| Name | Title | Contact Details |
|---|
SSH Communications Security is the market leader in developing advanced security solutions that enable, monitor and manage encrypted networks. In 1995, the company’s founder, Tatu Ylönen, invented the Secure Shell protocol, which soon became the gold standard for data-in-transit security. Today Secure Shell is one of the most widely used protocols in the world and SSH Communications Security has grown to serve over 3,000 customers around the globe. Throughout our history, we have developed leading edge security solutions that enable organizations to protect against a rapidly growing threat landscape that includes both internal and external actors. Our platform based approach to Secure Shell deployment and management provides the only solution on the market that addresses the need for security, compliance and operational efficiency in today’s complex enterprise environments. Specialties
Vercom Software is a Dallas, TX-based company in the Software and Internet sector.
37 Signals is a Chicago, IL-based company in the Software and Internet sector.
Nitro PDF Software is a San Francisco, CA-based company in the Software & Internet sector.
NICE Systems (NASDAQ: NICE), is the worldwide leader of intent-based solutions that capture and analyze interactions and transactions, realize intent, and extract and leverage insights to deliver impact in real time. Driven by cross-channel and multi-sensor analytics, NICE solutions enable organizations to improve business performance, increase operational efficiency, prevent financial crime, ensure compliance, and enhance safety and security. NICE serves over 25,000 organizations in the enterprise and security sectors, representing a variety of sizes and industries in more than 150 countries, and including over 80 of the Fortune 100 companies. NICE’s offerings for the enterprise and security sectors serve three main needs: improving business performance, decreasing financial risk, and enhancing safety and security. NICE solutions capture interactions, transactions and video surveillance from multiple sources, including telephones, CCTV video feed, emergency services radio communications, emails, chat, social media, and more. They provide valuable insight about the business or security situation by applying real-time, cross-channel analytics to realize the intent of customers, criminals and terrorists, or fraudsters, to enable proactive response for real-time impact.