| Name | Title | Contact Details |
|---|
Merlin provides next-generation cybersecurity solutions that protect government and commercial organizations. Merlin offers a broad portfolio of products that secure the enterprise - from endpoints to networks, from governance to risk management, from infrastructure to information. Combining innovative products with deep industry experience and expertise, Merlin delivers the cybersecurity solutions organizations need to protect their most critical business assets while furthering their mission.
pulseData builds adaptive, predictive engines, based on machine learning, for Hospitals and Healthcare companies, to identify patients at risk of a bad, avoidable medical outcome.
Metropolis provides advanced call tracking and call reporting software solutions to businesses and the hospitality industry.
Unified Office, Inc. is a leading provider of SDN-based hybrid cloud managed Voice-over-IP (VoIP) and Unified Communications services to small and medium-sized businesses (SMBs). Unified Office`s Total Connect Now(SM) service architecture was purpose-built from the ground up to deliver the highest quality of experience and availability, leveraging the latest in extensible business VoIP communications technology and cloud-based infrastructure to enhance SMB workforce productivity. Their cloud-based intelligent network incorporates Unified Office`s unique adaptive Highest Quality Routing™ (HQR) for end-to-end service quality, and Business Continuity “shadowing” to ensure high availability operation over one or more redundant broadband links.
Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm with leading expertise financial services, pharmaceutical, nuclear, energy, and healthcare. Lynx security professionals have a unique mix of business, risk, and technology skills. Our consultants are experienced in the selection, design and implementation of multiple security technologies. We provide extensive risk management, security and compliance solutions, including: risk-based security consulting, risk assessments, compliance programs, penetration testing, social engineering, policy development, feasibility studies, product selection, rules and policy development, network re-engineering, installation and configuration, report and analysis temple development, post implementation security testing, and performance tuning. We serve enterprises looking to re-engineer your infrastructure, deploy a key management framework or simply `harden` existing systems we have the skills to assist you.