Insights

Loading spinner
Gathering insights about TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security

Similar companies to TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security

TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security Tech Stack

TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security uses 8 technology products and services including Module Federation, Google Cloud, GSAP, and more. Explore TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's tech stack below.

  • Module Federation
    Development
  • Google Cloud
    Infrastructure As A Service
  • GSAP
    Javascript Frameworks
  • Zepto
    Javascript Libraries
  • Lodash
    Javascript Libraries
  • Envoy
    Load Balancers
  • Google Tag Manager
    Tag Management
  • Google Analytics
    Web Analytics

Media & News

TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's Email Address Formats

TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security uses at least 1 format(s):
TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security Email FormatsExamplePercentage
First.Last@trojanhorsesecurity.comJohn.Doe@trojanhorsesecurity.com
50%
First.Last@trojanhorsesecurity.comJohn.Doe@trojanhorsesecurity.com
50%

Frequently Asked Questions

Where is TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's headquarters located?

Minus sign iconPlus sign icon
TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's main headquarters is located at 2200 PENNSYLVANIA AVENUE NW, 4TH FLOOR EAST WASHINGTON, DC 20037, US. The company has employees across 2 continents, including North AmericaEurope.

What is TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's phone number?

Minus sign iconPlus sign icon
You can contact TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's main corporate office by phone at . For more prospecting data, LeadIQ has access to up-to-date and accurate contact information within our platform. Find, capture, and sync contact data to your CRM and sales tools in one click.

What is TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's official website and social media links?

Minus sign iconPlus sign icon
TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's official website is trojanhorsesecurity.com and has social profiles on LinkedIn.

What is TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's SIC code NAICS code?

Minus sign iconPlus sign icon
TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's SIC code is 7379 - Computer Related Services, Not Elsewhere Classified NAICS code is 5415 - Computer Systems Design and Related Services.

How many employees does TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security have currently?

Minus sign iconPlus sign icon
As of October 2025, TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security has approximately 11 employees across 2 continents, including North AmericaEurope. Key team members include Owner: D. L.Senior Executive Vice President: B. B.Senior Principal: A. J.. Explore TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's employee directory with LeadIQ.

What industry does TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security belong to?

Minus sign iconPlus sign icon
TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security operates in the Computer and Network Security industry.

What technology does TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security use?

Minus sign iconPlus sign icon
TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's tech stack includes Module FederationGoogle CloudGSAPZeptoLodashEnvoyGoogle Tag ManagerGoogle Analytics.

What is TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's email format?

Minus sign iconPlus sign icon
TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's email format typically follows the pattern of First.Last@trojanhorsesecurity.com. Find more TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security email formats with LeadIQ.

When was TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security founded?

Minus sign iconPlus sign icon
TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security was founded in 2001.

TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security

Computer and Network SecurityUnited States11-50 Employees

Trojan Horse Security is headquartered in Washington DC, just down the street from the White House. We are specialists in corporate security and pride ourselves in only employing the very best consultants in the world. All of our consultants have over 10 years experience and are industry leaders. They have all, at one point in time, worked for a major consultancy in a senior role. We have a team of the best Information Security Consultants in the business. 

 THS Team members have backgrounds in the Secret Service Presidential Detail, State Department Diplomatic Security Bureau, and tier one Special Operations SEAL Team Six. 

We never hire anyone junior or mid-level. In fact, Trojan Horse Security was established because the founders saw their old consultancy firms sending out junior consultants with minimal or no experience and charging their clients for senior level resources (ask your current provider how experienced your last consultant was).

Trojan Horse Security serves all sizes of companies from the Fortune 500 to SMEs. In our book, no job is too big or too small. We have the consultants and resources to handle any size project and carry it out with the best service in the industry.

We are consultant owned so we are able to give the most dedicated service and still out bid any other consultancy – guaranteed.  

Contact us today for a free consultation to learn how we can help you find where your vulnerabilities really are..before an attacker helps themselves.

Section iconCompany Overview

Headquarters
2200 PENNSYLVANIA AVENUE NW, 4TH FLOOR EAST WASHINGTON, DC 20037, US
Phone number
SIC Code
7379 - Computer Related Services, Not Elsewhere Classified
NAICS Code
5415 - Computer Systems Design and Related Services
Founded
2001
Employees
11-50

Section iconMedia & News

Section iconFunding & Financials

  • $1M

    TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's revenue is estimated to be in the range of $1M

Section iconFunding & Financials

  • $1M

    TROJAN HORSE SECURITY- | Information Security | Cyber Security | IT Security | Network Security's revenue is estimated to be in the range of $1M

Ready to create more pipeline?

Get a demo and discover why thousands of SDR and Sales teams trust
LeadIQ to help them build pipeline confidently.

© LeadIQ, Inc. All rights reserved.