{"_id":"QA6WSSAu9qL3zytvwVO6IDJgPgDhy3Tk8CyBX4RhfevKgrt8JioSOP","lastupdate":"2024-07-15T00:00:00.000Z","lastModified":"Aug 7, 2024","active":1,"confidence_score":83,"confidence_score_reason":"sector, funding rounds, markets, not claimed","urlname":"parablu-inc","minimal_profile":null,"status":"","fullstatus":"","acquired":null,"country":"","hide_reason":"blL0zOmZrgcuMkagFE9ptopVpNcoKl6h3lyiBDdpKHEf0of7jOejch","hide_reason_data":{"reason":"Pending approval","visible":0},"hide_reasons":[{"id":"blL0zOmZrgcuMkagFE9ptopVpNcoKl6h3lyiBDdpKHEf0of7jOejch","reason":"Pending approval"},{"id":"eMNeQjU8vbqmA9Ww6YYpUsiVWY10LQivRDDbyW11hxq2xcjGGkWy9L","reason":"Foreign Startup"}],"type":"Foreign Startup","logokey":"$pHWK9CkqsYSw0WcZI56UEey4GHXlpFvLcVbU0OPSYOvQzWsaGgLZBp.jpeg","name":"Parablu Inc","about":"At Parablu, we specialize in providing top-notch data backup solutions for businesses of all sizes. From online data backup services to enterprise data backup software, we offer a range of reliable options to ensure the security and integrity of your valuable data. Our cloud data backup services are designed with scalability and flexibility in mind, enabling you to adapt to changing business requirements seamlessly. Trust Parablu for all your data backup and recovery needs, and safeguard your business against data loss disasters effectively.","oneliner":"Data Backup Solutions","website":"https://parablu.com/","founded_month":1,"founded_year":2012,"primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","formernames":[],"sociallinks":{"twitter":"https://twitter.com/ParabluInc","youtube":"http://www.youtube.com/@parabluinc","facebook":"https://www.facebook.com/Parablu/","linkedin":"https://www.linkedin.com/company/parabluinc/","instagram":""},"social":["https://twitter.com/ParabluInc","http://www.youtube.com/@parabluinc","https://www.facebook.com/Parablu/","https://www.linkedin.com/company/parabluinc/"],"flattenedsociallinks":"https://twitter.com/ParabluInc|http://www.youtube.com/@parabluinc|https://www.facebook.com/Parablu/|https://www.linkedin.com/company/parabluinc/","is_claimed_by_owner":1,"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8nsIKDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4LuBqO4KDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pva9NoJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0K8IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfXhvILDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgJDA"],"businessmodels":["B2B"],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"apps":{},"founded":"1/2012","mediagallery":[],"address":[],"timeline":[],"tags":[],"databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Foreign Startup","parsedName":"Parablu Inc","logourl":"https://storage.googleapis.com/clean-finder-353810/$pHWK9CkqsYSw0WcZI56UEey4GHXlpFvLcVbU0OPSYOvQzWsaGgLZBp.jpeg","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$pHWK9CkqsYSw0WcZI56UEey4GHXlpFvLcVbU0OPSYOvQzWsaGgLZBp.jpeg","team":[],"careerspage":"","employees":"","productstage":"","products":[],"geomarkets":[],"usecases":[],"funding":{"fundingstage":"","totalfunding":"Undisclosed","lastfunding":"Undisclosed"},"seoabout":"At Parablu, we specialize in providing top-notch data backup solutions for businesses of all sizes. From online data backup services to enterprise data bac...","seoTitle":"Foreign Startup","solutions":[],"teamMembersNumber":0,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Data Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pva9NoJDA","classificationName":"sectorclassification"},{"depth":2,"name":"Endpoint Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0K8IDA","classificationName":"sectorclassification"},{"depth":2,"name":"Cloud Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfXhvILDA","classificationName":"sectorclassification"},{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Cryptography","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA","classificationName":"coretechnology"},{"depth":2,"name":"Encryption","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA","classificationName":"coretechnology"},{"depth":2,"name":"Tokenization","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4LuBqO4KDA","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"},{"depth":1,"name":"Data Storage","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA","classificationName":"coretechnology"},{"depth":2,"name":"Cloud","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgJDA","classificationName":"coretechnology"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Healthcare & Life Sciences","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8nsIKDA","classificationName":"targetcustomer"},{"depth":1,"name":"Defense, Safety & Security","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA","classificationName":"targetcustomer"},{"depth":1,"name":"Financial Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMLDA","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"}],"classificationDelimited":["TechnologyClassificationModel>Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA>Encryption#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","TechnologyClassificationModel>Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA","IndustryClassificationModel>Healthcare & Life Sciences#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8nsIKDA","TechnologyClassificationModel>Data Storage#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA>Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","IndustryClassificationModel>Defense, Safety & Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA","TechnologyClassificationModel>Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA>Tokenization#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4LuBqO4KDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Data Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pva9NoJDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Endpoint Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0K8IDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Cloud Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfXhvILDA","IndustryClassificationModel>Financial Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMLDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","TechnologyClassificationModel>Data Storage#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA>Cloud#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgJDA"],"classificationsViewModel":"|0:>TechnologyClassificationModel|1:>TechnologyClassificationModel/Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA|2:>TechnologyClassificationModel>Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA/Encryption#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA|2:>TechnologyClassificationModel>Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA/Tokenization#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4LuBqO4KDA|1:>TechnologyClassificationModel/Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA|2:>TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA/Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA|1:>TechnologyClassificationModel/Data Storage#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA|2:>TechnologyClassificationModel>Data Storage#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA/Cloud#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgJDA|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Healthcare & Life Sciences#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8nsIKDA|1:>IndustryClassificationModel/Defense, Safety & Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA|1:>IndustryClassificationModel/Financial Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMLDA|1:>IndustryClassificationModel/Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Data Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pva9NoJDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Endpoint Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0K8IDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Cloud Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfXhvILDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"Data Security","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>Data Security"},{"title":"Endpoint Security","key":"0-0-1","path":"SectorClassificationModel>Cyber Security>Endpoint Security"},{"title":"Cloud Security","key":"0-0-2","path":"SectorClassificationModel>Cyber Security>Cloud Security"}]}],"targetCustomer":[{"title":"Healthcare & Life Sciences","key":"0-0","path":"IndustryClassificationModel>Healthcare & Life Sciences"},{"title":"Defense, Safety & Security","key":"0-1","path":"IndustryClassificationModel>Defense, Safety & Security"},{"title":"Financial Services","key":"0-2","path":"IndustryClassificationModel>Financial Services"},{"title":"Enterprise & Professional Services","key":"0-3","path":"IndustryClassificationModel>Enterprise & Professional Services"}],"coreTechnology":[{"title":"Cryptography","key":"0-0","path":"TechnologyClassificationModel>Cryptography","children":[{"title":"Encryption","key":"0-0-0","path":"TechnologyClassificationModel>Cryptography>Encryption"},{"title":"Tokenization","key":"0-0-1","path":"TechnologyClassificationModel>Cryptography>Tokenization"}]},{"title":"Platforms & Interfaces","key":"0-1","path":"TechnologyClassificationModel>Platforms & Interfaces","children":[{"title":"Software","key":"0-1-0","path":"TechnologyClassificationModel>Platforms & Interfaces>Software"}]},{"title":"Data Storage","key":"0-2","path":"TechnologyClassificationModel>Data Storage","children":[{"title":"Cloud","key":"0-2-0","path":"TechnologyClassificationModel>Data Storage>Cloud"}]}]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Data Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pva9NoJDA","classificationName":"sectorclassification"},{"depth":2,"name":"Endpoint Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0K8IDA","classificationName":"sectorclassification"},{"depth":2,"name":"Cloud Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfXhvILDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Cryptography","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA","classificationName":"coretechnology"},{"depth":2,"name":"Encryption","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA","classificationName":"coretechnology"},{"depth":2,"name":"Tokenization","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4LuBqO4KDA","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"},{"depth":1,"name":"Data Storage","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA","classificationName":"coretechnology"},{"depth":2,"name":"Cloud","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgJDA","classificationName":"coretechnology"}],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Healthcare & Life Sciences","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8nsIKDA","classificationName":"targetcustomer"},{"depth":1,"name":"Defense, Safety & Security","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA","classificationName":"targetcustomer"},{"depth":1,"name":"Financial Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMLDA","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","Data Security","Endpoint Security","Cloud Security"],"coreTechnology":["Cryptography","Encryption","Tokenization","Platforms & Interfaces","Software","Data Storage","Cloud"],"targetCustomer":["Healthcare & Life Sciences","Defense, Safety & Security","Financial Services","Enterprise & Professional Services"]},"section":null,"sectionParams":"","queryParams":"","news":[],"popup_claim_profile":"false","claimedBadge":"none","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{}}