Infinite Group Inc
OTC:IMCI
Infinite Group Inc
Research & Development
Infinite Group Inc
Research & Development Peer Comparison
Competitors Analysis
Latest Figures & CAGR of Competitors
| Company | Research & Development | CAGR 3Y | CAGR 5Y | CAGR 10Y | ||
|---|---|---|---|---|---|---|
|
Infinite Group Inc
OTC:IMCI
|
Research & Development
N/A
|
CAGR 3-Years
N/A
|
CAGR 5-Years
N/A
|
CAGR 10-Years
N/A
|
|
|
Epam Systems Inc
NYSE:EPAM
|
Research & Development
N/A
|
CAGR 3-Years
N/A
|
CAGR 5-Years
N/A
|
CAGR 10-Years
N/A
|
|
|
Gartner Inc
NYSE:IT
|
Research & Development
N/A
|
CAGR 3-Years
N/A
|
CAGR 5-Years
N/A
|
CAGR 10-Years
N/A
|
|
|
International Business Machines Corp
NYSE:IBM
|
Research & Development
-$8.3B
|
CAGR 3-Years
-8%
|
CAGR 5-Years
-6%
|
CAGR 10-Years
-5%
|
|
|
Cognizant Technology Solutions Corp
NASDAQ:CTSH
|
Research & Development
N/A
|
CAGR 3-Years
N/A
|
CAGR 5-Years
N/A
|
CAGR 10-Years
N/A
|
|
|
Amdocs Ltd
NASDAQ:DOX
|
Research & Development
-$338.5m
|
CAGR 3-Years
9%
|
CAGR 5-Years
-3%
|
CAGR 10-Years
-3%
|
|
Infinite Group Inc
Glance View
Infinite Group, Inc. is a developer of cybersecurity software and a provider of cybersecurity related services and managed information security related services to commercial businesses and government organizations. The company is headquartered in Pittsford, New York. The firm provide cybersecurity consulting services that include incident response, security awareness training, risk management, IT governance and compliance, security assessment services, penetration testing, and CISO Team-as-a-Service (TaaS) offerings to channel partners and direct customers across different vertical markets, including banking, supply chain, manufacturing, legal in North America. The firm offers professional services and software-as-a-service (SaaS) based software platforms, such as Nodeware and Webroot. Its Nodeware is an automated asset identification and vulnerability management and monitoring solution that enhances security by identifying, monitoring, and addressing potential vulnerabilities on both internal and external facing networks.