HR Execs on the Move

Intrafinity

www.intrafinity.com

 
Intrafinity Inc. is a Toronto, ON-based company in the Computers & Electronics sector.
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details

Similar Companies

TC Delivers

TC Delivers is a Jacksonville, FL-based company in the Computers and Electronics sector.

Axiom Solutions

Axiom Solutions is a Okemos, MI-based company in the Computers and Electronics sector.

BusinessSKILLS

BusinessSKILLS is a Overland Park, KS-based company in the Computers and Electronics sector.

eStruxture

eStruxture is the largest Canadian-owned cloud and carrier-neutral data center provider. Our solutions are designed with the capacity, performance and flexibility to run modern, demanding enterprise applications, and the control to rapidly scale in response to unpredictable changes in business processes. Headquartered in Montréal, eStruxture provides access to an ecosystem of over 900 customers that trust and depend on our mission-critical infrastructure and customer-centric support, including carriers, cloud providers, media, content, financial services and enterprise customers. eStruxture offers colocation, private cloud, managed services, bandwidth, and security and support services to customers of all sizes.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.