BLACK LANTERN SECURITY GOVERNMENT SERVICES

Brand Owner Address Description
BLS GOVERNMENT SERVICES BLS Government Services 1834 Summerville Avenue, Suite 250 North Charleston SC 29405 BLACK LANTERN SECURITY GOVERNMENT SERVICES;GOVERNMENT SERVICES;Software authoring; Software design and development; Software development in the framework of software publishing; Software porting; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of penetration testing; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to computer hardware and networks; Computer security services, namely, restricting unauthorized network access by outside parties; Computer security threat analysis for protecting data; Computer software consultancy; Computer software consulting; Computer software design and updating; Computer software design for others; Computer software design, computer programming, and maintenance of computer software; Computer software development; Computer software development and computer programming development for others; Computer software development in the field of mobile applications; Computer software development in the field of security and monitoring; Computer software development, computer programming and maintenance of computer software for audit; Computer software installation and maintenance; Computer programming and software design; Computer services, namely, integration of computer software into multiple systems and networks; Consultancy in the field of software design; Customizing computer software; Data security consultancy; Design and development of software in the field of mobile applications; Design and development of computer software; Design and development of electronic data security systems; Design and writing of computer software; Design, development and implementation of software; Design, development, and implementation of software for monitoring and auditing; Design, development, installation and maintenance of computer software; Design, installation, updating and maintenance of computer software; Design, maintenance, development and updating of computer software; Design, updating and rental of computer software; Design, upgrading and rental of computer software; Developing and updating computer software; Developing computer software; Developing of driver and operating system software; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of software for secure network operations; Installation and maintenance of computer software; Installation of computer software; Installation of security and monitoring software; Installation, maintenance, and updating of computer software; Internet security consultancy; Maintenance and updating of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Preparation, update, installation and maintenance of computer software; Providing a secure electronic online system featuring technology which allows penetration testing; Providing technology information updates for home security systems via the global computer network; Rental of application software; Renting computer software; Repair of software; Research and development of computer software; Research, development, design and upgrading of computer software; Services for maintenance of computer software; Smartphone software design; Technical support services, namely, troubleshooting of industrial process control computer software problems; Testing of security systems; Troubleshooting of computer software problems; Updating and design of computer software; Updating and maintenance of computer software; Updating and rental of software for data processing; Updating of computer software; Updating of computer software for others; Updating of computer software relating to computer security and prevention of computer risks; Writing and updating computer software;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A security administration server providing various security services in the LAN and a host server operating in connection thereto are provided. There is installed a security administration server (S) having a function for collecting various log information managed in various devices to be monitored (C) operating in the LAN, a function for generating an image by extracting information useful for security management of the LAN from collected log information and visualizing such information to a form easy for a person to use, and a function for sending the image to another monitoring device (C). Further, the security administration server (S) provides various security services in connection with a host server (H) operating in an external network.