Iconix
Computer & Network Security, 255 W Julian St Ste 302, San Jose, California, 95110, United States, 11-50 Employees
Phone Number: +16*********
Who is ICONIX
At ICONIX, Inc., our goal is to restore trust in email communications between you and your customers. Your customers already trust your brands - that is why they do business with you and ...
Read More
- Headquarters: 255 W Julian St Ste 302, San Jose, California, 95110, United States
- Date Founded: 2004
- Employees: 11-50
- Revenue: $10 Million to $25 Million
- Active Tech Stack: See technologies
- CEO: Bruce Long
Industry: Computer & Network Security
SIC Code: 5045
Iconix Org Chart and Mapping
Sign in to CIENCE GO Data to uncover contact details
Free credits every month
Frequently Asked Questions Regarding Iconix
Answer: Iconix's headquarters are located at 255 W Julian St Ste 302, San Jose, California, 95110, United States
Answer: Iconix's phone number is +16*********
Answer: Iconix's official website is https://iconix.com
Answer: Iconix's revenue is $10 Million to $25 Million
Answer: Iconix's SIC: 5045
Answer: Iconix has 11-50 employees
Answer: Iconix is in Computer & Network Security
Answer: Iconix contact info: Phone number: +16********* Website: https://iconix.com
Answer: At ICONIX, Inc., our goal is to restore trust in email communications between you and your customers. Your customers already trust your brands - that is why they do business with you and opted-in to your email list. You can now extend that trust into email using The Iconix Truemark solution. Your customers can quickly identify and trust your messages when they see your brand through all the clutter and noise in the inbox. No longer do your customers have to wonder what's real and what's not. Start sending Trusted, Branded emailTM today! SP Guard from Iconix uses enhancements to standards-based authentication to defend enterprises from spearphishing. *** What is a Kill Chain? *** A kill chain is the sequence of events an adversary must complete in order to achieve a tactical objective. Because each step must work in order for the attacker to be successful, defenders can focus on the weakest links in the chain, not each and every one. As each link in the chain is hardened, the attackers work is made more difficult and costly.
Premium Sales Data for Prospecting
-
Sales data across over 200M records
-
Up-to-date records (less decayed data)
-
Accurate Email Lists (real-world tested)
-
Powerful search engine and intuitive interface
Sign in to CIENCE GO Data to uncover contact details
Free credits every month