company? Let’s change
that.
Don't see your company?
Create a company profileAt Identillect Technologies, we create a user-friendly secure email solution to protect critical information, with an emphasis on simplicity. Our aim is to make high-performing products which are easy enough for anyone to use. Identillect’s Delivery Trust email security is the simplest, most cost-effective end-to-end email security solution on the market today. Specifically designed to help keep businesses current with regulatory compliance and maintaining business/client trust relationships. Delivery Trust offers users total control over emails throughout their entire lifecycle. Messages are secured with the click of a button and empower senders to maintain control of their messages by restricting recipients’ printing/forwarding/viewing privileges, as well as securing all replies from the recipients, without requiring them to register or belong to the same service.
Leading the way in Pittsburgh IT services, Ceeva is your premier managed service provider, specializing in IT support, cloud services, and cybersecurity solutions. Renowned as a top Pittsburgh MSP, we offer comprehensive managed IT and outsourced IT services, ensuring your business stays ahead in the digital world. Our focus on cybersecurity in Pittsburgh positions us uniquely to safeguard your data and IT infrastructure. With Ceeva, you gain access to unparalleled IT security, cloud solutions, and IT consulting services in Pittsburgh, tailored to meet the specific needs of your business. Our team of expert engineers is dedicated to providing exceptional IT support and computer solutions, making us the go-to Pittsburgh IT support company. Trust us to enhance your digital operations with our cutting-edge managed services and IT consulting expertise. Choose Ceeva for reliable, efficient, and secure IT services in Pittsburgh.
Experiencing a security incident? Contact us for immediate support and we will respond within 15-minutes to begin the containment and recovery process. https://www.entaracorp.com/report-an-urgent-cybersecurity-incident Entara sets the standard as the world’s first eXtended Service Provider (XSP) and delivers exceptional, security-first IT solutions for their clients, including managed IT and cybersecurity services, incident response services, and other professional services. Founded in 2001, the organization has evolved to provide the strategic vision, platforms, processes, and people to travel with their clients on the path to their best IT future. Entara has been repeatedly recognized by CRN on the MSP 500 list in the Security 100 category as well as on the MES Midmarket 100 list. The organization acts as a true partner to their clients and has also been included on MSSP Alert’s Top 250 MSSPs list and is in the top 50 MSPs listed in Channel Future’s MSP 501 award. As a core values focused organization, Entara has proudly been recognized on lists for both the Chicago and National Best and Brightest Companies to Work For. To learn more about how Entara can help you secure your future, please visit https://www.entaracorp.com/.
It’s our feeling that when people hire an IT services firm, they don’t want just another vendor to check boxes and connect wires; they want a partner who they can truly rely on to work in their best interest. We’ve spent almost 20 years supporting the day-to-day operations of our community, guiding their IT investments, and building long-lasting, win-win partnerships. Throughout this time, one thing has remained consistent: Client satisfaction always comes first. Without deeply satisfied clients, we simply wouldn’t exist as a company. In honor of that, we’ve designed our team and operations from the ground up to make you thrilled with our service. Consistent, fast, responsive, friendly, and honest, and knowledgeable support—that’s what you can expect in every interaction.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.
Idhasoft initiated operations in December 2006, and has emerged as a global business leader in new generation consulting and right technology deployment. An Information Technology and Services Company with operations in Middle East, India, Sri Lanka, Europe and USA, Idhasoft has been instrumental in helping companies attain their business goals by providing them with innovative end-to-end business solutions that cater to each company’s specialized industry-focused needs. We intricately understand the needs of our customers and understand that technology is never one-size-fits-all. Our services & solutions are empowered by our impeccable understanding of different industries and we focus on implementing technologies that best suit each company’s needs. We have customized available technologies to create rapidly deployable well-packaged solutions that exceed customer expectations and provide them a faster and better return on their investment. Some of our technology solutions include: SAP, Oracle, IBM Cognos, warehouse management solutions, supply chain consulting, staffing services, web hosting services, DBA 24*7, portal and content management, internet and wireless services. Some of the industries we have successfully catered to include: Wholesale distribution, consumer products (durable goods, food), life sciences (pharmaceuticals, medical health devices), high tech (electronic components, semiconductor, software and service providers), retail and supply chain, manufacturing, technology and media, healthcare, government, energy, banking and capital markets, and insurance
Phosphorus is the backbone platform to secure the growing enterprise extended IoT and OT landscape. We provide secure software updates and alerts for devices in the home and office. With Phosphorus, devices can be reliably patched and updated in a timely fashion with alerts for insecure configurations.
Thycotic prevents cyberattacks by securing passwords, protecting endpoints, and controlling application access. Thycotic is one of the world’s fastest-growing IT security companies because we provide customers with the freedom to choose cloud or on-premise software solutions that are the easiest to implement and use in the industry. Thycotic has grown to serve more than 12,500 customers.
WHO WE ARE Innovative Defense Technologies -IDT- provides automated software testing, data analysis, and cybersecurity solutions for the DOD's mission-critical systems. Using patented Automated Test and ReTest (ATRT) technology, we support the entire software testing lifecycle from component testing, to system integration and testing, to the analysis of results. Our automated test and analysis solutions enable the rapid update and delivery of large, complex systems. Our technologies offer: -Rapid system configuration assessment and validation -Repeatable, consistent testing, analysis and reporting -On-demand regression tests in response to cyber threats -Statistical rigor in test and analysis -Reduced time and manpower At IDT, we work closely with our customers to tailor our products to support their systems and meet their goals. IDT has the expertise, strategies and processes in place to provide an automated solution for your next project. Let us help you dramatically accelerate test execution time, expand test coverage and improve software quality. OUR MISSION Our mission is to enable new software capabilities to be fielded faster and more affordably by reducing the amount of time and the cost spent on software testing. Through the use of our software testing technology, IDT is changing the way testing is being done for large, complex, software systems.
Businesses have trusted Computerease with IT support, cybersecurity, and VoIP phone needs since 1984. Our mission to safeguard hardworking entrepreneurs from cyber threats enables them to concentrate on growing their companies. As your dedicated IT defender, we specialize in crafting solutions that align technology with your unique business needs. Our legacy exceeds 30 years of commitment, making Computerease the trusted choice for entrepreneurs seeking secure growth and success. Our rare trifecta of longevity in the computer industry, profound technical understanding, and keen business insight makes us a dependable partner. Our hands-on approach, inherited from decades of experience, reflects our dedication to offering effective, reliable, and secure business solutions from a technology perspective. Trust Computerease as your IT support and cyber security experts so you can focus on running a successful business.
California-based organizations hire Endsight to ensure that their technology systems operate effectively and align with their business goals. They rely on our award-winning helpdesk support, secure environment, and strategic guidance to thrive. From the help desk specialists to technical account managers, and project managers, Endsight's team collaborates to provide comprehensive IT support to small and mid-sized businesses. In the realm of cybersecurity, we help clients assess vulnerabilities, tailor and implement protection measures, train staff, and maintain effective practices
OUR STORY: Valeo Networks is a full-service, nationwide Managed Security Service Provider (MSSP) that serves State, County, Municipal (SCM) markets; small-to-medium businesses (SMBs); and non-profit organizations. With over 20 years of experience, Valeo Networks provides solutions in the areas of cybersecurity, compliance, cloud, network infrastructure, and managed IT services. Since the very beginning, we've remained committed to delivering the best possible service for our clients. As your trusted technology partner, it is our mission to design and develop solutions while proactively managing all technology services. WHAT WE DO: We recognize how complicated and potentially burdensome your technology can become without the right guidance. Partnering with the right IT provider can make all the difference for your company’s success. At Valeo Networks, we collaborate closely with each of our clients to deliver IT solutions that are in line with their business goals and make their lives easier. Each of our services is designed, developed, and fine-tuned to maximize efficiency and help foster your company’s growth. Valeo Networks combines the very best cloud, cybersecurity, IT managed services, and IT consulting to provide a true all-in-one IT solution for companies who seek to cut IT costs and leverage technology to grow revenues. Our services are designed for businesses looking to outsource more IT infrastructure and application management services to help reduce total cost of ownership and free up internal resources, as well as those seeking the skills and support to quickly complete complex IT projects, such as compliance. The Valeo Networks Difference: • 97% of the time we answer calls in under 5 seconds • 93% of support calls are resolved in under 20 minutes • Remote/onsite support by certified IT Technicians and Engineers • 24/7 U.S.-based network monitoring and support • Expertise across 15+ industries • Support plans are designed to reduce IT costs up to 20%
eSentire, Inc. is the Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations in 80+ countries, representing 35 industries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts, Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit http://www.esentire.com and follow https://twitter.com/eSentire.
Area 1’s mission is to stop phish - the root cause of 95% of cybersecurity incidents. Phishing enables rogue wire transfers, stolen customer data, and initial access into computer networks. We offer the cybersecurity industry’s only Pay-per-Phish solution: Pay only for the phish we catch, that your other defenses are missing. We also offer the only technology that comprehensively blocks phishing attacks across all threat vectors - email, web and network - before they can damage your business. Area 1 is trusted by more than 2000 leading enterprises across the financial services, healthcare, aviation, manufacturing, consumer goods, critical infrastructure and other industries. Want to stop phishing? Visit www.area1security.com, follow us on Twitter (@area1security), or subscribe to area1security.com/newsletter-phish-of-the-week.
The dynamic cyber world requires a enterprise-wide focus on a risk-based strategy, that recognizes stakeholder commitment and employs cybersecurity to elevate organizational value. We do not focus on spreadsheets or hard-to-understand work products. Netswitch’s approach is predicated on our ability to translate the technical and cyber threats into business and operational risk in a manner that is business and cost-justified and reported with data visualization “speaking” to your company's stakeholders. Netswitch has patented the CyberRisk Governance System. As companies advance in digital transformation among a growing number of regulatory compliance and data privacy laws they face a transformative period. Netswitch applies its 2+ decades of experience to help organizations navigate their cyber risk journey to elevate cognizance and increase their resilience in an increasingly complex environment. Netswitch provides intelligent risk assessments to help organizations make appropriate strategic decisions aligned with business objectives and resources Our extensive knowledge and established relationships within the security products community allow us to ensure the best solution for each recommendation and are consistent with the budgetary requirements of our clients. In addition, we provide a cost-benefit analysis for each recommendation that will align with provided Plans of Actions and Milestones (POA&Ms).
Enveil is a pioneering Privacy Enhancing Technology company protecting Data in Use. Enveil’s business-enabling and privacy-preserving capabilities change the paradigm of how and where organizations can leverage data to unlock value. Defining the transformative category of Privacy Enhancing Technologies (PETs), Enveil’s award-winning ZeroReveal® solutions for secure data usage, collaboration, and monetization protect data while it's being used or processed. Customers can extract insights, cross-match, search, and analyze data assets at scale without ever revealing the content of the search itself, compromising the security or ownership of the underlying data, or exposing their interests and intent. A World Economic Forum Technology Pioneer founded by U.S. Intelligence Community alumni, Enveil is deployed and operational today, revolutionizing data usage in the global marketplace.
MacPaw develops and distributes software for macOS and iOS that simplifies the lives of Mac users. Renowned for innovative and precision-engineered products, including CleanMyMac X, Setapp, ClearVPN, and the Unarchiver, and housing the Moonlock cybersecurity division, MacPaw is committed to elevating and securing the user experience within the Mac ecosystem. MacPaw’s focus on software technology, Human-Computer Interaction (HCI), Machine Learning (ML), and more, aims to seamlessly integrate research breakthroughs into practical MacPaw products. Founded in Kyiv, Ukraine, with a subsidiary office in Boston, MacPaw products have more than 30 million users worldwide, with one in every five Mac users having at least one app downloaded. Our values — to create experience, make impact, and stay human — influence MacPaw's creative, authentic, and caring team. They affect everything we do, from our products to the teams we build. We think big by focusing on essential. With us, you can take a lead and deliver the result that will make you proud. We value when people finish what they started and can measure the result. You have a chance to create an experience, not just a product. Macpawians always listen to our customers and respond to make their experience flawless and exciting. Through attention to detail, we make an extra effort to streamline it for our users, partners, and team members. Stay human... in any situation, even when it's tough. We care about each other and always see a person in our users. We build long-term relationships by creating technology for the benefit of humans. Play nice. Be frank and real!
Cat Digital is the digital and technology arm of Caterpillar Inc., responsible for bringing digital capabilities to our world-famous yellow iron. With over one million connected assets worldwide, our teams use data, technology, advanced analytics and AI capabilities to help our customers build a better world.
Nisos is The Managed Intelligence Company™. We provide actionable intelligence services to solve critical “who, what, why, how” questions, helping to address the Fortune 2000’s unique security challenges and digital business risks. Our team solves your most complex security challenges. We deliver smarter defense and more effective responses against advanced cyber attacks, disinformation, and abuse of digital platforms. Nisos supports our clients' internal efforts by taking an “outside the firewall” approach. By engaging an “adversarial mindset” – we can support and integrate with our clients' existing security team to attribute actions to adversaries and proactively or reactively help our clients leverage intelligence to make better-informed decisions, controls, and minimize negative impact on their business, brand, and people. We work with our clients' intelligence, fraud, cybersecurity, trust and safety teams – and existing tech stacks – to answer questions, address their specific risks, and inform critical decisions.
Convergint is a global systems integrator focused on delivering results for our customers through unparalleled service excellence. At Convergint, our top priority is service in every way — service to customers, colleagues, and community. As an integrator, Convergint works alongside a global network of partners and manufacturers to design, install, and service electronic security, cybersecurity, fire and life safety, building automation, and audio-visual systems for enterprise customers. Our unique and empowered culture, guided by our Values and Beliefs, helps us stay accountable to our mission, and our number one objective: to be our customers’ best service provider. Listed as the #1 systems integrator in SDM Magazine’s Top Systems Integrators Report for the past 5 years, Convergint leads with over 7,700 colleagues and more than 175 locations worldwide. Learn more about who we are and what we do at www.convergint.com.