| Name | Title | Contact Details |
|---|---|---|
Steve Matthews |
Vice President of Sales and Business Development | Profile |
Jayson Denney |
Director of Research and Development Operations | Profile |
Sarah Schupp |
Vice President of People, Culture, and Brand | Profile |
Voximplant versatile cloud platform enables business to bring interaction to a different level. The company provides innovative real-time communication tools with full control over voice, video and messaging.
Gene Security Network is a Redwood City, CA-based company in the Computers & Electronics sector.
Shared Assessments is a member-driven consortium of corporations, IT service providers and assessment firms, including the Big Four accounting firms. Shared Assessments mission is to offer rigorous standards for managing risk associated with security, privacy and business continuity controls in IT outsourcing relationships and provide its members with critical knowledge about trends in global outsourcing. We currently have companies representing a range of industries including financial services, retail and healthcare. Our members provide input to our tools - the AUP (Agreed Upon Procedures) and the SIG (Standard Information Gathering Questionnaire), which are used for evaluating vendor controls for IT security, privacy, business continuity, and other third party risks. These tools allow outsourcers, service providers and assessment firms to save time, resources and increase efficiencies in the assessment process and reduce the need for on-site assessments.
WESCO Net is a Grand Rapids, MI-based company in the Computers and Electronics sector.
Secure Channels Inc. is a new cyber-security firm that creates robust, and state-of-the-art patented encryption technologies that are compatible with every type of data available on the market. Secure Channels inc that has patented unique processes to harden encryption and envelop resources in such a way as to render the data virtually unbreakable given the current, as well as foreseeable future technology and timelines, thus providing security that is impenetrable and far in excess of any existing encryption systems available.