JP

James Penney

CTO

Device Authority

Reading, England


Contact Information

Email
Unlock
LinkedIn

Company Information

Company
Device Authority
Industry
computer & network security
Employees
37.0
Seniority
C suite
Annual Revenue
14500000.0
Total Funding
24942370.0
Latest Funding
Series A

Technologies

Outlook Microsoft Office 365 Zendesk Amazon AWS Gmail Google Apps Cloudflare DNS CloudFlare Hosting Drupal Hubspot Media Temple SSL WP Engine DigitalOcean OwnerIQ Google Tag Manager Simpli.fi Media.net Shareaholic Content Amplification Tynt Google Dynamic Remarketing Gravity Forms 33Across Hotjar reCAPTCHA Linkedin Marketing Solutions Nginx WordPress.org Google Analytics Lotame Bing Ads Mobile Friendly comScore DoubleClick Conversion Google Font API Bootstrap Framework YouTube DoubleClick IoT AI

Keywords

data encryption authentication access control credential management device provisioning policydriven encryption secure overtheair updates data security iot security iot iam blockchain revenue protection data privacy data protection certificate management enterprise iot zero trust device identity lifecycle management device identity keyscaler keyscaler as a service (ksaas) pki automation device authentication ai-driven security dynamic device key generation (ddkg) incident response automation identity lifecycle management policy-driven encryption connected device management vulnerability management automated provisioning device trust compliance assurance federated data sharing connected products human error minimization cross-industry security solutions automotive cybersecurity energy sector security healthcare iomt industrial iot security data breach prevention cyber resilience certificate lifecycle management software bill of materials (sbom) continuous assurance vehicle identity management secure updates remote device management cloud-based device security edge device automation zero trust architecture granular access permissions manufacturer compliance smart factory solutions public sector cybersecurity connected supply chain security remote monitoring solutions cyber threat intelligence automated key management device onboarding security secure communication protocols real-time data security unified security policy computer & network security information technology & services

Get Full Contact Details

Subscribe to reveal email addresses and export contacts.

View Plans