SalezShark Logo

DUST Identity Inc. Employee Emails and Contacts

Company Logo

DUST Identity Inc.

DUST Identity is the creator of the Diamond Unclonable Security Tag (DUST), a technology utilizing microscopic engineered diamonds to create an unclonable identity layer on any object. DUST Identity is the only supply-chain ...

Detailed Overview of DUST Identity Inc. | Emails & Phone

  • Company Name

    DUST Identity Inc.

  • Official Contact

    ******9125

  • Official Address

    Boston, Massachusetts, United States Of America... More

  • Industry Type

    Information Technology and Services

  • Employees Range

    1 - 50

  • Revenue Range

    1 - 50

  • Company Type

    Public Company

  • Official Website

    dustidentity.com

  • Products/Services

    Supply Chain Security , Cyber , Nano-technology , ... More

DUST Identity Inc. - Designation, Email Address and Phone Numbers

Check the Email and Phone Number List of the Top Management working at the DUST Identity Inc.

NameDesignationEmail AddressContact NumberView Email & Phone
Ophir GaathonCo-Founder & CEO****@dustidentity.com******2002 View Email & Phone
Phil RimmlerMarketing Manager****@dustidentity.com******2423 View Email & Phone
Jonathan HodgesVP of Engineering and co-Founder****@dustidentity.com******7917 View Email & Phone
DesignationsCompany Logo

How do Emails and Phone Numbers of DUST Identity Inc. Help in Bringing Leads?

Sending emails with the right pitch to DUST Identity Inc. employees like the Marketing Head, Founder, Admin, HR Head Email, Sales Head, CFO Contact, CEO, Managing Director, O Level, Management, CXO Email and other Key Employees Email can help to reach potential inboxes. DUST Identity Inc. has a revenue of 1 - 50 and 1 - 50 employees are working there, that are enough to be targeted.

Companies Similar to
DUST Identity Inc.

These companies are similar to DUST Identity Inc. as all of them are from the Information Technology and Services industry. All of these companies are doing business in Supply Chain Security , Cyber , Nano-technology , Supply Chain , Asset management , Industrial IoT , Product Tracking & Tracing , Tamper Detection , Assembly Authentication , Object Authentication , Hardware security and that is why they are similar to DUST Identity Inc..

NameIndustryHeadquartersNo. of Employees
IBMInformation Technology and Services New York,United States Of America 5001 & Above
Zebra TechnologiesInformation Technology and Services Illinois,United States Of America 5001 & Above
Trimble Inc.Information Technology and Services California,United States Of America 5001 & Above
Virtusa Software Services Pvt LtdInformation Technology and Services Tamil Nadu,India 5001 & Above
Salesforce.com India Pvt LtdInformation Technology and Services Karnataka,India 5001 & Above
NameIndustryHeadquartersNo. of Employees
Hawx MediaInformation Technology and Services Karnataka,India 1 - 50
K2 InfotechInformation Technology and Services...Get Detailed Info 1 - 50
Belta Soft Private LimitedInformation Technology and Services...Get Detailed Info 1 - 50
CNS India TechnologiesInformation Technology and Services Delhi,India 1 - 50
IT Solution INDIAInformation Technology and Services Delhi,India 1 - 50

Key Competitors of DUST Identity Inc.

There are some competitors of the DUST Identity Inc. that you can’t overlook. Their Product and Services might differ with DUST Identity Inc. but they have similar employee sizes that is 1 - 50.

Frequently Asked Questions

The headquarters of DUST Identity Inc. is in Massachusetts, United States Of America

The Official Website of the DUST Identity Inc. is dustidentity.com

The Industry type of DUST Identity Inc. is Information Technology and Services

The overall employees at DUST Identity Inc. are 1 - 50

DUST Identity Inc. generates an income of 1 - 50 in a year

The products and services offered by DUST Identity Inc. are Supply Chain Security , Cyber , Nano-technology , Supply Chain , Asset management , Industrial IoT , Product Tracking & Tracing , Tamper Detection , Assembly Authentication , Object Authentication , Hardware security

Go to top