


SHAW Data Security Email Formats
IT Services and IT Consulting • West Concord, Massachusetts, United States • 11-20 Employees
SHAW Data Security Email Formats
SHAW Data Security uses 3 email formats. The most common is {first name}{last name} (e.g., johndoe@shawdatasecurity.com), used 55.6% of the time.
| Format | Example | Percentage |
|---|---|---|
{first name}{last name} | johndoe@shawdatasecurity.com | 55.6% |
{last name}{last name} | doedoe@shawdatasecurity.com | 33.3% |
{first initial}{last name} | jdoe@shawdatasecurity.com | 11.1% |
Key Contacts at SHAW Data Security
T. O. Owens
Director Of Customer Success
Brian Bailey
Managing Director & Co-Founder
T. J. Umina
Managing Director
Company overview
| Headquarters | 150 Baker Avenue Ext, Suite 205, Concord, Massachusetts 01742, US |
| Phone number | +19782546003 |
| Website | |
| NAICS | 5415 |
| SIC | 737 |
| Keywords | IRM, It Service Management, GRC, Servicenow, Security Incident Response, It Operations Management, Secops, Third Party Risk, Vulnerability Response, It Compliance Reporting, Vendor Security Risk |
| Founded | 2011 |
| Employees | 11-20 |
| Socials |
About SHAW Data Security
Get immediate value from your ServiceNow GRC and Security Operations subscriptions with guidance and expertise from SHAW Data Security focused on your regulatory compliance and security concerns. As an experienced team of CTOs, CIOs, CISOs and Enterprise executive veterans who focus on outcomes, our leadership knows what it takes to ensure your projects gain the acceptance of executive sponsorship and end-users alike. Our experts assigned to your engagements not only know “how”, but more importantly know “why”; giving you the confidence that the little things won’t be missed along the way. With technology centers in Massachusetts and Upstate New York we are enabled to be responsive throughout your project. *Governance, Risk Management & Compliance There is too much attention, too many initiatives and not enough resources to try and tackle GRC manually. Installing the adequate programs along with automation can get your operations into continuous compliance * Security Operations (SecOps) Solid information security processes with supporting automation tools are key elements to a viable information security program. Process and automation provide the efficiency and speed to stay ahead of innovating threats that can jeopardize information security. * Vendor Risk Management Knowing your third vendors capabilities and correctly classifying them in your operations is key to reducing your risk. The responsibility is on you to ensure your vendors take the same steps to ensure your clients privacy as you. We can help make sure you have an adequate process in place so that you and your vendors share in the protection of your customers. * ServiceNow Provides power, flexibility and speed to your IT & Compliance programs, but brings complexity along with it. Let our certified team help you get the full value of your investment. We've got experience and background to get you started or get your projects successfully completed (ITOM,SecOps/GRC/Risk,CSM,CMDB)
Employees by Management Level
Total employees: 11-20
Seniority
Employees
Employees by Department
SHAW Data Security has 8 employees across 4 departments.
Departments
Number of employees
Funding Data
SHAW Data Security has never raised funding before.
SHAW Data Security Tech Stack
Discover the technologies and tools that power SHAW Data Security's digital infrastructure, from frameworks to analytics platforms.
Security
Maps
JavaScript libraries
Analytics
JavaScript libraries
Live chat
Security
CRM
CMS
Analytics
PaaS
Frequently asked questions
4.8
40,000 users



