Insights

Loading spinner
Gathering insights about Red Tiger Security

Red Tiger Security Tech Stack

Red Tiger Security uses 8 technology products and services including MySQL, Google Workspace, jQuery, and more. Explore Red Tiger Security's tech stack below.

  • MySQL
    Database
  • Google Workspace
    Email
  • jQuery
    Javascript Libraries
  • jQuery Migrate
    Javascript Libraries
  • PHP
    Programming Languages
  • Twenty Ten
    Web Platform Extensions
  • Apache HTTP Server
    Web Servers
  • Apache
    Web Servers

Media & News

Red Tiger Security's Email Address Formats

Red Tiger Security uses at least 1 format(s):
Red Tiger Security Email FormatsExamplePercentage
FLast@redtigersecurity.comJDoe@redtigersecurity.com
44%
Last@redtigersecurity.comDoe@redtigersecurity.com
6%
FLast@redtigersecurity.comJDoe@redtigersecurity.com
44%
Last@redtigersecurity.comDoe@redtigersecurity.com
6%

Frequently Asked Questions

Where is Red Tiger Security's headquarters located?

Minus sign iconPlus sign icon
Red Tiger Security's main headquarters is located at The Woodlands, Texas 77389 US. The company has employees across 2 continents, including North AmericaAfrica.

What is Red Tiger Security's official website and social media links?

Minus sign iconPlus sign icon
Red Tiger Security's official website is redtigersecurity.com and has social profiles on LinkedIn.

What is Red Tiger Security's SIC code NAICS code?

Minus sign iconPlus sign icon
Red Tiger Security's SIC code is 7382 - Security Systems Services NAICS code is 5415 - Computer Systems Design and Related Services.

How many employees does Red Tiger Security have currently?

Minus sign iconPlus sign icon
As of October 2025, Red Tiger Security has approximately 26 employees across 2 continents, including North AmericaAfrica. Key team members include Chief Executive Officer: A. C.Chief Executive Officer: R. V.Founder, Executive Director: J. P. C. C. P.. Explore Red Tiger Security's employee directory with LeadIQ.

What industry does Red Tiger Security belong to?

Minus sign iconPlus sign icon
Red Tiger Security operates in the Computer and Network Security industry.

What technology does Red Tiger Security use?

Minus sign iconPlus sign icon
Red Tiger Security's tech stack includes MySQLGoogle WorkspacejQueryjQuery MigratePHPTwenty TenApache HTTP ServerApache.

What is Red Tiger Security's email format?

Minus sign iconPlus sign icon
Red Tiger Security's email format typically follows the pattern of FLast@redtigersecurity.com. Find more Red Tiger Security email formats with LeadIQ.

When was Red Tiger Security founded?

Minus sign iconPlus sign icon
Red Tiger Security was founded in 2008.

Red Tiger Security

Computer and Network SecurityTexas, United States11-50 Employees

Red Tiger Security is a focused SCADA Security consultancy, training, and research firm dedicated to the resiliency of national critical infrastructure, and mission-critical business systems that must be available on a 24x7 basis. Red Tiger Security has developed and implemented a 6-layer Vulnerability Assessment approach that encompasses both Physical and Cyber security for ICS (Industrial Control Systems). 

For more information, visit us at www.redtigersecurity.com

Section iconCompany Overview

Headquarters
The Woodlands, Texas 77389 US
SIC Code
7382 - Security Systems Services
NAICS Code
5415 - Computer Systems Design and Related Services
Founded
2008
Employees
11-50

Section iconMedia & News

Section iconFunding & Financials

  • $1M$10M

    Red Tiger Security's revenue is estimated to be in the range of $1M$10M

Section iconFunding & Financials

  • $1M$10M

    Red Tiger Security's revenue is estimated to be in the range of $1M$10M

Ready to create more pipeline?

Get a demo and discover why thousands of SDR and Sales teams trust
LeadIQ to help them build pipeline confidently.

© LeadIQ, Inc. All rights reserved.