Brands and Their Owners
NetWrix Corporation contact information is shown below | |
Owner: | NETWRIX CORPORATION |
---|---|
Owner Address: | 300 SPECTRUM CENTER DRIVE SUITE 200 IRVINE CA 92618 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
#COMPLETEVISIBILITY |
---|---|
Description: | Software for computer network applications relating to the administration and management of computer systems;#COMPLETE VISIBILITY; |
Category: | SOFTWARE COMPUTER NETWORK APPLICATIONS |
Brand: |
AUDITARCHIVE |
---|---|
Description: | Downloadable computer software for network applications relating to the administration and management of computer systems for the auditing and electronic storing of information;AUDIT OR ARCHIVE; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE NETWORK |
Brand: |
AUDITASSURANCE |
---|---|
Description: | Downloadable computer software for network applications relating to the administration and management of computer systems for the auditing and electronic storing of information; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE NETWORK |
Brand: |
AUDITINTELLIGENCE |
---|---|
Description: | Downloadable computer software for network applications relating to the administration and management of computer systems for the auditing and electronic storing of information;AUDIT INTELLIGENCE; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE NETWORK |
Brand: |
COMPLETE VISIBILITY |
---|---|
Description: | Software for computer network applications relating to the administration and management of computer systems; |
Category: | SOFTWARE COMPUTER NETWORK APPLICATIONS |
Brand: |
NETWRIX |
---|---|
Description: | computer software, namely, software for computer network applications relating to the administration and management of computer systems; |
Category: | COMPUTER SOFTWARE |
Brand: |
NETWRIX AUDITOR |
---|---|
Description: | Computer software for network applications relating to the administration and management of computer systems that may be downloaded from a global computer network;AUDITOR; |
Category: | COMPUTER SOFTWARE NETWORK APPLICATIONS |
Brand: |
PRIVILEGE SPRAWL INDEX |
---|---|
Description: | Downloadable documents in the field of internet security provided via a website; Downloadable software for managing user permissions to system networks; Downloadable software for scanning system networks for account information; Downloadable software for preventing malware attacks on system networks; Downloadable software for visualizing system network user preferences; Downloadable software for protecting system networks and reducing the chance of data breaches; Downloadable software for continuous monitoring of system security and risk; Downloadable software for controlling, limiting, and providing users' permission to access the system network; Downloadable software for analyzing user permissions to reduce risk to the system network; Downloadable software for creating time-based access to control user permissions;Computer software installation and maintenance; IT consulting services; Monitoring of computer systems for detecting unauthorized access or data breach; Providing a web site featuring technology that enables users to manage user permissions to system networks; Providing a web site featuring technology that enables users to scan system networks for account information; Providing a web site featuring technology that enables users to prevent malware attacks on system networks; Providing a web site featuring technology that enables users to visualize system network user preferences; Providing a web site featuring technology that enables users to protect system networks and reduce the chance of data breaches; Providing a web site featuring technology that enables users to continuously monitor system security and risk; Providing a web site featuring technology that enables users to control, limit, and provide users' permission to access the system network; Providing a web site featuring technology that enables users to analyze user permissions to reduce risk to the system network; Providing a web site featuring technology that enables users to use time-based access to control user permissions; Providing on-line non-downloadable software for managing user permissions to system networks; Providing on-line non-downloadable software for continuous monitoring of system security and risk; Providing on-line non-downloadable software for scanning system networks for account information; Providing on-line non-downloadable software for preventing malware attacks on system networks; Providing on-line non-downloadable software for creating time-based access to control user permissions; Providing on-line non-downloadable software for visualizing system network user preferences; Providing on-line non-downloadable software for protecting system networks and reducing the chance of data breaches; Providing on-line non-downloadable software for controlling, limiting, and providing users' permission to access the system network; Providing on-line non-downloadable software for analyzing user permissions to reduce risk to the system network; |
Category: | DOWNLOADABLE DOCUMENTS FIELD |
Brand: |
REMEDIANT |
---|---|
Description: | IT consulting services; Computer software installation and maintenance; Monitoring of computer systems for detecting unauthorized access or data breach; |
Category: | IT CONSULTING SERVICES |
Brand: |
REMEDIANT PAM+ |
---|---|
Description: | The mark consists of a shield containing an artistic rendering of a cresting wave to the left of the words REMEDIANT PAM+.;Downloadable documents in the field of internet security provided via a website; Downloadable computer software for managing user permissions to system networks; Downloadable computer software for scanning system networks for account information; Downloadable computer software for preventing malware attacks on system networks; Downloadable computer software for visualizing system network user preferences; Downloadable computer software for protecting system networks and reducing the chance of data breaches; Downloadable computer software for continuous monitoring of system security and risk; Downloadable computer software for controlling, limiting, removing, and providing users' permission to access the system network; Downloadable computer software for analyzing user permissions to reduce risk to the system network; Downloadable computer software for creating time-based access to control user permissions;REMEDIANT PAM PLUS;Color is not claimed as a feature of the mark.;Computer software installation and maintenance; Information technology (IT) consulting services; Monitoring of computer systems for detecting unauthorized access or data breach; Providing a web site featuring technology that enables users to manage user permissions to system networks; Providing a web site featuring technology that enables users to scan system networks for account information; Providing a web site featuring technology that enables users to prevent malware attacks on system networks; Providing a web site featuring technology that enables users to visualize system network user preferences; Providing a web site featuring technology that enables users to protect system networks and reduce the chance of data breaches; Providing a web site featuring technology that enables users to continuously monitor system security and risk; Providing a web site featuring technology that enables users to control, limit, and provide users' permission to access the system network; Providing a web site featuring technology that enables users to analyze user permissions to reduce risk to the system network; Providing a web site featuring technology that enables users to time-based access to control user permissions; Providing on-line non-downloadable software for managing user permissions to system networks; Providing on-line non-downloadable software for continuous monitoring of system security and risk; Providing on-line non-downloadable software for scanning system networks for account information; Providing on-line non-downloadable software for preventing malware attacks on system networks; Providing on-line non-downloadable software for creating time-based access to control user permissions; Providing on-line non-downloadable software for visualizing system network user preferences; Providing on-line non-downloadable software for protecting system networks and reducing the chance of data breaches; Providing on-line non-downloadable software for controlling, limiting, and providing users' permission to access the system network; Providing on-line non-downloadable software for analyzing user permissions to reduce risk to the system network; Computer security consultancy, namely, support services in the field of internet security provided via a website; Computer security consultancy, namely, support services for managing user permissions to system networks; Computer security consultancy, namely, support services for scanning system networks for account information; Computer security consultancy, namely, support services for preventing malware attacks on system networks; Computer security consultancy, namely, support services for visualizing system network user preferences; Computer security consultancy, namely, support services for protecting system networks and reducing the chance of data breaches; Computer security consultancy, namely, support services for continuous monitoring of system security and risk; Computer security consultancy, namely, support services for controlling, limiting, removing, and providing users' permission to access the system network; Computer security consultancy, namely, support services for continuous monitoring of system security and risk; Computer security consultancy, namely, support services for analyzing user permissions to reduce risk to the system network; Computer security consultancy, namely, support services for continuous monitoring of system security and risk; Computer security consultancy, namely, support services for creating time-based access to control user permissions; |
Category: |