COMPUTER SECURITY CONSULTANCY

Brand Owner (click to sort) Address Description
"THAT IS OUT OF SCOPE" SAID NO ATTACKER EVER Red Mesa 860 Johnson Ferry Rd 140-310 Atlanta GA 85233 Computer security consultancy; Data security consultancy; Internet security consultancy; Testing of security systems;
21 PERFECTION DO IT RIGHT THE FIRST TIME Thomas, Robert B. #6 1580 John Wesley Way Huntsville AL 35816 Computer security consultancy; Computer systems analysis; IT consulting services; IT integration services;
ACHIEVE YOUR OBJECTIVES THROUGH THE SECURE, MEASURED USE OF INFORMATION SYSTEMS AND TECHNOLOGY. DIGITAL GRC 2218 Honeytree Ct. Findlay OH 458407441 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security risks and vulnerability; Computer security consultancy in the field of data governance and risk management of computer information systems and information technology; Consulting services, namely, testing, analysis, and evaluation of the information technology systems of others to assure compliance with IT industry standards;
ACTIONABLE THREAT MANAGEMENT Barrier1 Suite 201 14000 Sunfish Lake Boulevard NW Ramsey MN 55303 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
ADEPT NETWORKS Adept Communications, Inc. Suite 102 720 E. Jackson St Medford OR 97504 Computer security consultancy; Information technology consulting services;
AI AGENT DEFIANT INFILTRON HOLDINGS, INC. 103 Buford Dr. Warner Robins GA 31088 Computer security consultancy; Data security consultancy; Internet security consultancy;
AI AGENT DETECTIVE INFILTRON HOLDINGS, INC. 103 Buford Dr. Warner Robins GA 31088 Computer security consultancy; Data security consultancy; Internet security consultancy;
AI AGENTS INFILTRON HOLDINGS, INC. 103 Buford Dr. Warner Robins GA 31088 Computer security consultancy; Data security consultancy; Internet security consultancy;
ALL THINGS CYBER Cyburity, Inc. 116 Downing Ridge Drive Madison AL 35758 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security threat analysis for protecting data; Computer code conversion for others; Computer programming; Computer programming and software design; Computer programming consultancy; Computer programming for others; Computer programming services; Computer services, namely, creating computer network-based indexes of information, websites and resources; Computer services, namely, creating, maintaining, designing and implementing web sites for others; Computer services, namely, data recovery services; Computer services, namely, encrypted data recovery services; Computer services, namely, managing web sites for others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, on-site management of information technology (IT) systems of others; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design; Computer software design and updating; Computer software design for others; Computer software development; Computer software development and computer programming development for others; Consultation about the maintenance and updating of computer software; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Data security consultancy; Design and development of computer software; Design and development of electronic data security systems; Design, development, installation and maintenance of computer software; Design, installation, updating and maintenance of computer software; Design, maintenance, development and updating of computer software; Design, updating and rental of computer software; Design, upgrading and rental of computer software; Developing computer software; Developing and updating computer software; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Installation and maintenance of computer software; Installation of computer software; Installation, maintenance and repair of computer software; Installation, maintenance, and updating of computer software; Installation, repair and maintenance of computer software; Installing computer programs; Internet security consultancy; Maintenance and updating of computer software; Maintenance and upgrading of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems to detect breakdowns; Preparation, update, installation and maintenance of computer software; Programming of computer software for others; Recovery of computer data; Rental and maintenance of computer software; Renting computer software; Searching and retrieving information, sites, and other resources available on computer networks for others; Services for maintenance of computer software; Services for updating computer software; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, troubleshooting of computer software problems; Testing of computer software; Testing of security systems; Troubleshooting of computer software problems; Up-dating of computer software; Updating and design of computer software; Updating and maintenance of computer software; Updating of computer software; Updating of computer software for others; Updating of computer software relating to computer security and prevention of computer risks; Writing and updating computer software;
ALLOW NO HARM Sectegrity Corporation 3640 Main Street, Ste 204 Springfield MA 01107 Computer security consultancy; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Data security consultancy; Internet security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Consulting services in the field of software as a service (SAAS); Design and development of electronic data security systems; Development of security systems and contingency planning for information systems; Software as a service (SAAS) featuring security software for restricting unauthorized computer application access by bots, botnets, scripts generated through artificial intelligence, and other automated software programs; Software as a service (SAAS) featuring software for providing private and secure electronic messaging over a computer network;
ALLY CYBER INVESTIGATIONS, LLC Ally Cyber Investigations 236 Waverly Drive Virginia Beach VA 23452 Computer security consultancy in the field of minimizing cyber risk, risk assessments; Data security consultancy; Internet security consultancy; Technology consultation in the field of cybersecurity;
ANALYZE EDUCATE TRAIN COMMUNICATE APPLIEDINFO PARTNERS, INC. 28 WORLD'S FAIR DRIVE SOMERSET NJ 08873 Computer security consultancy;
ANTI-THREAT INTELLIGENCE GreyNoise Intelligence Inc 1015 15th St NW, Suite 600 Washington DC 20005 Computer security consultancy; Computer security threat analysis for protecting data; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, providing search engines for obtaining data on a global computer network; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Providing a website featuring a media aggregator and search engine for internet content;
AOEU TeleCommunication Systems, Inc. 275 West Street Annapolis MD 21401 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software development in the field of vulnerability analysis;
APETANK SECURED Urban Sanity Promotions 8 The Green ST A Dover DE 19901 Computer security consultancy; Data security consultancy; Internet security consultancy;
APPSEC AppSec Consulting, Inc. 6110 Hellyer Avenue, Suite 100 San Jose CA 95138 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
ARE YOU READY? Aveshka, Inc. 1900 Gallows Rd., Suite 300 Vienna VA 22182 Computer security consultancy; Consulting in the field of information technology; Consulting services in the field of cloud computing; Software design and development; Information technology consulting services;
ARMOLON Armolon Corp. 200 Valley West Drive Suite 705 West Des Moines IA 50266 Computer security consultancy;
ARS Synack, Inc. 303 Twin Dolphin Drive, 6th Floor Redwood City CA 94065 computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer software testing to identify security vulnerability; platform as a service (PAAS) featuring computer software for security risk analysis and security vulnerability analysis for computers, computer systems and computer networks; consultancy, testing, research and advisory services in the field of risk, vulnerability analysis and security for computers, computer systems and computer networks; collection, compilation, and analysis of data for the purpose of generating and transmitting computer and computer network security reports and ratings of the level of security of third party software residing on the computers of others; testing, analysis, and evaluation of computer systems to assure compliance with computer security industry standards;
ART OF EXPLOITATION TeleCommunication Systems, Inc. 275 West Street Annapolis MD 21401 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software development in the field of vulnerability analysis;
ASSERTION SmarterHi Communications Private Limited The Kode, 6th Floor Baner Pashan Link Road, Baner Pune, Maharashtra 411021 India Computer security consultancy; Computer security consultancy in the field of computer virus scanning software; Data security consultancy; Database design and development; Database development services; Design and development of electronic data security systems; Design and development of computer software for database management, cloud storage of data; Design of computer databases; Development and creation of computer programmes for data processing; Maintenance of computer software relating to computer security and prevention of computer risks; Recovery of computer data; Updating of computer software relating to computer security and prevention of computer risks;
ATTACKERS ARE PEOPLE MORPHICK, INC. 4600 Montgomery Road Cincinnati OH 45212 Computer security consultancy in the field of cybersecurity, namely, technical consultancy related to computer security, development, maintenance and monitoring of security software; computer security consultancy in the field of cybersecurity, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security services, namely, controlling and restricting access to computer networks and protected information; computer security consultancy in the field of cybersecurity, namely, collecting and aggregating data and intelligence;
AUTOMATED THREAT MANAGEMENT CLOUDCOVER IP 740 Southcross Drive West, Suite 105 Burnsville MN 55306 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
AUTOMATIONEER TalonX, Inc. Suite 7 6500 River Place Blvd Building 7 Austin TX 78730 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of managed security service provider (MSSP); Computer security consultancy in the field of automation; Computer security consultancy in the field of cyber security; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to computer systems and networks; Computer security services, namely, restricting unauthorized network access by users without proper credentials or permissions; Computer security threat analysis for protecting data; Information technology consulting services; Computer services, namely, remote management of the information technology (IT) systems of others; Consulting in the field of information technology; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Maintenance of computer software relating to computer security and prevention of computer risks; Outsource service provider in the field of information technology consulting; Planning, design and management of information technology systems; Updating of computer software relating to computer security and prevention of computer risks;
AUTOMATIONEERING TalonX, Inc. Suite 7 6500 River Place Blvd Building 7 Austin TX 78730 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of managed security service provider (MSSP); Computer security consultancy in the field of automation; Computer security consultancy in the field of cyber security; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to computer systems and networks; Computer security services, namely, restricting unauthorized network access by users without proper credentials or permissions; Computer security threat analysis for protecting data; Information technology consulting services; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Consulting in the field of information technology; Maintenance of computer software relating to computer security and prevention of computer risks; Outsource service provider in the field of information technology consulting; Outsource service providers in the field of information technology; Planning, design and management of information technology systems; Updating of computer software relating to computer security and prevention of computer risks;
BACKDOOR SECURITY Wall, Kristopher R 404 Cricket Holw Edmon OK 73034 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
BANCSEC Brady Development, Inc. 800 Pine Grove Rd Beaver PA 150099464 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
BETTER DATA MATTERS Risk Based Security, Inc. 5518 Olde Hartley Way Glen Allen VA 23060 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
BEYOND MALWARE Security Scorecard Inc. 186 32nd Street Brooklyn NY 11232 Computer security consultancy; Computer consultation in the field of computer security; application service provider (ASP) featuring software for the discovery and analysis of computer security vulnerabilities; Development of customized software for others for use in risk assessment and information security; Computer consultation in the field of computer security, namely, providing technical recommendations and advice in the fields of Internet website, network, and computer data security; Maintenance of computer software relating to computer security and prevention of computer risks; Testing of security systems; Design and development of electronic data security systems;
BINARY BOSS Greco Dominic 2238 sW 15th Ave Cape Coral FL 33991 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
BLISSVECTOR Curtis Smith 385 E Green St. #2608 Pasadena CA 91101 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer services, namely, integration of computer software into multiple systems and networks; Computer services, namely, integration of private and public cloud computing environments; Consulting services in the field of cloud computing; Consulting services in the field of software as a service (SAAS); Consulting in the field of information technology; Data security consultancy; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Providing virtual computer systems and virtual computer environments through cloud computing; Technical consulting in the field of artificial intelligence (AI) software customization; Technological consultation in the technology field of computer hardware systems; Technological consultation in the technology field of data and analytics strategy; Technological consultation in the technology field of enterprise data architecture; Technological consultation in the technology field of data science; Technological consultation in the technology field of data security; Technological consultation in the technology field of website design; Technological consultation in the technology field of cyber-Security; Technology consultation in the field of artificial intelligence; Technology consultation in the field of cybersecurity; Web site design; Web site design consultancy; Website design and development for others; Website design consultancy; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; IT consulting services; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services;
BORDERLESS PENETRATION TESTING Elteni 2417 Jericho Tpke #294 Garden City Park NY 11040 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
CASTRA Castra Managed Services Grant Leonard 3308 Durham-Chapel Hill Blvd Suite 201 Durham NC 27707 Computer security consultancy;
CESPPA Cesppa, Inc. 2773 Anchor Ave Los Angeles CA 90064 Computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; testing, research and advisory services in the field of risk, vulnerability analysis and security for computers, computer systems and computer networks; computer software testing to identify security vulnerability;
CHANGING THE WAY THE WORLD COMMUNICATES ONCLAVE NETWORKS, INC # 600 1751 Pinnacle Drive McLean VA 20152 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer services, namely, designing and implementing computer security systems to scan, monitor and alert of communications security vulnerabilities for others; Computer services, namely, providing technical support, namely, monitoring technological functions of network systems for connected devices for others; computer security services in the nature of Managed Security Service Provider (MSSP) services featuring the creation of cryptographically secured tunnels over existing network servers for others; Computer security services, namely, restricting unauthorized access to network communications of connected devices and the Internet of Things; Developing customized software in the field of trusted secure network communications of connected devices and the Internet of Things for others; Development of security systems and contingency planning for information systems; Providing on-line non-downloadable software for control of access to and for analysis of security risks to computer systems, namely, network systems for connected devices; Software development in the field of computer and computer network security systems and contingency planning for internet connected systems, namely, secure network communications for connected devices; computer services, namely, monitoring in the nature of restricting unauthorized access to devices relating to device security and prevention of risks and conformance with a risk management framework; Software as a service (SAAS) services featuring software for network communications security on network systems for connected devices;
CHASING POSSIBLE Reliaquest 777 S. Harbour Island Blvd., Suite 500 Tampa FL 33602 Computer security consultancy; statement of work driven computer software consulting services; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Managed computer security services delivered through security operations centers, namely, managing and optimizing computer security software, namely, security information and event management (SIEM), firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC), data loss prevention (DLP), application security, endpoint security, and forensics and incident response; Computer services, namely, managing and monitoring computer infrastructure for others; Computer software and hardware design in the nature of advanced content and correlation and advanced engineering to maintain the health of computer infrastructure; Monitoring of computer infrastructure for security purposes delivered through security operations centers;
CIPHERBYTE James Morales 12274 N. Fulton Ave Marana AZ 85653 Computer security consultancy; Telecommunications technology consultancy;
CLIENTLESS NAC CLOUDCOVER IP 740 Southcross Drive West, Suite 105 Burnsville MN 55306 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
COMBINATORIAL SECURITY Marketing Science Consulting Group, Inc. 425 5th Ave #33A New york NY 10016 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management;
COMPLEXITY DEMANDS EXPERIENCE UNUM IT, Inc. 39 Tanglewood Dr Scwenksville PA 194732601 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Consultation about the maintenance and updating of computer software; Consulting in the field of configuration management for computer hardware and software; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others;
COMPROMISE ELSEWHERE Tevora Business Solutions, Inc. 17875 Von Karman, Suite 100 Irvine CA 92614 Computer security consultancy, namely, providing cybersecurity strategies, risk assessment, threat management, incident response, compliance requirements and security controls, cloud security and penetration testing;
CONETRIX CONETRIX 5225 S Loop 289 Suite 207 Lubbock TX 79424 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Backup services for computer hard drive data; Computer disaster recovery planning; Computer network configuration services; Computer network design for others; Computer project management services; Computer security consultancy; Computer services, namely, cloud hosting provider services; Computer services, namely, computer system administration for others; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer software installation and maintenance; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting in the field of information technology; Consulting in the field of virtualization technologies for enterprises and businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Development of security systems and contingency planning for information systems; Hosting the software, websites and other computer applications of others on a virtual private server; Installation and maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems by remote access to ensure proper functioning; Providing virtual computer systems and virtual computer environments through cloud computing; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Computer services, namely, data recovery services; Computer systems analysis; Installation of computer software; Integration of computer systems and networks; Information technology audit services, namely, testing and analysis of information technology systems; technical support, namely, monitoring technological functions of computer network systems; Business technology software consultation services; Computer services, namely, management of cybersecurity specifically computer security systems management; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity; Computer services, namely, monitoring technological functions of networks for malicious activity and exploits, stopping malicious activity and exploits by means of restricting access and blocking unauthorized programs and users of computer systems, alerting network users and owners via notifications of computer network system events, and restoring or recovering normal network operations; Computer services, namely, monitoring technological functions of computer systems for malicious activity and exploits, stopping malicious activity and exploits by means of restricting access and blocking unauthorized programs and users of computer systems, alerting network users and owners via notification of computer network system events, and restoring or recovering normal system operations; Computer services, namely, providing network threat protection services by means of restricting unauthorized access to computer systems and networks; Managed security services, namely, network threat protection services specifically computer security threat analysis for protecting data;
CONFIDENCE AS A SERVICE Derreck Ogden 511 SE Hibiscus Avenue Stuart FL 34996 Computer security consultancy in the field of minimizing cyber risk, risk assessments, cyber insurance advice, digital forensics, and network security for small and medium businesses; Data security consultancy; Internet security consultancy; IT consulting services relating to installation, maintenance and repair of computer software; Technology consultation in the field of cybersecurity;
CONSILIENT CONSILIENT, INC. Suite 700 3033 Wilson Boulevard Arlington VA 22201 Computer security consultancy; Computer security threat analysis for protecting data; Data security consultancy; Design and development of electronic data security systems; Software as a service (SAAS) services featuring software for risk management, business intelligence, compliance analytics, database management, database analytics;
CORPORATE INFORMATION TECHNOLOGIES Corporate Information Technologies Corporation PO Box 31084 Charlotte NC 28231 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer services, namely, remote management of information technology (IT) systems of others comprised of electronic hardware and software applications; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-site management of information technology (IT) systems of others comprised of electronic hardware and software applications; Computer monitoring service which tracks application software performance, performs periodic maintenance and provides reports and alerts concerning such performance; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting services for others in the field of design, planning, and implementation project management of business information technology (IT) systems; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems;
COUNTER ADVANCED PERSISTENT THREAT RED TEAM Oakley, Jacob 4418 Duskin Ct. SE Owens Cross Roads AL 35763 Computer security consultancy;
CRYPTIC TECHNOLOGIES,LLC Cryptic Technologies 6243 West Carter Road Rome NY 13440 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
CYBER DEFENSE COACH Roadrunner Cyberescuity 5901J Wyoming Blvd NE #111 Albuquerque NM 87109 Computer security consultancy;
CYBER DEFENSE RESOURCES Austin, Robin M. 3105 Bandolino Ln. Plano TX 75075 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of Securing Data; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to Data; Computer security services, namely, restricting unauthorized network access by Hardware; Computer security services, namely, restricting unauthorized network access by Software; Computer security threat analysis for protecting data; Data security consultancy; Design and development of electronic data security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Internet security consultancy; Maintenance of computer software relating to computer security and prevention of computer risks; Providing user authentication services using biometric hardware and software technology for protecting access to data; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks;
CYBER DIGITAL TWIN CYBELLUM TECHNOLOGIES LTD 3 Aminadav Street Tel Aviv-Yafo 6706703 Israel Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of automotive components; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; Computer security threat analysis for protecting data;
CYBER INTELLIGENCE SYSTEMS Cyber Intelligence Systems 2031 Spanish Wells Dr Wilmington NC 28405 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
CYBER LOOKOUT Ariento Inc. 1046 Calle Recodo, Suite B San Clemente CA 92673 Computer security consultancy; Computer security services, namely, restricting unauthorized access to computer networks; Computer security threat analysis for protecting data; Computer systems analysis; Computer consultation in the field of computer security; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Computer network configuration services; Computer virus protection services; Computer services, namely, data recovery services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Data encryption and decoding services; Electronic monitoring of personally identifying information to detect identity theft via the internet; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems for detecting unauthorized access or data breach; Remote computer backup services; Rental of computers relating to computer security and prevention of computer risks; Technology advice provided to Internet users by means of a support hotline; Updating of computer software relating to computer security and prevention of computer risks;
CYBER RED TEAM Computer Security Services 833 E Moss Mill Road Galloway NJ 08205 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
CYBER RISK MANAGER Threat Sketch Suite 501, 500 West 5th Street Winston-Salem NC 27101 Computer security consultancy; Computer security consultancy in the field of computer security; Computer security consultancy in the field of cybersecurity; Software as a service (SAAS) services featuring software for managing risk in the field of cybersecurity; Software as a service (SAAS) services featuring software for managing risk in the field of computer security;
CYBER SELF DEFENSE Carugati, Paul 421 Schuett St Algonquin IL 60102 Computer security consultancy;
CYBER SELF-DEFENSE CYBER SELF-DEFENSE 11100 N. AIRPORT RD. HAYDEN ID 83835 Computer security consultancy;
CYBER VIP PROTECTION Bullock, Christopher 637 42nd St Newport News VA 23607 Computer security consultancy; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized network access by bad actors and cybercriminals to help prevent the exposure of high-wealth, high-profile, and high-notoriety individuals to cybercrime and to help secure their sensitive and personal information; Computer security threat analysis for protecting data; Maintenance of computer software relating to computer security and prevention of computer risks;
CYBER-HOOD WATCH Makai Events Inc. 2629 Manhattan Ave, Suite 289 Hermosa Beach CA 90254 Computer security consultancy; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer virus protection services;
CYBER-ON-CALL FRONTIER MEDIA, INC. Suite 205 5904 Chapel Hill Blvd. Plano TX 75093 Computer security consultancy; Data security consultancy; Internet security consultancy; Maintenance of computer software relating to computer security and prevention of computer risks;
CYBER.THREAT.INTELLIGENCE CYTHINT INC. House G 155 Vicki Lane Owens Cross Roads AL 35763 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of red teaming in the nature of full-scope multi-layered attack simulations for testing an organization's security posture against real-time attacks, threat intelligence, green teaming in the nature of improving security resiliency through enhancements of security controls and capabilities and addressing of vulnerabilities identified through security analysis, and vulnerability assessments; Computer security consultancy in the field of cyber security, security engineering, threat intelligence, program management, information system security, threat analytics, and security management; Computer security service, namely, hard drive erasure; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security threat analysis for protecting data; Data security consultancy; Design and development of electronic data security systems; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Internet security consultancy; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks;
CYBERKOV Cyberkov Al-Gawali Complex, Al-Shuhada Street Block 5, Building No.1, 10th floor Sharq, Kuwait City 15461 Kuwait Computer security consultancy; Consulting in the field of information technology;
CYBERNINES CyberNINES Suite 600 316 West Washington Avenue Madison WI 53703 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Data security consultancy; Development of security systems and contingency planning for information systems; Internet security consultancy;
CYBERSECURITY OPERATIONS-AS-A-SERVICE (COAAS) Cyber Defense International 2008 MENDENHALL CIR ATLANTA GA 30341 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Data security consultancy;
CYBER_PSD_DEVGRP Cyber_PSD_Dev_Grp 1000 E Seneca Ave Wasilla AK 99654 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software, system, network and social network threat assessment and mitigation;
CYBLE Cyble Pty Ltd Cyble Craigieburn VIC 3064 Australia Computer security consultancy; Computer security engineering; Computer security services (design and development of secure computer hardware, software and systems); Computer security services (programming and software installation repair and maintenance services); Computer security services (testing and risk assessment of computer networks); Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Data security consultancy; Internet security consultancy;
CYBRI CYBRI Co. Suite 525 433 Broadway New York NY 10013 Computer security consultancy in the field of scanning and penetration testing of computers, software and networks to assess information security vulnerability; Testing of security systems; Design, development, and consulting services related thereto in the field of information technology security;
CYBRILL CYBRILL Taft Stettinius & Hollister LLP One Indiana Square, Suite 3500 Indianapolis IN 46204 Computer security consultancy; Internet security consultancy; Cyber security services, namely, restricting unauthorized access to computer services; Advisory services relating to computer security, cyber security, and data breaches; Custom design and configuration of computer networks for third parties; Design, research and development of electronic data security systems; Computer programming and software design; Design, development and implementation of computer and internet security software; Maintenance of computer software relating to computer security and prevention of computer risks; Computer security risk mitigation strategies, namely, development and implementation of databases for use in the fields of cyber security, cyber threat detection, and prevention and mitigation of cyber risks; Computer forensic investigations; Monitoring of computer systems for data security purposes; Computer system analysis; Technical support services, namely, remote and on-site infrastructure management services for administration and management of public and private computer application systems; Consulting services in the field of cloud computing; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Aiding with, namely, computer software design for others, computer software development, maintenance of computer software, and troubleshooting of computer software problems for security information and event management (SIEM) software for searching, monitoring, troubleshooting, providing operational intelligence and business analytics of client data;
CYNAAFA RSIGNIA, INC. 5222 SWEET MEADOW LANE CLARKSVILLE MD 21029 Computer security consultancy; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities;
CYOLOGY.IO Cyology.IO 631 North Highlander Way Addison IL 60101 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of managed cyber security services; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to business assets; Computer security services, namely, restricting unauthorized network access by users without credentials; Computer security threat analysis for protecting data; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks;
CYPAC Seress 2800 Woodlawn Drive #295 Honolulu HI 96822 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
CYPHY SMFS, Inc. 1010 Corporate Drive, Suite 350 Stafford VA 22554 Computer security consultancy, namely, risk, vulnerability, and threat management and assessment in the field of vulnerability to breaches of critical infrastructure, industrial control systems, the internet of things, medical IT devices, and connected mobility systems;
CYTELLIX CYTELLIX CORPORATION Suite 215 85 Argonaut Aliso Viejo CA 92656 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
CYTHINT CYTHINT INC. House G 155 Vicki Lane Owens Cross Roads AL 35763 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of red teaming in the nature of full-scope multi-layered attack simulations for testing an organization's security posture against real-time attacks, threat intelligence, green teaming in the nature of improving security resiliency through enhancements of security controls and capabilities and addressing of vulnerabilities identified through security analysis, and vulnerability assessments; Computer security consultancy in the field of cyber security, security engineering, threat intelligence, program management, information system security, threat analytics, and security management; Computer security service, namely, hard drive erasure; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security threat analysis for protecting data; Data security consultancy; Design and development of electronic data security systems; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Internet security consultancy; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks;
DARK NEBULA DARK NEBULA SECURITY 600 Boulevard South SW Suite 104A Huntsville AL 35802 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer technology consultancy; Internet security consultancy;
DARK SIDE INTELLIGENCE Umbra Data, Inc. 75 E Santa Clara St. #1150 San Jose CA 95113 Computer security consultancy;
DATA REFINERY The Data Refinery 530 S LAKE AVE, STE. 450 Pasadena CA 91101 Computer security consultancy; Computer services, namely, creating, maintaining, designing and implementing web sites for others; Designing and creating web sites for others; Designing and creating web sites for others; Hosting of web sites; Maintenance of computer software relating to computer security and prevention of computer risks; Providing on-line non-downloadable geographic information system (GIS) software;
DECEPTIVE NETWORKING 802 Secure 111 Lindbergh Avenue, Suite F Livermore CA 94551 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;
DEEP PACKET THREAT MANAGEMENT CLOUDCOVER IP 740 Southcross Drive West, Suite 105 Burnsville MN 55306 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
DEFENDIFY DEFENDIFY, INC. 175 LANCASTER STREET, SUITE 216 PORTLAND ME 04101 Computer security consultancy; Computer security consultancy in the field of firewalls and computer security; Data security consultancy; Monitoring of computer systems for detecting unauthorized access or data breach; Creation and maintenance of web sites for others; Design and development of computer hardware and software; Design and development of electronic data security systems; Electronic monitoring of the computer systems of others for technical purposes using computers and sensors;
DERISK Derisk Corp. 645 Zermatt Drive Waterloo, Ontario N2T2V2 Canada Computer security consultancy; cybersecurity consultancy; software as a service (SAAS) services featuring software for enabling others to access and use a virtual cybersecurity expert software platform for assessing and mitigating information security vulnerabilities;
DETECTEAM SIMATAC INC. #5102 2261 Market Street San Francisco CA 94114 Computer security consultancy; Computer security threat analysis for protecting data; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Development of customized software for others for use in risk assessment, information security, computer security and security breach analysis; Application service provider featuring application programming interface (API) software and web interfaces for network security and vulnerability assessments, and for transmitting alerts to a log management system;
DIGITAL IS THE CULTURE IBOX Global 1000 Park Avenue NE Unit 1601 Atlanta GA 30326 Computer security consultancy; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, troubleshooting of industrial process control computer software problems;
DNELABS DNE Technologies 107 Ortegon Ave Caparra Gallery Bldg., Suite 211 Guaynabo 00966 Puerto Rico Computer security consultancy in the field of identity management meant to identify and eliminate vulnerabilities in digital transactions;
EC:SECURE EC Wise, Inc. 101 Glacier Point Rd San Rafael CA 94901 Computer security consultancy;
EMBERSEC BY LIGHT PROFESSIONAL IT SERVICES 8484 Westpark Drive, Suite 600 McLean VA 22102 Computer security consultancy; Computer security consultancy in the field of vulnerability assessment, security control validation, exercise support, penetration testing, threat emulation, and red teaming; Computer security consultancy in the field of managed detection and response, endpoint detection and response, network security monitoring, continuous monitoring, and email threat protection and response; computer consultancy services to detect and mitigate computer network security and compliance risks; technology advisory services related to computer security; Data security consultancy, namely, monitoring, analyzing, and evaluating cyber security equipment, systems, and processes of others;
ENAXY Enaxy Holdings 2811 Safe Harbor Drive Lewisville TX 75056 Computer security consultancy, namely, assessing, elevating, deploying, and managing cybersecurity programs for industrial based clients;
ENCODED FORTRESS ENCODED FORTRESS Ste 104 #679 1404 S Main Chapel Way Gambrills MD 21054 Computer security consultancy; Computer security threat analysis for protecting data; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Data encryption services; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Data security consultancy; Design and development of computer hardware; Design and development of computer software; Design and development of electronic data security systems; Information technology consulting services; Providing technology information in the field of cybersecurity, cyber policy and law; Computer programming consultancy in the field of cybersecurity, cyber policy and law; Computer services, namely, encrypted data recovery services; Consulting in the field of information technology; Providing information in the fields of technology and software development via an on-line website; Providing information relating to computer technology and programming via a website; Providing information relating to computer technology via a website; Providing a web site that features information on computer technology and programming; Provision of information relating to computer technology via a website; Technology consultation in the field of cybersecurity;
ENGINE ROOM Engine Room Technology Company 1818 Market Street, Suite 3310 Philadelphia PA 19103 Computer security consultancy in the field of scanning and penetration testing of software, websites, mobile applications, computers and networks to assess information security vulnerability; Computer technology consultancy; Software design and development; Web site development for others;
ENLIGHTENING THE FUTURE OF CYBERSECURITY SOLUTIONS! Captiva Solutions 6301 Ivy Lane, Suite 612 Greenbelt MD 20770 Computer security consultancy in the field of Strategic Technology Consulting, Cybersecurity Strategy, Road-map Development and Cybersecurity Policy Development;
ENQUANTA VoiceIt Technologies, Inc. 1209 Orange Street Wilmington DE 19801 Computer security consultancy; Computer network security consultancy; Data security consultancy; Telecommunication network security consultancy; provides Quantum Cyber Resiliency via Quantum Encryption Methodologies and Facial and Voice Biometric Access control;
ENSILO enSilo Inc. Maskit 6 Herzliya 4673332 Israel Computer security consultancy in the fields of security and vulnerability of software against advanced persistent threats, malware and malicious attacks after network infiltration in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security, and preventing and mitigating of computer risks after network infiltration; Design and development of computer software and computer software platforms for real-time detection, prevention, removal and remediation of advanced persistent threats, malware and malicious attacks after network infiltration in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; Application service provider (ASP) featuring software for use in real-time detection, prevention, removal and remediation of advanced persistent threats, malware and malicious attacks after network infiltration in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices;
ENTERPRISE MAINTENANCE-CENTERED CYBERSECURITY Ameri-X-Guard Inc. PO Box 639 Spotsylvania VA 225530639 Computer security consultancy;
EPIPHANY Digitalware, Inc. One Penn Plaza, 36th Floor New York NY 10119 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Data security consultancy;The mark consists of the wording EPIPHANY in stylized font. To the right of this wording is a pattern of circles in different sizes forming the shape of a circle.;Computer software platforms, downloadable, for assessment of cyber security risk;
EXERO INSIGHT TO FORESIGHT PSB EXERO 43 River Road Nutley NJ 07110 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
FOCIVITY Gehrisch, Matthew 564 Willey Road Delaware OH 43015 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of asset discovery; Computer security consultancy in the field of continuous real-time threat monitoring, correlation, and alerting; Computer security audits, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of vulnerability assessment; Computer security consultancy in the nature of advising on appropriate compliance frameworks, policy documentation, process improvement, business continuity, and disaster recovery planning; Computer security consultancy in the field of threat intelligence, forensics, and response; Computer security consultancy in the field of network intrusion detection; Computer security threat analysis for protecting data; Computer services, namely, remote management of the information technology (IT) systems of others; Consulting in the field of information technology; Information technology consulting services; Planning, design and management of information technology systems; Computer network configuration services; Computer network design for others; Updating of computer software relating to computer security and prevention of computer risks; Professional computer services, namely, network analysis, LAN/WAN design, wireless engineering, virtualization and computer project management; Data security consultancy; Cybersecurity consulting services, namely, assessing and advising on cybersecurity audit processes, change management processes, and misconfigurations; Cybersecurity audits and risk assessments; Computer security consultancy in the field of cybersecurity roadmap development and cybersecurity policy development; Testing, analysis, and evaluation of cybersecurity policies, procedures and documentation processing to assure compliance with information security laws, regulations, and standards;
FOLLOW THE DATA INFORISKCONSULTANCY 3028 EDWARD STEC BLVD EDISON NJ 08837 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Consulting in the field of information technology; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of computer-based information systems for businesses; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Information technology consulting services;
FORTEFY Madalos 19 Commercial St, 3rd Floor Portland ME 04101 Computer security consultancy in the field of cybersecurity; Computer security consultancy in the field of system threat analysis and data protection; Computer security threat analysis for protecting data; Maintenance of computer software relating to computer security and prevention of computer risks;
FORTRESS Sword & Shield Enterprise Security, Inc. Suite 150 1431 Centerpoint Blvd. Knoxville TN 37932 Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer services, namely, remote management of the information technology (IT) systems of others;
FULL FORCE RED TEAM Redteam Security Training 5081 Saint Albans Bay Road Excelsior MN 55331 Computer security consultancy; Data security consultancy; Internet security consultancy;
FUNNY NAME SERIOUS SECURITY K3DES 9037 Larston Houston TX 77055 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.