| Name | Title | Contact Details |
|---|
Since 1998, Lucas Systems has pioneered warehouse productivity solutions for mobile workers and distribution center managers. Customers like Cardinal Health, the Container Store, C&S Wholesale Grocers, HD Supply, Office Depot OfficeMax, Mondelez, Kraft and Rust-Oleum trust Lucas to deliver solutions that greatly improve worker productivity and accuracy because Lucas truly understands warehouse operations. Lucas Mobile Work Execution solutions optimize hands-on processes and seamlessly combine voice, barcode scanning, and other mobile technologies to improve worker productivity, eliminate errors, and boost end-to-end DC efficiency. The solutions also provide managers and supervisors with real-time reporting and management tools that help them better manage their operations.
CLM Group is a Portland, OR-based company in the Software and Internet sector.
Projjex Software Corporation is a Victoria, BC-based company in the Software & Internet sector.
Einstein Industries is one of the leading companies in Software & Internet industry. Einstein Industries is based in San Diego, CA. You can find more information on Einstein Industries at www.einsteinindustries.com
Courion is the market leader in identity and access governance and administration (IGA), from provisioning to governance to identity analytics and intelligence (IAI). In 2015, Courion acquired Core Security to form the only company that can continuously and comprehensively monitor both infrastructure vulnerability and access risk. Core Security provides the industry`s first comprehensive attack intelligence platform offering advanced analytics to prioritize, validate and seek to eliminate security threats. Many of the world’s largest enterprises and organizations rely on Courion’s solutions to confidently provide an access governance process that ensures compliance to thousands of employees while protecting critical company data and assets from unauthorized access. Now with the addition of Core Security’s solutions, these same enterprises and security professionals can focus on the most likely threats to their business by modeling, simulating and testing the actions of an actual attacker.