Rocky Hill, 6067, CT,
United States
2 Plus Technographics
Discover the latest software purchases and digital transformation initiatives being undertaken by 2 Plus and its business and technology executives. Each quarter our research team identifies on-prem and cloud applications that are being used by the 10 2 Plus employees from the public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources.
During our research, we have identified that 2 Plus has purchased the following applications: DOSarrest for DDoS Protection in 2019 and the related IT decision-makers and key stakeholders.
Our database provides customer insight and contextual information on which enterprise applications and software systems 2 Plus is running and its propensity to invest more and deepen its relationship with Link11 or identify new suppliers as part of their overall Digital and IT transformation projects to stay competitive, fend off threats from disruptive forces, or comply with internal mandates to improve overall enterprise efficiency.
We have been analyzing 2 Plus revenues, which have grown to $1.0 million in 2024, plus its IT budget and roadmap, cloud software purchases, aggregating massive amounts of data points that form the basis of our forecast assumptions for 2 Plus intention to invest in emerging technologies such as AI, Machine Learning, IoT, Blockchain, Autonomous Database or in cloud-based ERP, HCM, CRM, EPM, Procurement or Treasury applications.
CyberSecurity
Vendor |
Previous System |
Application |
Category |
Market |
VAR/SI |
When |
Live |
Insight |
Insight Source |
|---|---|---|---|---|---|---|---|---|---|
| Link11 | Legacy | DOSarrest | DDoS Protection | CyberSecurity | n/a | 2019 | 2019 | In 2019, 2 Plus deployed DOSarrest for DDoS Protection to protect its public website. 2 Plus implemented DOSarrest on its corporate web property, aligning the application DOSarrest, the DDoS Protection category, and the website security business function into a single protective layer for online client access and marketing channels. The deployment of DOSarrest was configured as a cloud-based edge protection layer in front of the public site, providing traffic scrubbing, rate limiting, and network and application layer filtering consistent with DDoS Protection capabilities. Configuration work focused on routing web traffic through DOSarrest, establishing mitigation rules, and enabling continuous traffic monitoring and alerting to detect volumetric and application layer attacks. Operational scope centers on the public website and associated online access points, impacting the company security and web operations function. Governance practices were adapted to include ongoing rule tuning, incident monitoring, and operational handoffs for DDoS event response, with DOSarrest acting as the primary mitigation control for the web presence. |
| First Name | Last Name | Title | Function | Department | Phone | |
|---|---|---|---|---|---|---|
| No data found | ||||||
| Date | Company | Status | Vendor | Product | Category | Market |
|---|---|---|---|---|---|---|
| No data found | ||||||