| Name | Title | Contact Details |
|---|---|---|
Kingsley Blatter |
Chief of Staff | Profile |
Bradley Evans |
Director of People | Profile |
Jeremiah Lowin |
Founder and Chief Executive Officer | Profile |
Paradigm Systems Inc is a Yorktown, VA-based company in the Software and Internet sector.
Stratis Technologies is a Louisville, KY-based company in the Software and Internet sector.
Mattermost is an open source platform for secure collaboration across the entire software development lifecycle. Hundreds of thousands of developers around the globe trust Mattermost to increase their productivity by bringing together team communication, task and project management, and workflow orchestration into a unified platform for agile software development. Founded in 2016, Mattermost`s open source platform powers over 800,000 workspaces worldwide with the support of over 4,000 contributors from across the developer community. The company serves over 900 customers, including European Parliament, NASA, Nasdaq, Samsung, SAP, United States Air Force and Wealthfront, and is backed by world-class investors including Battery Ventures, Redpoint, S28 Capital, YC Continuity.
Solid Systems, Inc. is a Houston, TX-based company in the Software & Internet sector.
Meet the Industry`s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. - API Risk Posture Management: Tackle API Sprawl, head on. Instantly know where you are exposed. Enjoy automatic and continuous API discovery that gives you comprehensive visibility into all APIs, sensitive data flows, and risk posture – even as your environment changes. - Stop Data Exfiltration: Detect and block all known and unknown API attacks, including internal and external API attacks, the OWASP web and API top 10, business logic abuse attacks, API abuse, API fraud, and sensitive data exfiltration. - Threat Hunting: Ensure you are ahead of attackers by searching through the transaction data lake for potential threats. Immediately discover the signs of reconnaissance and take action before the full attack.