Name | Title | Contact Details |
---|
Avaleris Inc. is a Ottawa, ON-based company in the Computers & Electronics sector.
Tenable Network Security, Inc. is a Columbia, MD-based company in the Computers & Electronics sector.
Pica8 is the industry`s open networking software alternative to Cisco for the enterprise. Pica8`s AmpCon Controller for centralized management and automation and PicOS Software Switches for networking and security have successfully replaced Cisco DNA Center and Catalyst Switches for campus and access networks within Fortune 500 enterprises. Pica8 software is deployed at over 1,000 customers in over 40 countries.
Blue Cedar Networks was founded on the principle that the app is the optimal control endpoint for the modern organization. The Atlas platform provides our customers with the most secure, scalable, and user-friendly capabilities to safely and seamlessly connect and protect their enterprise apps across the extended enterprise — the user population comprised of employees and non-employees that can drive or derive value from those apps and data. Blue Cedar Networks has over 150 customers spanning every major industry vertical, including some of the largest financial services, wireless and telecommunications, CPG, manufacturing, healthcare, and government organizations in the world.
Virsec revolutionizes cyber security by detecting and remediating previously “indefensible” advanced memory-based attacks on critical applications and server endpoints. Using patented, non-signature based technology, Virsec is able to protect applications “full-stack” — from the memory to web layer — without generating false positives, a huge win for security teams drowning in bells and alarms or using needle in a haystack approaches. Our deterministic Trusted Execution™ approach provides runtime application visibility and protection at the CPU-level and in memory to ensure real-time detection and remediation in microseconds. Virsec is unique in its ability to detect file-less, memory corruption and even ROP chain attacks on server endpoints, as well as protecting web applications against web application attacks in one unified platform. This unprecedented level of cyber security breadth and depth enables enterprises to release applications faster and achieve advanced hacking protection, with full assurance of protection against zero-day or unidentified vulnerabilities.