Name | Title | Contact Details |
---|
Coreopsys Software Labs is a Atlanta, GA-based company in the Software and Internet sector.
Kerio Solutions is a Irvine, CA-based company in the Software and Internet sector.
Achieve Technologies is a Piscataway, NJ-based company in the Software and Internet sector.
For more than 25 years, Navis has provided the global technology standard for managing the movement of cargo through terminals. Navis` mission is to deliver solutions that unlock operational efficiencies, productivity and visibility for terminal operators. Navis combines industry best practices with innovative technology and world-class services that enable marine terminal operators worldwide to optimize their operations and maximize performance with reduced risk. Whether tracking cargo through a port, automating equipment or process operations, or managing multiple terminals through an integrated, centralized solution, Navis provides a holistic approach to operational optimization. As a result, Navis customers experience improved visibility, velocity and measurable business results.
Courion is the market leader in identity and access governance and administration (IGA), from provisioning to governance to identity analytics and intelligence (IAI). In 2015, Courion acquired Core Security to form the only company that can continuously and comprehensively monitor both infrastructure vulnerability and access risk. Core Security provides the industry`s first comprehensive attack intelligence platform offering advanced analytics to prioritize, validate and seek to eliminate security threats. Many of the world’s largest enterprises and organizations rely on Courion’s solutions to confidently provide an access governance process that ensures compliance to thousands of employees while protecting critical company data and assets from unauthorized access. Now with the addition of Core Security’s solutions, these same enterprises and security professionals can focus on the most likely threats to their business by modeling, simulating and testing the actions of an actual attacker.