Herndon, 20170, VA,
United States
Command Security Corporation Technographics
Command Security Corporation Technographics, Software Purchases, AI and Digital Transformation Initiatives
Discover the latest software purchases and digital transformation initiatives being undertaken by Command Security Corporation and its business and technology executives. Each quarter our research team identifies on-prem and cloud applications that are being used by the 6500 Command Security Corporation employees from the public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources.
During our research, we have identified that Command Security Corporation has purchased the following applications: iCIMS Recruit Applicant Tracking System for Applicant Tracking System in 2020, GoDaddy for Application Hosting and Computing Services in 2013, Okta Identity Cloud for Identity and Access Management (IAM) in 2021 and the related IT decision-makers and key stakeholders.
Our database provides customer insight and contextual information on which enterprise applications and software systems Command Security Corporation is running and its propensity to invest more and deepen its relationship with iCIMS , GoDaddy , Amazon Web Services (AWS) or identify new suppliers as part of their overall Digital and IT transformation projects to stay competitive, fend off threats from disruptive forces, or comply with internal mandates to improve overall enterprise efficiency.
We have been analyzing Command Security Corporation revenues, which have grown to $188.0 million in 2024, plus its IT budget and roadmap, cloud software purchases, aggregating massive amounts of data points that form the basis of our forecast assumptions for Command Security Corporation intention to invest in emerging technologies such as AI, Machine Learning, IoT, Blockchain, Autonomous Database or in cloud-based ERP, HCM, CRM, EPM, Procurement or Treasury applications.
Command Security Corporation Tech Stack and Enterprise Applications
Command Security Corporation HCM
Vendor |
Previous System |
Application |
Category |
Market |
VAR/SI |
When |
Live |
Insight |
|---|---|---|---|---|---|---|---|---|
| iCIMS | Legacy | iCIMS Recruit Applicant Tracking System | Applicant Tracking System | HCM | n/a | 2020 | 2020 |
In 2020, Command Security Corporation implemented iCIMS Recruit Applicant Tracking System as its Applicant Tracking System and embedded the solution on its external careers website. The deployment used iCIMS Recruit Applicant Tracking System to publish job postings and capture candidate applications through the company careers portal, establishing the application as the primary intake point for external hiring.
|
Command Security Corporation IaaS
Vendor |
Previous System |
Application |
Category |
Market |
VAR/SI |
When |
Live |
Insight |
|---|---|---|---|---|---|---|---|---|
| GoDaddy | Legacy | GoDaddy | Application Hosting and Computing Services | IaaS | n/a | 2013 | 2013 |
In 2013, Command Security Corporation implemented GoDaddy for Application Hosting and Computing Services to host and manage its public-facing website. The GoDaddy implementation is focused on the company website as the primary operational surface, providing domain registration, DNS resolution, and web content hosting.
Configuration centers on standard hosting modules aligned with Application Hosting and Computing Services, including domain registration and management, DNS configuration, shared or managed web hosting, and SSL certificate provisioning. GoDaddy is used to administer DNS records, manage certificate provisioning, provision basic hosting resources, and support content publishing workflows.
Operational governance is administered by corporate IT in coordination with digital marketing, who control the GoDaddy account, approve domain record changes, and manage certificate lifecycles. The implementation centralized external-facing domain and hosting controls on the GoDaddy platform to streamline website administration and content updates.
|
|
|
|
|
Application Hosting and Computing Services | IaaS |
|
2020 | 2020 |
|
|
|
|
|
Application Hosting and Computing Services | IaaS |
|
2019 | 2019 |
|
|
|
|
|
Content Delivery Network | IaaS |
|
2019 | 2019 |
|
Command Security Corporation CyberSecurity
Vendor |
Previous System |
Application |
Category |
Market |
VAR/SI |
When |
Live |
Insight |
|---|---|---|---|---|---|---|---|---|
| Okta | Legacy | Okta Identity Cloud | Identity and Access Management (IAM) | CyberSecurity | n/a | 2021 | 2021 |
In 2021, Command Security Corporation deployed Okta Identity Cloud on its website to centralize Identity and Access Management (IAM) for public-facing authentication and access control. The implementation was scoped to the company website, instrumenting web authentication flows and session management for external users rather than broad application replatforming.
Okta Identity Cloud was configured to deliver core Identity and Access Management (IAM) capabilities including centralized authentication, single sign-on workflows, adaptive multi-factor authentication, policy-driven access controls, and automated user lifecycle provisioning aligned to web access. Configuration emphasized policy enforcement and standardized session handling to ensure consistent authentication behavior across the site.
The deployment embedded Okta-managed authentication flows into the website’s authentication stack and identity provisioning pipeline, establishing Okta Identity Cloud as the front door for web sessions. Operational ownership was placed with corporate IT and security teams who manage access policies, monitor authentication events, and coordinate provisioning for web identities.
Governance was updated to centralize access policy administration and implement role-based authentication workflows for website access, supported by automated provisioning and deprovisioning tied to identity state. The implementation positioned Okta Identity Cloud as the primary Identity and Access Management (IAM) control point for Command Security Corporation’s web properties, simplifying authentication governance for those digital entry points.
|
|
|
|
|
Secure Email Gateways (SEGs) | CyberSecurity |
|
2016 | 2016 |
|
IT Decision Makers and Key Stakeholders at Command Security Corporation
| First Name | Last Name | Title | Function | Department | Phone | |
|---|---|---|---|---|---|---|
| No data found | ||||||
Apps Being Evaluated by Command Security Corporation Executives
| Date | Company | Status | Vendor | Product | Category | Market |
|---|---|---|---|---|---|---|
| No data found | ||||||