Name | Title | Contact Details |
---|
Caserta is a New York-based strategic consulting and innovation technology implementation firm.
Source 44 Consulting is a Markham, ON-based company in the Computers & Electronics sector.
CloudPassage® Halo® is the world`s leading security and compliance automation platform that provides instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds. The Halo platform is a SaaS-based solution delivered as a metered service so it deploys in minutes, scales dynamically and you only pay for what you use. Halo is unique in that it shifts analytics processing from servers into the cloud, so it uses minimal resources on protected systems. This allows layered security to be deployed at every workload--servers, virtual machines, cloud instances and containers. The Halo platform offers a broad range of functions, so you can eliminate the management of numerous single-function point solutions. CloudPassage Halo solves these key security challenges: Workload Security, Automated Compliance, Security at DevOps Speed.
ThreatQuotient`s mission is to improve the efficiency and effectiveness of security operations through a threat-centric platform. By integrating an organization`s existing processes and technologies into a single security architecture, ThreatQuotient accelerates and simplifies investigations and collaboration within and across teams and tools. Through automation, prioritization and visualization, ThreatQuotient`s solutions reduce noise and highlight top priority threats to provide greater focus and decision support for limited resources. ThreatQuotient is headquartered in Northern Virginia with international operations based out of Europe and APAC.
Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks. Zimperium is the first and only company to provide a complete mobile security system that continuously runs on the device to provide visibility, security and management for iOS and Android devices. With its non-intrusive approach, users can be confident that their data and their privacy are protected at all times, both on and off the corporate network. Finally, a mobile security system that solves the unique challenges of securing a mobile device without draining the battery or relying on an Internet connection.