C2I

Welcome to the Brand page for “C2I”, which is offered here for Computer hardware and software for telecommunication surveillance, for interception, filtering and analyzing data and voice communications; computer hardware and software for telecommunication surveillance, for interception, filtering and analyzing communications on social networks, mobile applications, chat applications, webmail services, voice over ip and video over ip; graphical user interface software used by communications service providers to assure compliance with telecommunications and electronic privacy and security laws, regulations and requirements; graphical user interface software used by law enforcement to manage lawful interception and data retention requests; computer software for crawling websites and gathering data for analysis; cellular, wireless, and mobility communication signal monitoring apparatus comprised of computer software and hardware for the purpose of identifying, intercepting, controlling, and locating wireless phones and handheld devices and managing collected information; portable camera for use in surveillance; cellular, wireless, and mobility communication signal monitoring apparatus comprised of computer software and hardware for the purpose of locating maritime vessels and managing collected information;c 2i;computer security consultancy; computer services, on-line scanning, detecting, quarantining and eliminating of viruses, worms, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer virus protection services; design and development of computer software and hardware for computer virus protection;.

Its status is currently believed to be active. Its class is unavailable. “C2I” is believed to be currently owned by “Verint Systems Inc.”

Owner:
VERINT SYSTEMS INC.
Owner Details
Description:
Computer hardware and software for telecommunication surveillance, for interception, filtering and analyzing data and voice communications; computer hardware and software for telecommunication surveillance, for interception, filtering and analyzing communications on social networks, mobile applications, chat applications, webmail services, voice over IP and video over IP; graphical user interface software used by communications service providers to assure compliance with telecommunications and electronic privacy and security laws, regulations and requirements; graphical user interface software used by law enforcement to manage lawful interception and data retention requests; computer software for crawling websites and gathering data for analysis; cellular, wireless, and mobility communication signal monitoring apparatus comprised of computer software and hardware for the purpose of identifying, intercepting, controlling, and locating wireless phones and handheld devices and managing collected information; portable camera for use in surveillance; cellular, wireless, and mobility communication signal monitoring apparatus comprised of computer software and hardware for the purpose of locating maritime vessels and managing collected information;C 2I;computer security consultancy; computer services, on-line scanning, detecting, quarantining and eliminating of viruses, worms, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer virus protection services; design and development of computer software and hardware for computer virus protection;
Categories: COMPUTER HARDWARE SOFTWARE