Table of Contents
Table of Contents
Leading cybersecurity company recognized for innovative security and integrity software solutions for enterprises.

CIO Applications Banner

Merrillville, Indiana, May 15, 2018/PRWeb/ -- Cimcor, Inc., a global provider of security, integrity, and compliance software solutions, announced that it has been named one of the "Top 25 Cyber Security Companies 2018" by CIO Applications. This positioning is based on an evaluation of Cimcor and its advanced integrity monitoring software, CimTrak, which also continues to rank in the top 100 of the "Cybersecurity 500 list".

CimTrak, helps large enterprises, and government agencies not only detect enterprise change and unauthorized access, but it also remediates malicious or unwanted changes with its next-generation file integrity monitoring software.

"We are excited and honored to be included as one of the 'Top 25 Cyber Security Companies of 2018' by CIO Applications," said Robert E. Johnson, III, President/CEO of Cimcor, Inc. "Being recognized within this category further validates our unique security product innovations and recognizes unwavering efforts  to aid enterprises with IT infrastructure protection."

The annual list of companies is selected by a panel of experts and members of CIO Applications' editorial board to recognize and promote technology entrepreneurship. This is the first year that CIO Applications has named Cimcor, Inc. as a "Top 25 Cyber Security Company".

"Cimcor is an industry leader in developing innovative security and integrity software solutions, and their progress and advancements in cybersecurity are impressive. We are pleased to recognize Cimcor, Inc. for its exemplary contribution to the corporate, government, and military initiatives to protect the nation’s computer networks from unauthorized access,” said Joe Phillip, Managing Editor of CIO Applications.


About Cimcor, Inc.

Founded in 1997, Cimcor, Inc. is an industry leader in developing innovative security, integrity and compliance software solutions. The firm is on the front lines of global corporate, government and military initiatives to protect critical IT infrastructure and has consistently brought IT integrity innovations to market. Cimcor's flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network, virtual and cloud-based IT assets in real-time. For more information, visit


About CimTrak

CimTrak is an advanced monitoring tool for servers, network devices, databases, critical workstations and more. It helps companies and government agencies keep their IT infrastructure secure, maintain compliance, ensure continuous system uptime, and take control of changes in their IT environments. Built around leading-edge file integrity monitoring capabilities, CimTrak gives organizations deep situational awareness including: who is making changes, what is being changed, when changes are occurring, and how changes are being made. This, coupled with the ability to take instant action upon detection of change, gives organizations assurance their IT assets are always in a secure and compliant state. CimTrak is certified to Common Criteria EAL Level 4 +, Federal Information Processing Standard (FIPS) 140-2 Level 2 compliant, it is on the Army Approved Products List and the Defense Information Systems Agency (DISA) Unified Capabilities Approved Products List (UC-APL). For more information or a free evaluation, visit:


About CIO Applications

CIO Applications is a technology magazine, published from Silicon Valley, CA, that is a platform for CIOs to discuss innovative enterprise solutions. It is a medium that helps upcoming enterprise IT vendors to engage and showcase their solutions for enterprises. CIO Applications helps technology leaders by providing analysis on new technologies and gives a better understanding of the role that enterprise solutions play in achieving the business goals. For more information, visit

Post by Cimcor
May 16, 2018


About Cimcor

Cimcor’s File Integrity Monitoring solution, CimTrak, helps enterprise IT and security teams secure critical assets and simplify compliance. Easily identify, prohibit, and remediate unknown or unauthorized changes in real-time