


Cord3 Innovation | Data-Centric Security Email Formats
Computer and Network Security • Ottawa, Ontario, Canada • 11-20 Employees
Cord3 Innovation | Data-Centric Security Email Formats
Cord3 Innovation | Data-Centric Security uses 2 email formats. The most common is {first initial}.{last name} (e.g., j.doe@cord3inc.com), used 58.8% of the time.
| Format | Example | Percentage |
|---|---|---|
{first initial}.{last name} | j.doe@cord3inc.com | 58.8% |
{first name}.{last name} | john.doe@cord3inc.com | 41.2% |
Key Contacts at Cord3 Innovation | Data-Centric Security
Bruce Carruthers
Chief Executive Officer
Glen Henderson
Chief Technology Officer
Company overview
| Headquarters | 900 Morrison Drive, 202, Ottawa, Ontario K2H 8K7, CA |
| Phone number | +13434888720 |
| Website | |
| NAICS | 518210 |
| SIC | 737 |
| Keywords | Government Security, Encryption, Risk Management, Identity And Access Management, Cybersecurity, Cloud Security, Enterprise Security, Data Privacy, Data-Centric Security, Identity Governance And Administration, Zero Trust Security |
| Employees | 11-20 |
| Socials |
About Cord3 Innovation | Data-Centric Security
Cord3 gives data-owners the most effective way to safeguard your information. How? We bring the key to the data, not the user. In doing so, the security follows the data itself and in the event of a breach, your assets are still protected, no matter who has access, or where they reside. Cord3’s data-centric security platform gives data-owners true zero-trust security with stronger protection, less complexity, lower overhead, and greater flexibility STRONGER PROTECTION: Our data-centric platform protects emails, files, databases, or messages. We use 1 key to 1 asset, and we follow the data, so it’s always protected. There’s no misuse of credentials and even administrators can’t see the data. Plus, it’s quantum ready today. LOCATION AGNOSTIC: We protect your data in the cloud, on-premises, hybrid, at rest or in-transit. The security goes where the data goes. EASY TO DEPLOY: Our solution is deployed as an overlay so there is no re-writing of applications and no changes to existing processes NO ADMINISTRATIVE BURDEN: Cord3 uses symmetric keys so there is zero key management. We use simple policy driven governance and our solution is application & architecture agnostic. Cord3 has deployed solutions for military, government, and commercial customers.
Employees by Management Level
Total employees: 11-20
Seniority
Employees
Employees by Department
Cord3 Innovation | Data-Centric Security has 9 employees across 5 departments.
Departments
Number of employees
Funding Data
Explore Cord3 Innovation | Data-Centric Security's funding history, including investment rounds, total capital raised, and key backers.
Cord3 Innovation | Data-Centric Security Tech Stack
Discover the technologies and tools that power Cord3 Innovation | Data-Centric Security's digital infrastructure, from frameworks to analytics platforms.
Video players
Web servers
Security
Form builders
Tag managers
JavaScript libraries
Programming languages
Blogs
JavaScript libraries
Analytics
JavaScript libraries
Miscellaneous
Frequently asked questions
4.8
40,000 users



