| Name | Title | Contact Details |
|---|---|---|
Matt Tomlinson |
VP of Sales | Profile |
The Yappem user interface (UI) promotes easy navigation and use for all users. The Yappem website and App were designed around the philosophy that users desire a relevant, useful, simple, fun and rewarding experience. Yappem,™ Rewarded for Having A Voice; is a social media network out of Sheboygan, Wisconsin. Yappem has created a niche brand-centric online community of socially active users who share interesting and useful information about their brand experiences. A simple, and secure, tracking system rewards the interactions in the form of virtual Yappem Coins, which are redeemable for gift cards, deals and discounts
Unico is an IDTech company that simplifies the relationship between people and companies through digital identity solutions. Their solutions include Unico People, which allows for remote employee onboarding and electronic document signing, and Unico Ch...
Social media background screening is now possible using the human-in-the-loop AI powered solution from Ferretly. Get consistent, thorough and insightful social media reports on your candidates and employees to mitigate risk to your brand.
Enable client-side security with automated JavaScript scanning, monitoring, and controls to stop threats and protect customer data. Feroot believes that customers should be able to do business with any company online securely, without risk or compromise. Our mission is to secure client-side web applications so that our clients can deliver a flawless digital user experience to their customers. Businesses come to Feroot to enable proactive client-side security programs. Our data protection capabilities take the pain and ambiguity out of client-side security threat analysis, detection, response, and prevention. Our products help organizations uncover supply chain risks and protect their client-side attack surface.
Cigent keeps the most valuable asset on your network safe—your data. Our cybersecurity solutions are built by an elite team, with backgrounds in NSA-level intelligence, ethical hacking to help public and private entities protect themselves, and data storage, including development, erasure, and recovery. As a result, our solutions beat hackers at their own game, and keep your data safe.