IVANTI, INC.

 IVANTI, INC. contact information is shown below
Owner:IVANTI, INC.
Owner Address:10377 South Jordan Gateway, Suite 110 South Jordan UT 84095
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byIVANTI, INC.

Brand:

ACTIVE VULNERABILITY MANAGEMENT

Description:

computer software for use by system administrators and security professionals to manage security and compliance protocols within computer networks;

Category: COMPUTER SOFTWARE USE BY
Brand:

AVALANCHE

Description:

downloadable computer software for use in creating and managing wireless networks;

Category: DOWNLOADABLE COMPUTER SOFTWARE USE
Brand:

BOUNCER

Description:

Software to detect and prevent intrusion into a computer's core operating system;In the Statement, lines 1-4, should be deleted, and, LUMENSION SECURITY, INC. (DELAWARE CORPORATION), 8660 E. HARTFORD DRIVE, SUITE 300, SCHOTTSDALE, ARIZONA 85255 should be inserted.;

Category: SOFTWARE DETECT PREVENT
Brand:

CREATING CUSTOMERS FOR LIFE

Description:

computer software programs for use in task organizations and contact management and instruction manuals packaged as a unit for use by businesses in marketing and activities in a networked group and distributed environment; and for use by customer support personnel and technical support help desk personnel for use in managing telephone calls, providing caller profiles, diagnosing problems, assigning problems to appropriate personnel, and providing assistance in solving problems;CREATING CUSTOMERS;

Category: COMPUTER SOFTWARE PROGRAMS USE
Brand:

EVERYWHERE WORKPLACE

Description:

Downloadable computer software for information technology (IT) administration, monitoring, and management; Downloadable computer software for information technology (IT) security in the nature of patch software and user authentication software; Downloadable computer software for providing information technology (IT) help desk services and technology support services, namely, troubleshooting in the nature of diagnosing computer software and hardware problems; Downloadable computer software for locally and remotely accessing, modifying, and controlling information technology (IT) infrastructure, networks, systems, computer devices, servers and applications; Downloadable computer software for automating the administration, monitoring, and management of information technology (IT) infrastructure, networks, systems, computer devices, servers, and applications; Downloadable computer software for information technology (IT) data analytics; Computer hardware with embedded computer software platforms for security, management, collaboration and application services for mobile devices; Downloadable computer software platforms for security, management, collaboration and application services for mobile devices; Downloadable computer software platform for process and workflow automation; Downloadable computer programs and software application development tools for developing, customizing, and combining computer software applications and user interfaces for use in the information technology services management field; Downloadable computer software applications and computer programs for creating content and metadata for use in the information technology services management field; Downloadable computer programs for measuring and reporting on the programs and data files present on computer storage devices; Downloadable VPN (virtual private network) operating software; Downloadable software for computers, mobile devices and smartphones to secure remote access via the Internet to private computer networks; network access server hardware and downloadable operating software for network access servers; Downloadable computer software for use as a network client that provides connectivity, access, security and acceleration of secure network information, data, and applications through computers, mobile devices and smartphones; Computer hardware and Downloadable computer software for use in the transmission and sharing of global network traffic, data and information among computers, network servers and routers in the fields of providing network security, secure remote access, application traffic management and application acceleration; Computer hardware containing network security functionalities, namely, firewalls, data encryption, and interoperability with network security protocols; Downloadable computer software for traffic prioritization, secure access control, user identification, encryption, security management and intrusion prevention, and computer maintenance; Downloadable computer software for the back-up, storage, restoration and recovery of data, folders and files; Computer hardware and Downloadable computer software for providing network, Internet and computer security; Downloadable internet security software, namely, computer software for use in the monitoring and control of computer and online activity; Downloadable computer software for providing intrusion detection and prevention; Downloadable computer software for providing online identity protection, authentication of users, and privacy control; Computer hardware in the nature of devices and Downloadable computer software for encrypting and authenticating data; Downloadable computer software for enabling security and IT management systems to exchange information and mitigate network, security and operational issues; Downloadable computer software for network security and network security management and monitoring; Downloadable computer software for scanning mobile communications devices, and for assessing, reporting and preventing security risks and privacy risks on mobile communication devices; Downloadable internet security software, namely, mobile communication device firewall, and intrusion prevention, and anti-phishing software; Downloadable computer software for implementing security policies, spyware policies and privacy policies on a mobile communication device; none of the foregoing for use in connection with video game software, hardware and accessories;Providing remote user Internet access to archived data for mobile communication devices; providing remote user Internet access to mobile communication devices featuring firewalls, data encryption, and interoperability with network security protocol functions; none of the foregoing for use in connection with video game software, hardware and accessories;WORKPLACE;Software as a service (SAAS) services featuring enterprise software used to track, analyze and improve the performance and availability of applications and business services; Software as a service (SAAS) services featuring enterprise software for use in managing computer-based information systems; providing temporary use of online non-downloadable cloud-based software for use in developing, configuring, customizing and deploying software applications, managing business processes, and managing computer-based information systems; providing temporary use of online cloud-based non-downloadable software for information technology service management, managing computer-based information systems for businesses, information technology service automation, workflow and business process automation; Computer services, namely, remote management of the information technology (IT) systems of others; technical support services, namely, design, selection, implementation and use of computer software for others; consulting in the field of design, selection, implementation and use of computer software for others; Platform as a service (PAAS) featuring a computer software platform for use by others to develop, configure, customize, and deploy software applications; Consulting in the fields of cloud computing, software as a service (SAAS) and platform as a service (PAAS); Technical support services, namely, troubleshooting in the nature of diagnosing computer software and hardware problems in the fields of cloud computing, software as a service (SAAS) and platform as a service (PAAS); Software as a service (SAAS) services featuring software for information technology (IT) administration, monitoring, and management; Software as a service (SAAS) services featuring software for information technology (IT) security in the nature of patch software and user authentication; Software as a service (SAAS) services featuring software for providing information technology (IT) help desk services and technology support services; Software as a service (SAAS) services featuring software for locally and remotely accessing, modifying, and controlling information technology (IT) infrastructure, networks, systems, computer devices, servers and applications; Software as a service (SAAS) services featuring software for automating the administration, monitoring, and management of information technology (IT) infrastructure, networks, systems, computer devices, servers, and applications; Software as a service (SAAS) services featuring software for information technology (IT) data analytics; Software as a service (SAAS) services featuring software for the remote assessment, management, and deployment of software and supporting data; providing temporary use of non-downloadable software, namely, an enterprise mobility platform for security, management, collaboration and application services for mobile devices; Computer services, namely, cloud-based file sharing services in the nature of providing a website featuring technology enabling users to upload and download electronic files; providing online non-downloadable computer software for uploading, transferring, downloading, storing encryption and sharing data, documents, files, text, photos, images, graphics, music, audio, video and multimedia content with others via networks, computers, smart phones, tablet computers and other devices; Computer services, namely, online scanning, detecting, quarantining and eliminating of viruses and malware; Providing online non-downloadable software for risk and vulnerability analysis and security for computers, computer systems and computer networks; providing online non-downloadable software for operating and maintaining computer networks and servers and for network security; Application service provider (ASP) featuring software for use in network management of an enterprise fleet of wireless devices in a cross-platform environment comprising multiple mobile device third party operating systems; Application service provider featuring software for the detection, monitoring, and removal of security risks and privacy risks, for monitoring, protecting, and securing mobile communication devices and networks; Computer services for others in the fields of mobile communication device data, network data, network security, and privacy, security risks, and privacy risks, namely, software development and maintenance for managing mobile communication device data, security risks, and privacy risks; Technical support services for others in the fields of mobile communication device data, security risks, and privacy risks, namely, troubleshooting of mobile communication device software problems and diagnosing mobile communication device hardware problems; Platform as a service (PAAS) featuring computer software platform for process and workflow automation; Computer services, namely, software integration in the nature of integration of computer software into multiple systems and networks, configuration in the nature of computer programming services for others in the field of software configuration management, customization in the nature of customizing computer software, implementation of software, maintenance of computer software, technical support in the nature of troubleshooting of computer software problems and hosting services in the nature of hosting the software of others on a virtual private server; none of the foregoing for use in connection with video game software, hardware and accessories;

Category: DOWNLOADABLE COMPUTER SOFTWARE INFORMATION
Brand:

FIRST LEVEL SUPPORT

Description:

computer software programs in the nature of problem solving and providing information in the fields of computers, computing and information services;

Category: COMPUTER SOFTWARE PROGRAMS
Brand:

FRONTRANGE

Description:

Computer software to customize, configure, manage and automate operations and processes in the fields of information technology service management, information technology asset management, customer service management, customer service solutions and customer relationship management;

Category: COMPUTER SOFTWARE CUSTOMIZE
Brand:

FRONTRANGE

Description:

Educational services, namely, conducting webinars, classes, courses and training in the fields of information technology service management, information technology asset management, customer service management, customer service solutions and customer relationship management, and distribution of training material in connection therewith;FRONT RANGE;

Category: EDUCATIONAL SERVICES
Brand:

FRONTRANGE

Description:

FRONT RANGE;Design and development of computer software applications in the fields of information technology service management, information technology asset management, customer service management, customer service solutions and customer relationship management; cloud computing to customize, configure, manage and automate operations and processes in the fields of information technology service management, information technology asset management, customer service management, customer service solutions and customer relationship management; software as a service (SAAS) services featuring software for customizing, configuring, managing and automating operations and processes in the fields of information technology service management, information technology asset management, customer service management, customer service solutions and customer relationship management; platform as a service (PAAS) featuring computer software platforms for customizing, configuring, managing and automating operations and processes in the fields of information technology service management, information technology asset management, customer service management, customer service solutions and customer relationship management; consulting and technical support services in the field of design, selection, implementation and use of computer software for others; consulting in the fields of cloud computing, software as a service (SAAS) and platform as a service (PAAS); technical support services, namely, troubleshooting in the fields of cloud computing, software as a service (SAAS) and platform as a service (PAAS);

Category: FRONT RANGE
Brand:

FRONTRANGE

Description:

The mark consists of the word FRONTRANGE with the design of two inverted triangles to the left of the word.;Computer software to customize, configure, manage and automate operations and processes in the fields of information technology service management, information technology asset management, customer service management, customer service solutions and customer relationship management;FRONT RANGE;Color is not claimed as a feature of the mark.;

Category: