Revenue | $10 - $100 million See Exact Annual Revenue |
---|---|
Employees | N/AExact Company Size |
Primary Industry | 541511 Custom Computer Programming & Software Development Services |
Additional NAICS Codes | 443142 Radio, Television & Electronics Stores 51821 Data Centers & Hosting Services |
Address | 740 Regent St Ste 203 Madison, WI 53715 |
Tetra Defense | Revenue Est. ($ Million) | Growth Rate (%) | # Employees |
---|---|---|---|
2023 | $10 - $100 million Details in Premium Report | ||
2022 | |||
2021 | |||
2020 | |||
2019 |
1-Year Growth Rate: 3-Year Growth Rate (CAGR): |
Tetra Defense P&L | $ Millions |
---|---|
Revenue (Sales) | |
Cost of Goods Sold | |
Gross Profit | |
Operating Expenses | |
Advertising | |
Salaries and wages | |
Other Operating Expenses | |
Total Operating Expenses | |
Operating Income | |
EBITDA | |
EBIT (Earnings Before Interest and Taxes) | |
Net Profit | |
Date | Investors | Percent Raised | Target Size |
---|---|---|---|
December 4, 2019 | 2 | 100% | $3 MM |
Complete list of funding rounds and total amounts in the Company Report |
Trademark | Date |
---|---|
SYTE providing instruction and training regarding computer and database security audits, and compliance with computer security standards and certifications | 05/27/2020 |
READYSYTE IT security, protection and restoration, namely, assessing, detecting, and preventing IT system vulnerabilities, security risks, and threats; Computer network, computer application, and data security consultancy; Security audits of computer networks, computer applications, and databases; Development of response plans for computer network security, computer application security, and data security incidents; Vulnerability testing and threat analysis of computer networks, computer applications, and databases for unauthorized access, malicious use, and cyberattack; Detecting, analyzing, reporting on, and protecting computer networks, computer applications, and databases from unauthorized access, malicious use, malware, and cyberattack; Detecting security breaches and malicious activities on computer networks, computer applications, and databases; Monitoring, tracking, collecting, and analyzing the activities of users of computer networks, computer applications, and databases; Evaluating the performance of security measures used to protect computer networks, computer applications, and databases; Performing compliance checks with computer security standards and certifications; Management of compliance with computer security standards and certifications, namely, storage, organization, and cataloguing of compliance documents, event logs, and task lists; Instruction and training regarding computer and database security audits, and compliance with computer security standards and certifications | 05/27/2020 |
CLEARSYTE IT security, protection and restoration, namely, assessing, detecting, and preventing IT system vulnerabilities, security risks, and threats; Computer network, computer application, and data security consultancy; Security audits of computer networks, computer applications, and databases; Development of response plans for computer network security, computer application security, and data security incidents; Vulnerability testing and threat analysis of computer networks, computer applications, and databases for unauthorized access, malicious use, and cyberattack; Detecting, analyzing, reporting on, and protecting computer networks, computer applications, and databases from unauthorized access, malicious use, malware, and cyberattack; Detecting security breaches and malicious activities on computer networks, computer applications, and databases; Monitoring, tracking, collecting, and analyzing the activities of users of computer networks, computer applications, and databases; Evaluating the performance of security measures used to protect computer networks, computer applications, and databases; Performing compliance checks with computer security standards and certifications; Management of compliance with computer security standards and certifications, namely, storage, organization, and cataloguing of compliance documents, event logs, and task lists; Instruction and training regarding computer and database security audits, and compliance with computer security standards and certifications | 05/27/2020 |
Company | Headquarters | Revenue ($ MM) |
---|---|---|
NVIDIA | Santa Clara, CA | 100 |
INNOVA SOLUTIONS | Duluth, GA | 80 |
COGNIZANT TECHNOLOGY SOLUTIONS U.S. | College Station, TX | 32 |
CERNER | Kansas City, MO | 12 |
CACI INTERNATIONAL | Reston, VA | 9 |
WIPRO LIMITED | East Brunswick, NJ | 6 |
SYNTEL | Troy, MI | 5 |
GUSTO | San Francisco, CA | 4 |
DELIV | Menlo Park, CA | 4 |
Company | Headquarters | Revenue ($ MM) |
---|---|---|
LOST BOYS INTERACTIVE | Madison, WI | 100 |
NORDIC CONSULTING PARTNERS | Madison, WI | 79 |
TETRA DEFENSE | Madison, WI | 10 |
REDOX | Madison, WI | 9 |
GROCERKEY | Madison, WI | 9 |
FLEXION | Madison, WI | 8 |
Company | Revenue ($ MM) |
---|---|
|