Insights

Loading spinner
Gathering insights about tw-Security

tw-Security Tech Stack

tw-Security uses 8 technology products and services including Unpkg, Open Graph, Cookie Notice, and more. Explore tw-Security's tech stack below.

  • Unpkg
    Content Delivery Network
  • Open Graph
    Content Management System
  • Cookie Notice
    Cookie Compliance
  • MySQL
    Database
  • oEmbed
    Dev Tools
  • AOS
    Javascript Libraries
  • Contact Form 7
    Web Platform Extensions
  • Nginx
    Web Servers

Media & News

tw-Security's Email Address Formats

tw-Security uses at least 1 format(s):
tw-Security Email FormatsExamplePercentage
First.Last@tw-security.comJohn.Doe@tw-security.com
50%
First.Last@tw-security.comJohn.Doe@tw-security.com
50%

Frequently Asked Questions

Where is tw-Security's headquarters located?

Minus sign iconPlus sign icon
tw-Security's main headquarters is located at 6108 West 121 Street Overland Park, Kansas 66209 United States. The company has employees across 1 continents, including North America.

What is tw-Security's official website and social media links?

Minus sign iconPlus sign icon
tw-Security's official website is tw-security.com and has social profiles on LinkedIn.

What is tw-Security's NAICS code?

Minus sign iconPlus sign icon
tw-Security's NAICS code is 5415 - Computer Systems Design and Related Services.

How many employees does tw-Security have currently?

Minus sign iconPlus sign icon
As of March 2026, tw-Security has approximately 14 employees across 1 continents, including North America. Key team members include Founder And Principal Consultant: T. W.Partner And Prinicpal Consultant: W. B.Partner, Business Development: F. H.. Explore tw-Security's employee directory with LeadIQ.

What industry does tw-Security belong to?

Minus sign iconPlus sign icon
tw-Security operates in the IT Services and IT Consulting industry.

What technology does tw-Security use?

Minus sign iconPlus sign icon
tw-Security's tech stack includes UnpkgOpen GraphCookie NoticeMySQLoEmbedAOSContact Form 7Nginx.

What is tw-Security's email format?

Minus sign iconPlus sign icon
tw-Security's email format typically follows the pattern of First.Last@tw-security.com. Find more tw-Security email formats with LeadIQ.

When was tw-Security founded?

Minus sign iconPlus sign icon
tw-Security was founded in 2003.

tw-Security

IT Services and IT ConsultingKansas, United States11-50 Employees

Since 2003, tw-Security has been a recognized leader and trusted advisor in cybersecurity, privacy, and compliance.

We are dedicated solely to helping healthcare organizations (covered entities and business associates) protect their information resources.

Our guiding principle: data privacy and information security are the cornerstones to maintaining public trust. Information security and privacy are primarily business issues – not just technology issues.

Our recommendations for privacy and security safeguards and controls will be risk-based, cost-effective, and aligned with your priorities, industry-prudent practices, and government requirements.

For in-depth technical support, tw-Security partners with Talus Solutions (Talus), a healthcare-focused integrator and professional services firm.

Our services include:

•	Risk analysis, risk/ransomware assessments, risk management
•	Cybersecurity, data privacy program evaluation
•	Advisory and strategy services
•	HIPAA program development, management
•	Policies and procedures: create/update, and align with standards, frameworks, and regulations.
•	Breach response planning, breach management consulting, post-breach documentation support
•	Incidence response preparedness, tabletop exercises, playbooks
•	Awareness, training, and education
•	Business impact analysis, disaster recovery/business continuity planning
•	Virtual/ Interim privacy officer (fractional)
•	Virtual/ Interim security officer (fractional)
•	Compliance: HIPAA Audit Program Protocol, GDPR, ISO 27001/2, including ISMS and ISO 22301 BCMS, Health Industry Cybersecurity Practices (HICP), Section 405(d), SSAE 16 Type II, SOC 1 and SOC 2, 42 CFR Part 2 - Substance Use Treatment Confidentiality Regulations, Payment Card Industry Data Security Standard (PCI DSS)
•	Audit preparation
•	IoMT/medical device security assessment
•	Identity access management
•	Penetration/vulnerability/network/web application security testing
•	Social engineering and phishing

Section iconCompany Overview

Headquarters
6108 West 121 Street Overland Park, Kansas 66209 United States
NAICS Code
5415 - Computer Systems Design and Related Services
Founded
2003
Employees
11-50

Section iconMedia & News

Section iconFunding & Financials

  • $10M$25M

    tw-Security's revenue is estimated to be in the range of $10M$25M

Section iconFunding & Financials

  • $10M$25M

    tw-Security's revenue is estimated to be in the range of $10M$25M

Ready to create more pipeline?

Get a demo and discover why thousands of SDR and Sales teams trust
LeadIQ to help them build pipeline confidently.

© LeadIQ, Inc. All rights reserved.