone of Xcitium`s endpoint suite which includes advanced endpoint protection (AEP), endpoint detection & response (EDR), and managed detection & response (MDR). Since inception, Xcitium has a zero breach track record when fully configured. “Every day, the AV-TEST Institute registers more than 450,000 new malicious malware strains and potentially unwanted applications, which enterprises must stay vigilant for. This creates alert fatigue within many organizations,” said Ken Levine - CEO of Xcitium. “ZeroDwell gives customers` peace of mind in knowing that any ransomware and other malware lurking undetected in their environment will remain dormant, resulting in zero breaches.”