| Name | Title | Contact Details |
|---|
Intrinsic Technologies is a Lisle, IL-based company in the Computers & Electronics sector.
Founded in 1998, AspireHR is a woman owned* US-based SAP HR and SAP SuccessFactors Gold Partner, working with HR organizations across North America to successfully implement best-in-class HXM (Human Experience Management) solutions. AspireHR is a purpose driven company that provides a wide range of services and software solutions for both the implementation and maintenance of HXM systems. The AspireHR team has built an impressive roster of clients by combining a cost-effective implementation strategy, an innovative mix of HXM technologies and excellent customer service. AspireHR is headquartered in Dallas, TX.
For nearly 20 years, Exclaimer has been the recognized global market leader in on-premises and cloud-based email signature software and solutions for Microsoft 365 (formerly Office 365), Microsoft Exchange, and G Suite. Headquartered just outside of London and with regional offices worldwide, its products are used by over 75 million users in 150+ countries with some companies holding licenses for over 300,000 users.
14 East Multimedia Group is a Fort Lauderdale, FL-based company in the Computers and Electronics sector.
At Redpoint Cybersecurity, we are constantly interfacing with our affiliates and our customers, who range from individuals across over a dozen industries (including Architecture, Construction, Engineering, Financial Services, Legal, Manufacturing, Private Client Services, and Real Estate) to privately-held companies and government agencies at the state and local levels, in order to better understand their operational and technical risks and to help them optimize their security protocols and practices. Redpoint applies well-established information security methodologies and frameworks, including the CIS Top 20 Critical Controls and the NIST Cybersecurity Framework. 100% of our penetration testers (ethical hackers) are OSCP-certified and possess deep, domain-specific expertise, including network security testing, wireless security testing, web application testing, and mobile device security assessments. In addition to understanding technical hacking techniques, which enables us to approach your company`s environment as an attacker would, we have in-depth experience with the major security frameworks and the development of cyber regulations.