Profiel
John Stewart currently works as a Director at Theom, Inc.
Actieve functies van John Stewart
Bedrijven | Functie | Begin |
---|---|---|
Theom, Inc.
Theom, Inc. Information Technology ServicesTechnology Services Theom, Inc. has developed a data security and governance product that detects active attacks on data clouds and data lakehouses to prevent breaches. The company is based in California and is led by an experienced team of security innovators who are backed by leading investors and venture firms including M12, Microsoft's venture fund, Ridge Ventures, and more. The product offers data access governance, insider threat detection and prevention, ransomware recovery, and cyber insurance rightsizing. Theom is the only security product that runs inside data clouds and data lakehouses, providing security teams with visibility into sensitive data, identifying and prioritizing risks to data, removing over-provisioned access, detecting active threats to data using an AI early-warning system, and stopping attackers in their tracks. | Directeur/Bestuurslid | - |
Ervaring
Beklede functies
Actief
Inactief
Beursgenoteerde bedrijven
Bedrijven in privébezit
Connecties
Eerstegraads connecties
Bedrijven verbonden in de eerste graad
Man
Vrouw
Besturend
Uitvoerend
Verwante bedrijven
Bedrijven in privébezit | 1 |
---|---|
Theom, Inc.
Theom, Inc. Information Technology ServicesTechnology Services Theom, Inc. has developed a data security and governance product that detects active attacks on data clouds and data lakehouses to prevent breaches. The company is based in California and is led by an experienced team of security innovators who are backed by leading investors and venture firms including M12, Microsoft's venture fund, Ridge Ventures, and more. The product offers data access governance, insider threat detection and prevention, ransomware recovery, and cyber insurance rightsizing. Theom is the only security product that runs inside data clouds and data lakehouses, providing security teams with visibility into sensitive data, identifying and prioritizing risks to data, removing over-provisioned access, detecting active threats to data using an AI early-warning system, and stopping attackers in their tracks. | Technology Services |