Software installers in California (200 found)

Capture Technologies Inc., an independent VAR, sells and services a range of product areas such as access control, voice logging, dictation, embossing and identification systems. The company is a resource for clients spanning the financial, public safety, legal services and healthcare sectors.

Care Security Systems delivers high-level integrated security systems to a wide range of organisations throughout the nation, as well as international locations - including commercial development corporations, government and transportation agencies.

Emergency systems and communication equipment provide reliable communications and improve public safety on freeways, bridges, tunnels, parking lots, campuses, industrial complexes, and on remote roadways, parks, and recreational areas. We all know that the presence of mobile phone users is growing. Still, it is a proven fact that Emergency Call Systems are a more effective and reliable communication path in unforeseen road situations.

Centrify delivers Zero Trust Security through the power of Next-Gen Access. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access, without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized identity and access management solution that uniquely converges IDaaS, EMM and PAM.

Cepton Technologies, Inc. was founded in 2016 with the mission of developing industry-leading 3D sensing solutions for automotive, industrial and mapping applications. Cepton's patented Micro Motion Technology (MMT) delivers unrivaled performance and resolution at a low cost to enable advanced perception for smart machines.

Cequence Security is a venture-backed cybersecurity software company. Its mission is to transform application security by consolidating multiple security functions into an open, AI-powered software platform that protects customers’ APIs and web-based applications from automated bot attacks and vulnerability exploits.

Chronicle LLC is a company known to provide software solutions and network security services. Their solutions ensure enhanced cyber and data security for enterprises.

Panoptica offers a wide range of capabilities CISOs, DevOps, and Security teams need to protect their modern application stack using a single simplified solution. Panoptica is also an integration-ready solution. Besides seamlessly integrating with the CI/CD toolchains DevOps already use, it can be integrated with Cisco’s AppDynamics to achieve full-stack observability.

Civic Technologies allows people to control the use of their identity information by providing a secure identity platform. The company uses blockchain identity verification technology to secure and protect personal information transfer.

Clear Cloud Solutions is a full service Security Systems Integration and Electrical Contracting company based out of Southern California. They provide cutting-edge security systems design build, sales, and installation to the industrial, commercial, public, and federal sectors.

The Cloud Native Computing Foundation (CNCF) hosts critical components of the global technology infrastructure. CNCF brings together the world’s top developers, end users, and vendors and runs the largest open source developer conferences. Cloud native computing uses an open source software stack to deploy applications as micro-services, packaging each part into its own container, and dynamically orchestrating those containers for resource use.

CloudBlue is a SaaS company helping businesses transform themselves, whatever their position in the supply chain. Its managed marketplace platform takes the complexity out of distributing subscription-based solutions in the everything-as-a-service world. CloudBlue technology does the heavy lifting for all processes that make everything-as-a-service commerce a reality.

The massive shift to Hybrid Work is the single most profound trend in today's enterprise! Hybrid Access as a Service from Cloudbrink instantly transforms any home Internet or cellular connection to deliver business-grade in-office performance with a convergence of personal SD-WAN, high-performance ZTNA, and moving target defense security.

Cloudera is a globally renowned provider of enterprise security, data protection solutions and multi-function data analytics. Cloudera is building the industry's first enterprise data cloud – a modern data architecture, for a data-driven world. They offer Big Data, Cloud Computing, Machine Learning, Cloud, Analytics, Artificial Intelligence, Databases, Open Source, Data Science, Open Source, Data Warehouse and Engineering, and IoT solutions.

A global leader in AI-powered image and video analysis, Cogniac enables extraction of specific and actionable intelligence from visual data. Cogniac’s no-code, enterprise-class computer vision platform - implementing the latest in deep neural network technology under the hood - is deployed across a wide spectrum of industries and applications, to maximize performance of visual tasks.

Colfax's workstations, servers, storage, and cloud services power engineers and researchers at the forefront of innovation and discovery.

Collectors Universe, Inc. is the globally renowned company in the field of third-party grading and authentication services for high-value collectibles. They authenticate and grade collectible coins, trading cards, tickets, autographs and memorabilia.

Corelight is one of the most powerful network visibility solution for information security professionals. The company provide real-time data that organizations use to understand, detect, and prevent cyber attacks. Their cyber security solution is built on Zeek, the powerful and widely-used open source monitoring framework. They also provide Intrusion Detection, Cyber Security, Zeek, Network Security Monitoring, NSM, Network Traffic Analysis.

CyberCube delivers data-driven cyber analytics built specifically for the insurance industry. CyberCube is focused on solving the most difficult and important cyber risk challenges in insurance with world-class analytics. They provide Cyber Insurance, Cyber Security, Cyber Insurance Analytics, Insurance Analytics, Cyber Underwriting , and Cyber Risk Modeling services.

Cyera takes a data-centric approach to security, assessing the exposure to sensitive data, everywhere. Its DataGraph automatically and continuously learns from the environment, assessing threat surface, data access, and security controls across multiple dimensions of risk.

Dasera is a Data Security Posture Management (DSPM) platform providing automated security and governance controls for structured and unstructured data across cloud and on-prem environments. Uniquely, Dasera monitors data in use while offering continuous visibility and automated remediation, preventing data breaches across the entire data lifecycle.

DataGear is a provider and integrator of IP video surveillance systems. Their approach to integrating state-of-the-art camera systems is unique because they offer systems on both wireless and wired networks. Their integration methodology will not only save customers in hardware costs, but on installation and on-going maintenance costs as well. DataGear ensures proper network connectivity and power sources utilization for successful installation.

Demisto Enterprise offers the first and only comprehensive, Security Operations Platform to combine security orchestration, incident management and interactive investigation. Demisto’s orchestration engine automates security product tasks and weaves in the human analyst tasks and workflows. It's the first machine learning incident response platform that gets smarter with every analyst action.

Direct Protect Security & Surveillance provides state-of-the-art security systems for residential and commercial buildings. They also offer advanced technology video surveillance capabilities, burglary and fire system notifications, two-way voice technology and medical alert monitoring solutions.

As cyber risks evolve and become increasingly interconnected, traditional security measures remain static and compartmentalized. Discern Security's innovative platform empowers to visualize security configurations while facilitating dynamic, ongoing policy management across an arsenal of security tools.

Docker Inc. helps developers bring their ideas to life by conquering the complexity of app development. They simplify and accelerate workflows with an integrated development pipeline and application components. Actively used by millions of developers around the world, Docker Desktop and Docker Hub provide unmatched simplicity, agility and choice.

DriveScale creates cloud infrastructure composed on the fly from pools of heterogeneous, low-cost compute nodes, storage systems and network fabric. Called Composable Infrastructure, the DriveScale Composable Platform orchestrates highly available, high-performance infrastructure designed for data-intensive applications.

Durabook is the core brand of Twinhead International Corporation in Taiwan, a world-renowned manufacturer of rugged mobile solutions for 40 years. All Durabook devices are designed, manufactured and tested to the highest standards to ensure maximum quality and reliability. Committed to engineering and service excellence, Durabook products have been widely adopted by government and enterprise customers.

Elite Interactive Solutions (Elite ISI) uses remote guarding to help prevent active shooters, vandalism, theft and loitering with real time monitoring and priority response. Their trained specialists offer remote video surveillance and provide onsite forensic analysis of properties and a comprehensive assessment for reviewing.

Eravant designs and manufactures electronic components and sub-assemblies for millimetre wave applications in the aerospace, defense, communication, and automotive industries. Eravant's product offering focuses on the millimeter wave bands and range from standard catalog products to custom designed, application, performance, or function specific products.

Related White Papers

How To Overcome The Storage Challenges Of Adopting Surveillance AI

How To Get Buy-In From IT Departments On IP Video Installations

Wavestore And The Linux Advantage

Upcoming security events in United States of America (USA)