Developer of a software-as-a-service security posture management platform designed for security teams to gain deep visibility and control over all business-critical applications. The company's platform provides vulnerability management services with continuous, automated technology and security teams to control threat prevention, detection, and response and covers misconfiguration management, SaaS-to-SaaS access and discovery, identity and access governance, enabling organizations to maintain a clean, safe, and efficient application environment.
NTT Data Group Corp Formerly NTT Data Corp provides IT services to a wide range of business fields. The company's operations are divided into three segments: global, public and social infrastructure; enterprise and solutions; and financial. Each segment contributes approximately an even proportion of the company's revenue. The services the company provides include system integration by constructing systems tailored to individual customer needs, multiple Internet and computer network-based information and processing services, consulting that evaluates customers' management issues, system support for large-scale systems, and new IT-based business models. The company ismore
Developer of project and team management software intended for client services organizations. The company's software offers work management, helpdesk, sales, customer relationship management (CRM) and content collaborative workspace solutions that integrate with various tools, enabling clients to manage their daily workflows for improved automation, productivity and profitability.
Developer of an artificial-enhanced, low-code security automation platform designed to support alert fatigue, vendor proliferation, and chronic staffing shortages. The company's platform addresses all security operations (SecOps) needs, including prioritizing alerts, unifying security operations in and beyond the SOC (Security Operations Center) into a single system of record, enabling businesses to overcome process and data fatigue to quantify business value, orchestrating tools and automating the remediation of threats and allow continuous compliance via a low-code security