| Name | Title | Contact Details |
|---|
Trace3, a pioneer in business transformation solutions, empowers organizations to lead their market space by keeping pace with the rapid changes in IT innovations ensuring relevance to specific business initiatives required to maximize revenue generation by leveraging the latest Silicon Valley, cloud, big data and datacenter technologies maximizing organizational health. We have a unique ability to deliver optimal solutions combined with our talented team and over 10 years of documented best practices that unify people, process and technology. Over 2,000 globally recognized companies trust in Trace3 to stay relevant and innovative in todays highly competitive market.
Coalfire is the cybersecurity advisor that helps private and public sector organizations avert threats, close gaps, and effectively manage risk. By providing independent and tailored advice, assessments, technical testing, and cyber engineering services, we help clients develop scalable programs that improve their security posture, achieve their business objectives, and fuel their continued success. Coalfire has been a cybersecurity thought leader for more than 20 years and has offices throughout the United States and Europe.
Five 9 Group is a Fairfax, VA-based company in the Computers and Electronics sector.
Advanced Cyber Security is a pioneer in endpoint security, with patented, proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement. Its products provide a first line of defense to a companys layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Securitys Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments. Advanced Cyber Securitys EndpointLock product, which will be integrated into McAfee ePolicy Orchestrator, provides important desktop protection features. The keystroke encryption feature encrypts every keystroke at the point of origin to mitigate the risk of undetected keylogging malware from stealing corporate credentials and sensitive data. An anti-screen scraping technology prevents software from taking screen shots of a users desktop, and the kernel compromise feature monitors the operating system kernel to prevent compromises.