| Name | Title | Contact Details |
|---|
Princeton Identity is the identity management company that makes security more convenient, accurate and reliable than ever before. Using iris recognition and other biometric technology, Princeton Identity enables businesses, global organizations and borders to simplify identity management, resulting in improved safety and protection.
Avaya Government Solutions is a Fairfax, VA-based company in the Computers and Electronics sector.
Applied Computing Technologies is a Springfield, VA-based company in the Computers and Electronics sector.
OPĀQ Networks breaks the traditional security mold with its cloud-based service that empowers organizations to simplify, centralize, and secure their networks. OPĀQ Networks’ management platform integrates networking and security in a way that reduces complexity and costs, tightens security control, and establishes a truly agile infrastructure that allows organizations to more easily keep ahead of emerging threats and instantly adapt to business and regulatory requirements. Based in Northern Virginia,OPĀQ Networks is a privately held company that has earned the trust of reputable brands.
Virsec revolutionizes cyber security by detecting and remediating previously “indefensible” advanced memory-based attacks on critical applications and server endpoints. Using patented, non-signature based technology, Virsec is able to protect applications “full-stack” — from the memory to web layer — without generating false positives, a huge win for security teams drowning in bells and alarms or using needle in a haystack approaches. Our deterministic Trusted Execution™ approach provides runtime application visibility and protection at the CPU-level and in memory to ensure real-time detection and remediation in microseconds. Virsec is unique in its ability to detect file-less, memory corruption and even ROP chain attacks on server endpoints, as well as protecting web applications against web application attacks in one unified platform. This unprecedented level of cyber security breadth and depth enables enterprises to release applications faster and achieve advanced hacking protection, with full assurance of protection against zero-day or unidentified vulnerabilities.