Thru Named 2008 Hot Companies Finalist by Info Security Products Guide
Irving, Texas, February 12, 2008 – Thru announced today that Info Security Products Guide, published and printed in Silicon Valley and the world’s leading publication on security-related products and technologies, named the company a finalist in 2008 Hot Companies in the Security Solutions Category. Finalists are chosen based on analysis of 4Ps (People, Products, Performance and Potential). The editors decide if a company is hot based on these criteria.
About Info Security Products Guide
Info Security Products Guide sponsors leading conferences and expos worldwide and plays a vital role in keeping end-users informed of the choices they can make when it comes to protecting their digital resources. It is written expressly for those who are adamant on staying informed of security threats and the preventive measure they can take. You will discover a wealth of information in this guide including tomorrow’s technology today, best deployment scenarios, people and technologies shaping info security and independent product evaluations that facilitate in making the most pertinent security decisions. The Info Security Products Guide Awards recognize and honor excellence in all areas of information security. To learn more, visit www.infosecurityproductsguide.com and stay secured.
Thru is a global leader in delivering critical messaging solutions, with secure messaging, large file transfer and content archiving woven together in an integrated platform that is efficient, easy to use and simple to manage. Thru offers the Thru Secure Communication Network (SCN) brand of software-as-a-service (SaaS) and an on-premise option. Thru helps firms worldwide in many industries, including architecture, construction, engineering, manufacturing, healthcare and pharmaceuticals realize increased productivity, reduced information risk, optimized IT infrastructure and accelerated compliance. Founded in 2002, Thru uses a best practices approach to information delivery and management called Critical Message Governance (CMG), driving better visibility and centralized control of proprietary and sensitive data across network boundaries.