Hubspring Health is the brainchild of technologists and physicians Frank Gencorelli, M.D. and Andrew Rosendahl, M.D., Ph.D.
During his residency, Gencorelli, whose undergraduate degree is in engineering from FAU, became frustrated at how much time was wasted struggling to access even the most basic resources and communicate with his team.
When time was critical to a patient's outcome, he had to login to a desktop computer, access the hospital’s intranet, locate a shared folder and, with some luck, find the information he needed.
“Things that seem easy outside of health care were incredibly time consuming in the hospital, where patients’ lives lie in the balance,” Gencorelli said. He and Rosendahl, a medical colleague, co-founded Hubspring to sove this pervasive problem in the industry.
The Hubspring software platform — "The Hub" — puts all mission critical content and communication tools in one place, making it accessible from any device or location, eliminating delays in care.
"The Hub has been transformative” in the medical departments using it, including the University of Miami, University of Texas, University of Tennessee and many others, according to Gencorelli.
Ridgeback Network Defense founder Tom Phillips spent decades working on technology in national security for the U.S. government.
Phillips and co-CEOs, Raj Kulkarni and Scott Fogarty, created Ridgeback, a security platform that defeats malicious computer network invasion in real time. Ridgeback dramatically shifts the odds in favor of the enterprise to detect and eliminate hackers, a $75 billion global problem, according to Fogarty.
The technology performs by populating a company’s network with the appearance of billions of “IT assets” — computers, servers, copiers — fake resources that act as landmines when hackers try to infiltrate a network.
“The minute the hackers scan the network they’re scanning fake resources,” Fogarty said. “Every decoy is a landmine, and every time it’s tripped, the compromised computer is taken offline and the threat is stopped. Our product sends confusing and irritating information back to the hacker.”
For national security uses, Ridgeback maintains an open connection to the hackers, meaning the hackers’ machines are susceptible to being exploited.
Unlike many cybersecurity solutions on the market, which require hardware, bandwidth and human management, Ridgeback can be downloaded and made operable within 10 minutes.