Name | Title | Contact Details |
---|
White Tuque`s mission is to give companies a trusted partner and a framework of best practices for cyber defence. Now, SMBs have access to a battle-tested and crisis-proven team of Canada`s leading cyber-security experts. White Tuque has made this level of protection affordable by condensing simple and repeatable tactics into a digestible and scalable format for organizations. These tactics are the backbone of what is currently protecting the financial industry, the gaming industry, and even The Department of Defence... And now, they`re available to any business.
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide, including over half of the Fortune 100. Our customers range from small businesses to the world`s largest financial institutions, intelligence agencies, and critical infrastructure companies.
Startup recently pioneering evolutionary AI for COVID-19 predictive modeling, analytics and large-scale logistics for front-line workers and healthcare staff.
Solution Technology is a Indianapolis, IN-based company in the Computers and Electronics sector.
Welcome to the Meta Layer. Nillion is a public network based on the invention of a novel cryptographic primitive, Nil Message Compute (NMC), which represents a generational leap in decentralized technology and Secure Multi Party Computation (SMPC). Its unique node operation has significant implications for data, security, privacy, and interoperability. In summary, Nillion: 1. Introduces a decentralized way to store and process private information 2. Renders traditional encryption obsolete 3. Enables the creation of a Meta Layer that supercharges and connects existing blockchains (e.g. decentralized secure enclaves, interoperability and more) 4. Enables significant new real world, decentralized applications 5. Is Post Quantum as it uses `encryptionless` technology called Information Theoretic Security.