QualityWorks Consulting Group References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (3250)
    Premium277+ References
  • 4.8 / 5.0 (1568)
    5+ References
  • 4.8 / 5.0 (1687)
    6+ References

QualityWorks Consulting Group Case Studies

  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References277 total
    About

    EPAM builds and rolls out its first global solution in 30 countries and 15 languages for its first major client, Bally of Switzerland, a global fashion and apparel brand. They help customers around the world become competitive – and stay competitive. They combine best-in-class software engineering with digital strategy and experience design, business consulting and technology innovation services. They deliver business and technology transformation from start to finish, leveraging agile methodologies, proven customer collaboration frameworks, engineering excellence tools, hybrid teams and their award-winning proprietary global delivery platform.

  • Reference Rating
    4.7 / 5.0
    Customer References5 total
    About

    NetWatcher is a Security-as-a-Service platform that enables customers to have a cost-effective 24 x 7 security service monitoring their networks for vulnerabilities and exploits. Many government and industry compliance requirements, and security best practices, outline the need for continuous monitoring, intrusion detection, active scanning, log monitoring, net-flow analysis, event management and end point integration.

  • Reference Rating
    4.7 / 5.0
    Customer References6 total
    About

    Securonix is re-defining the next generation of cyber-threat detection using the power of entity context, machine learning, and big data. Their purpose-built, security analytics platform mines, enriches, analyzes, scores and visualizes data into actionable intelligence on the highest risk threats. Using machine learning techniques that track user, account and system behavior, Securonix detects the most advanced insider threats, cyber threats and fraud attacks in real-time.