Entries by Dan Horn

Aunigma Executes Technology and Services Agreement with Global IT Provider

August 27, 2015 – Aunigma has entered into a joint development agreement with a global leader in providing transformational information technology (IT) solutions and services. The multi-year agreement will position each company to rapidly customize and deliver best-in-class security solutions for its respective customers using Aunigma’s patented ANS FabriX™ platform. CEO Kenneth Garrard stated, “This […]

Aunigma Appoints Dan Wilder to Leadership Team

July 14, 2015. Aunigma welcomes Dan Wilder as Vice President of Corporate Development. Mr. Wilder brings our team over 25 years of business technology management, information systems integration and global cyber security leadership. During his career he has attained extensive experience in cyber security, with expertise in; IT infrastructure architecture design and operation, threat/vulnerability risk […]

Aunigma Relocates to Atlanta Tech Village

April, 2015. This month Aunigma has relocated its offices to accommodate expanding efforts in developing solutions to protect Web-based assets and join a thriving entrepreneurial community in the Atlanta Tech Village. The Village, located in Buckhead in the middle of Atlanta’s technology corridor, was established in 2013 to meet the unique needs of technology and […]

Peter Gratzer Joins Leadership Team

March 2, 2015. Aunigma is pleased to announce the engagement of Peter Gratzer as our Vice President of Technology. Gratzer has been involved with information technology and computer engineering for over 30 years. As a consultant, he has worked with projects for multiple domestic and international industries. Among the companies that have relied on his […]

Aunigma Unveils Software Defined Perimeter Solution

Fall 2014. After many months of development in stealth mode, Aunigma announces release of the first fully compliant Cloud Security Alliance (CSA) software defined perimeter (SDP) solution. This security framework differs from traditional fixed perimeters in that application owners have the ability to deploy and control perimeter functionality where needed—on the Internet, in the cloud, […]