JM

Jan Miller

CTO, Threat Analysis

OPSWAT

Hamburg, Hamburg


Contact Information

Email
Unlock
LinkedIn

Company Information

Company
OPSWAT
Industry
computer & network security
Employees
1000.0
Seniority
C suite
Annual Revenue
110000000.0
Total Funding
125000000.0
Latest Funding
Other

Technologies

Amazon CloudFront Salesforce NSOne Route 53 Sendgrid Outlook Microsoft Office 365 Greenhouse.io Amazon AWS Cloudflare DNS Gmail Google Apps CloudFlare Hosting StatusPage IO Atlassian Cloud Drift Teachable StackAdapt The Trade Desk Salesforce Live Agent Salesforce Service Cloud Hubspot Figma Stripe Twitter Advertising Linkedin Marketing Solutions Google Tag Manager Bootstrap Framework Facebook Widget Mobile Friendly Wistia Google Dynamic Remarketing DoubleClick Google Analytics Adobe Media Optimizer Bing Ads Google Play LiveRamp WordPress.org Facebook Custom Audiences Facebook Login (Connect) AT Internet iTunes Visual Website Optimizer Google AdWords Conversion Cedexis Radar Nginx Google Font API Vimeo DoubleClick Conversion Zscaler Remote SAP Basis

Keywords

preventing advanced cyber security threats such as zeroday & targeted attacks blocking risky noncompliant devices from accessing corporate resources including cloud applications providing development platforms to empower other cyber security vendors & developers to help protec cybersecurity critical infrastructure metadefender file security email security malware analysis threat detection data sanitization proactive dlp zero-day attacks network monitoring security assessment cloud security endpoint protection peripheral media security industrial cybersecurity ot & it security supply chain security managed file transfer threat intelligence security awareness adaptive sandbox deep cdr vulnerability assessment remote device management incident response regulatory compliance cross-domain security multiscanning technology data diode data reconstruction secure access management threat hunting data leak prevention software supply chain hardware security antivirus integration insider threat protection cloud-native solutions real-time monitoring network access control training & certification cyber resilience incident management integrated security solutions security policy management malware detection risk management cybersecurity resources education & training critical infrastructure protection threat prevention malware prevention deep content disarm & reconstruction multiscanning software-defined perimeter operational technology security industrial control systems data loss prevention application security compliance proactive security secure data transfer device security government agencies financial institutions manufacturing energy sector transportation defense sector customer satisfaction innovation reliability integration customer testimonials software supply chain security vendor consolidation operational continuity mechanical or industrial engineering

Get Full Contact Details

Subscribe to reveal email addresses and export contacts.

View Plans