Ubiqu B.V.

 Ubiqu B.V. contact information is shown below
Owner:UBIQU B.V.
Owner Address:Kerstant van den Bergelaan 13b Rotterdam 3054EM Netherlands
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byUbiqu B.V.

Brand:

STRONGPIN

Description:

Privacy protection software, namely, downloadable computer software for the storage of encrypted information and data to enable the user to safely use and control the encrypted information and data;STRONG PIN;Data security services, namely, providing software as a service (SAAS) services featuring software for the storage of encrypted information and data to enable the user to safely use and control the encrypted information and data;

Category: PRIVACY PROTECTION SOFTWARE
Brand:

UBIQU

Description:

Control equipment, namely, computer hardware, peripherals, and software for identifying, authenticating, verifying, disclosing, reporting, and authorizing users, user capacity, and user transactions; Control equipment, namely, computer hardware, peripherals, and software for providing security access to computer and global communication systems; Equipment for identifying, authenticating, verifying, disclosing, reporting, and authorizing users, user capacity, and user transactions, namely, hardware security modules, embedded controllers, and microprocessors; Equipment for providing security access to computer and global communication systems, namely, hardware security modules, embedded controllers, and microprocessors; Computer software for providing security access to locked doors in homes and buildings; Computer software for identifying, authenticating, verifying, disclosing, reporting and authorizing users access to a secure computer system;Physical security consultancy for the protection of tangible property and individuals; Security services for the protection of property and individuals, namely, monitoring of home security systems, personal medical alarms, personal security alarms, and surveillance systems for home or business; Personal and social services rendered by others to meet the needs of individuals, namely, opening of security locks for authorized home health professionals to the homes and premises of patients; Personal and social services rendered by others to meet the needs of individuals, namely, opening of security locks for authorized professional deliverers to physically deliver goods to the homes and premises of recipients; Lock opening services; Lock opening services in the nature of locksmithing, namely, opening of locks; Lock opening services in the nature of opening of security and door locks;Design and development of computer hardware, software, and equipment for identifying, authenticating, verifying, disclosing, reporting, and authorizing users, user capacity, and user transactions; Design and development of computer hardware, software, and equipment for providing security access to computer and global communication systems; Installing, maintaining and updating of software; Providing information and communication technology (ICT) services to others in the nature of technical consultation services in the field of computer hardware, peripherals, and software used for security systems; Providing information and communication technology (ICT) consulting services to others; Providing temporary use of non-downloadable computer software for identifying, authenticating, verifying, disclosing, reporting, and authorizing users, user capacity, and user transactions; Providing temporary use of non-downloadable computer software for providing security access to computer and global communication systems; Providing temporary use of nondownloadable computer software for providing security access to locked doors in homes and buildings; Providing temporary use of non-downloadable computer software used to operate, manage, and monitor security systems; Providing temporary use of nondownloadable computer software for identifying, authenticating, verifying, disclosing, reporting and authorizing users access to a secure computer system; Security services for the protection of property and individuals, namely, data security consultancy for verifying access to personal identification information; Security services for the protection of property and individuals, namely, monitoring of computer systems for detecting unauthorized access of computer and global communication systems in the fields of network security;

Category: CONTROL EQUIPMENT