Name of Organization Begins With:
Tenet Healthcare Corporation is a diversified healthcare services company with more than 125,000 employees united around a common mission: to help people live happier, healthier lives. Through its subsidiaries, partnerships and joint ventures, including United Surgical Partners International (USPI), the company operates 80 general acute care hospitals, 18 short-stay surgical hospitals and over 400 outpatient centers in the United States, as well as nine facilities in the United Kingdom. Tenet’s Conifer Health Solutions subsidiary provides technology-enabled performance improvement and health management solutions to hospitals, health systems, integrated delivery networks (IDN), physician groups, self-insured organizations and health plans. Tenet also operates six health plans.
Thales e-Security is a leading global provider of information security providing data encryption solutions to the financial services, manufacturing, government and technology sectors. With a 40 year unrivalled track record of protecting corporate and government information, Thales solutions protect our customers most sensitive data and is used by four of the five largest energy and aerospace companies, government networks around the world, and secures more than 80 percent of the worldwide payment transactions. Thales e-Security has offices in Japan, Hong Kong, United Kingdom and the United States and is represented in over 90 countries around the world. For more information, visit www.thales-esecurity.com
ThousandEyes provides IT performance management for the cloud era. With the adoption of cloud applications, enterprises are becoming heavily reliant on networks outside of their control. This creates new challenges in troubleshooting performance issues, both inside and outside the corporate network. ThousandEyes provides detailed visibility beyond the corporate network perimeter, identifies the root cause of performance problems with cloud applications and enables distributed collaboration to resolve problems quickly.
Thrio is the industry-leading, modern one-stop AI powered complete cloud contact center suite. Our decades of cloud and contact center expertise allow Thrio to help organizations of all sizes lower operating costs, be more agile, and get to market faster. Businesses moving to or expanding cloud deployments can leverage Thrio’s secure, scalable, and reliable software for applications in sales, service, and compliant collections. Thrio helps organizations of all sizes create enriched customer experiences, improve agent productivity, deploy new capabilities faster, and update seamlessly and without interruption. For more information, visit www.thrio.com.
Toppan Merrill is the best in class partner for complex, secure communications that delivers premier technology driven solutions to more efficiently and accurately communicate mission critical content. Toppan Merrill is built on what today's clients demand and tomorrow's clients require— a responsive partnership, rooted in deep market expertise, modern agile solutions built around business needs, and a commitment to forward-thinking technology that ensures speed, precision, and accuracy.
Toppan Merrill BridgeTM (“Bridge”) is a seamless SaaS solution built on the Microsoft Office platform. Bridge is an intuitive technology that makes disclosure content management easier, faster and more accurate. Clients are able to generate precise EDGAR and XBRL submissions and other global regulatory filings automatically. Multi-user collaboration tools let entire work groups edit, comment, track changes and perfect content. Review tools, built-in analysis and validation reports provide quality control and XBRL structure, and clients are backed by Toppan Merrill’s 50 years of regulatory experience, coupled with the best XBRL-trained and certified consulting team in the industry.
With over two decades of expertise in Endpoint, Messaging and Web Security, Trend Micro provides individuals, and organizations of all sizes, with smarter security solutions that protect against a wide range of insidious threats and combined attacks including viruses, spam, phishing, spyware, botnets and other Web threats, such as data-stealing malware. Trend Micro develops, delivers, and supports proactive cloud-based solutions designed to safeguard critical information and protect personal and corporate reputations. As an industry leader in security intelligence, Trend Micro’s mission is to secure the exchange of digital information by providing the most flexible and customizable Internet Content Security solutions available.
Tresorit is a Swiss cloud encryption company offering a secure and user-friendly file sync & sharing service. Due to its revolutionary encryption technology, Tresorit provides a trustworthy cloud for businesses which matches the security of an on-premise file server combined with consumer-grade simplicity.
Tresorit’s built-in, zero knowledge end-to-end encryption protects user files from data breaches and any form of unauthorized access and enables organizations to work and collaborate safely in the cloud. It encrypts every file on the user’s device before they are uploaded to the cloud with unique, randomly generated encryption keys. The files are never sent to Tresorit’s servers in unencrypted format which guarantees that only the user, and those who the user decides to share it with, can access the content of the files.
Through its various security and control features, and with all data centers located in the EU, Tresorit helps businesses meet the strict requirements of GDPR for the cloud. Demonstrating its commitment to privacy and security, Tresorit received the prestigious Trusted Cloud Label 2.0 from the German Federal Ministry for Economic Affairs and Energy as one of the first file sync and sharing provider based on its compliance with a set of rigorous security and data privacy regulations.
Founded in 2011 and certified for ISO 27001:2013 in early 2018, Tresorit is now trusted by more than 25.000 customers globally, including leading enterprises both in Europe and North America. Learn more at www.tresorit.com
Trintech is the leading provider of financial software solutions for the Record-to-Report process. Over 800 clients in 100 countries – including half of the Fortune 50 and the FTSE 100 – rely on our solutions to optimize resources, reduce costs, manage risk and monitor activities across the entire finance organization worldwide. Trintech’s Cloud-based Cadency™ software automates the entire R2R cycle – including account reconciliation, close management, compliance, and financial reporting. Trintech’s offices are located in the United States, the United Kingdom, The Netherlands, Australia, France, Ireland and the Nordics, with partners in South Africa, Latin America and across the Asia Pacific region. www.trintech.com.
Tugboat Logic Inc.
The Tugboat Logic mission is to make security and compliance easier, engaging, and a business enabler for every enterprise. Our automation and intelligence provide insights that ready your organization to build trust with customers.
Tugboat Logic is for small to mid sized enterprises who have matured their business where risks are becoming greater but don’t know where to start or can’t afford a security professional. Tugboat Logic is a security management platform that helps companies be secure quickly and easily with self-direction, intelligence and automation.
Certification Competence Center
The TÜV AUSTRIA Deutschland GmbH (TAD) represents the offical Certification-Office of the TÜV AUSTRA GROUP concerning the certification of management-systems for IT-Security like ISO 27001 or CSA STAR. The TÜV AUSTRIA Group is an international group of companies with branches in more than 40 countries and with 1,400 employees worldwide. Services range from testing elevators and pressure equipment, plant safety, training & further education, medical devices, electric engineering, environmental protection, IT security, loss adjustment, certifications, calibrations, technical due diligence, legal compliance checks, and product testing through to the testing of stage and photovoltaic systems as well as wind turbines.
Universal Compute Xchange (UCX)
UCX has created an electronic spot exchange to help Enterprise Organizations and Cloud Service providers manage their financial IT Infrastructure risk exposure by trading the cloud as a commodity. UCX has created the first centralized, transparent exchange that brings both enterprise organizations and cloud service providers together to engage in price discovery, trade execution and the physical delivery of compute resources using one standard unit of measure, providing “apples to apple” comparisons, operational agility, market and capital efficiencies.
Unqork is the Fulfillment Platform for Insurance and Financial Services™. Our patent-pending, SaaS platform, streamlines product sales process to improve customer experience. We work with insurance carriers and finance institutions to help them reduce client acquisition and onboarding time while increasing sales. We offer a no-code, drag-and-drop product designer, an exceptional e-App experience, paper digitization services, and advanced analytics to quickly fulfill orders from every channel.
Founded in 1996, Venustech is the leading provider of network security products, trusted security management platforms, specialized security services and solutions. Venustech has provided security equipments and solutions for over 30,000 users worldwide, including more than 30 firms of the fortune global 500, over 80% of Chinese banking institutions and over 60% of China's large state-owned enterprises, as well as all Chinese telecom carriers. Venustech owns the first enterprise-level Postdoctoral Station for network security in the nation, and the certified state-level network security R&D center with over 200 developers. Venustech has applied for hundreds of technical patents and won numerous pioneering achievements in the industry: China’s first IDS hardware product, China’s first distributed vulnerability scanning system, China’s first 10 Gigabit multi-core UTM platform, and realization of significant breakthrough in 10 Gigabit UTM core technology.
Vera is transforming the way companies around the world protect their most valuable data. By making sharing information simple, collaborative, and highly secure, Vera is solving a tough problem every company, no matter the size, faces. By encrypting every file, organizations have complete control over their information as it moves throughout the world. Vera’s granular security policies travel with the data, enforcing strict access controls, while ensuring the highest level of security, visibility, and control. For more information, visit www.vera.com
CA | Veracode, now part of CA Technologies, enables the secure development and deployment of the software that powers the application economy.
With its combination of automation, process and speed, CA | Veracode becomes a seamless part of the software lifecycle, eliminating the friction that arises when security is detached from the development and deployment process. As a result, enterprises are able to eliminate vulnerabilities during the lowest cost-point in the development/deployment chain so they can fully realize the advantages of DevOps environments while ensuring secure code is synonymous with high-quality code.
CA | Veracode’s SaaS platform assesses and improves the security of applications from inception through production so that businesses can fully realize the benefits of the applications they build, buy and deploy as well as the components they integrate into their environments.
Without the need for additional staff or equipment, CA | Veracode customers ramp up quickly, see results and prove value on day one, and consistently see improvement over time.
Vormetric is the leader in enterprise systems encryption and key management for physical, virtual and cloud environments. The Vormetric Data Security product line provides a single, manageable and scalable solution to encrypt any file, any database, any application, anywhere it reside. Vormetric achieves strong encryption without sacrificing application performance or creating key management complexity. The most security conscious organizations and government agencies in the world, including 7 of the Fortune 10, have standardized on Vormetric to provide strong, easily manageable data security. For more information visit www.vormetric.com.
Weaver’s IT Advisory Services focuses on delivering performance-enhancing consultation that simultaneously addresses IT and business agendas. We work directly with CIOs and others to create a more risk-aware, effective IT organization that can nimbly drive process efficiencies throughout companies and better support and deliver transformational business change. From cloud computing to mobile payment information, data integrity and information security have never been more crucial. With a range of specialized IT advisory services, Weaver helps organizations distinguish IT as the strategic advantage companies need to succeed in the age of big data.
Founded in 1950, Weaver currently has 500+ employees and offices in eight cities across the United States. Weaver is ranked the largest independent accounting firm in the Southwest by Accounting Today magazine. The firm is also ranked the 38th largest firm in the United States and a ‘2015 Best of the Best Firm to Watch’ by INSIDE Public Accounting. Weaver serves a broad range of clients including public and private national and international companies, nonprofit organizations and government entities. In addition to traditional assurance and tax services, Weaver also provides numerous advisory services, including risk advisory, transaction advisory, IT advisory, energy compliance and consulting, forensics and litigation, international tax, property tax, state and local tax, and wealth strategies services. Learn more at http://www.weaver.com.
Webroot, a division of Carbonite, harnesses the cloud and machine learning to reliably predict and protect against cyberattacks in real time. We secure businesses and consumers worldwide with next-generation endpoint and network protection, security awareness training, and threat intelligence services.
Trusted and integrated by market-leading companies, Webroot is located in Colorado and more details on the solutions we offer are available at webroot.com.
Whistic is the best way for tech-enabled companies to manage security risk assessments both internally and with third parties, and allows them to gain visibility into the security gaps within their own organizations, as well as their vendors, customers, and partners. Whistic’s platform simplifies the process of gathering responses to security questionnaires by automating the sending and receiving of assessments, gathering supporting documentation, providing contextual security information, and synthesizing the data into easy to read reports and dashboards.
Willis Towers Watson
Willis Towers Watson is a leading global professional services, technology and solutions company that helps organizations improve performance through effective people, risk and financial management. With 16,000 associates around the world, we offer consulting and software solutions in the areas of benefits, talent management, rewards, and risk and capital management.
We are the world’s largest provider of actuarial software. Global organizations, including the world’s largest insurers, rely on Willis Towers Watson solutions to measure value, manage risk, safeguard solvency and improve overall business performance.
A powerful combination of tailored best of breed software solutions integrated with world class advisory services sets our offering apart. We have the ability to support our clients’ end-to-end processes leveraging software as a service and cloud technology with the backing of technical expertise and support enabling them to maximize investment and deliver value.
WinMagic Inc. provides application aware Intelligent Key Management for everything encryption, with robust, manageable and easy-to-use data security solutions. WinMagic’s SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.
Wipro Ltd (NYSE:WIT) is a global information technology, consulting and outsourcing company with 170,000+ workforce serving clients in 175+ cities across 6 continents. The company posted revenues of $7.6 billion for the financial year ended Mar 31, 2015.
Wipro helps customers do business better by leveraging our industry-wide experience, deep technology expertise, comprehensive portfolio of services and vertically aligned business model. Our 55+ dedicated emerging technologies ‘Centers of Excellence’ enable us to harness the latest technology for delivering business capability to our clients.
Wipro is globally recognized for its innovative approach towards delivering business value and its commitment to sustainability. Wipro champions optimized utilization of natural resources, capital and talent. Today we are a trusted partner of choice for global businesses looking to ‘differentiate at the front’ and ‘standardize at the core’ through technology interventions.
Workday is a leading provider of enterprise cloud applications for finance and human resources. Founded in 2005, Workday delivers financial management, human capital management, and analytics applications designed for the world's largest companies, educational institutions, and government agencies. More than 1,000 organizations, ranging from medium-sized businesses to Fortune 50 enterprises, have selected Workday.
Workshare is a leading provider of secure enterprise file sharing and collaboration applications. Workshare allows individuals to easily create, share, and manage high-value content anywhere, on any device. Workshare enhances the efficiency of the collaborative process by enabling content owners to accurately track and compare changes from contributors simultaneously. Workshare also reduces the commercial risk posed by inadvertently sharing confidential or sensitive documents. More than 2 million professionals in 70 countries use Workshare’s award-winning desktop, mobile, tablet, and online applications. For more information visit http://www.workshare.com or follow Workshare on twitter at @workshare.
Xactly (NYSE:XTLY) is a leading provider of enterprise-class, cloud-based, incentive compensation solutions for employee and sales performance management. We address a critical business need: To incentivize employees and align their behaviors with company goals. Our products allow organizations to make more strategic decisions, increase employee performance, improve margins, and mitigate risk. Our core values are key to our success, and each day we’re committed to upholding them by delivering the best we can to our customers.
Zendesk makes customer service and engagement products for businesses that want to give customers the best customer experience. Our products are designed to facilitate communication, reduce friction, and improve the relationship between companies and their customers. Innovative, forward thinking companies embrace this philosophy, and they use Zendesk to create the best possible experience for their customers.
Through a multi-tenant, globally-deployed infrastructure, Zscaler enforces business policy, mitigates risk, and provides twice the functionality at a fraction of the cost of current solutions. It enables organizations to provide the right access to the right users, from any place and on any device—while empowering the end-user with a rich Internet experience.
ZTE Corporation is a global leader in telecommunications and information technology. As part of ZTE's M-ICT strategy, the company is committed to providing integrated end-to-end innovations to deliver excellence and value to consumers, carriers, businesses and public sector customers around the world to enable increased connectivity and productivity. Founded in 1985, ZTE is listed on both the Hong Kong and Shenzhen Stock Exchanges. In 2015, ZTE achieved an annual revenue to over RMB 100 billion for the first time, with a net profit increase of 21.8% to RMB 3.21 billion, driven by new operations including semiconductors and the Internet of Things.
With the industry's most comprehensive product range and end-to-end solutions, ZTE offers cutting-edge wireless, access & bearer, value-added services, terminals and managed services to telecommunications carriers, in addition to ICT solutions for enterprises and government agencies. ZTE's advanced capabilities enable leading telecommunications operators and Fortune 500 enterprises in more than 160 countries to achieve their business objectives and increase competitiveness. In addition, ZTE's acclaimed AXON, Blade, and SPRO series of smartphones and mobile devices are chosen by consumers around the world.
ZTE believes in technology innovation as a core value of the company, investing more than 10% of annual revenue in R&D. The company has established 20 state-of-the-art R&D centres in Asia, North America and Europe and employs over 30,000 research professionals in the development of next-generation technologies including 5G, the Internet of Things, NFV, SDN, Cloud Computing, Big Data and Smart City. ZTE has filed applications for more than 66,000 patents, with over 24,000 granted. Since 2010, ZTE has been ranked among the world's Top-3 for patent applications under the Patent Cooperation Treaty (PCT) each year, according to the World Intellectual Property Organization.