COMPUTER SECURITY SERVICES

Brand Owner (click to sort) Address Description
.BLOG Driven Innovations, Inc. 26932 Peppertree Drive Valencia CA 91381 Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates;Providing specific information as requested by customers via the Internet;
A SECURITY STRATEGY MUST BE LAYERED TENFOLD TENFOLD SECURITY CONSULTING 3930 North 108th Terrace Kansas City KS 66109 Computer security services, namely, restricting unauthorized access to cloud computing environments; Internet security consultancy; Software as a service (SAAS) services featuring software for building cloud-based software applications and for cloud computing environment security;
ACTIVE TRUST INFOBLOX INC. 2390 Mission College Boulevard, Ste. 501 Santa Clara CA 95054 Computer security services, namely, providing detection, diagnostic, and mitigation services designed to protect against online phishing, malware, brand and Domain Name System abuse;
AGENTLESS ENDPOINT ISOLATION Airgap Networks Inc. 3277 S. White Rd, Suite #168 San Jose CA 95148 Computer security services, namely, restricting unauthorized access to users, devices, network, applications, data and IT infrastructure; Computer security services, namely, restricting unauthorized access to users, machines, devices and applications; Computer security services, namely, restricting unauthorized network access by unauthorized users for use in protection of users, data and network assets; Computer services, namely, remote management of information technology (IT) systems of others comprised of network assets, data, users and devices; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for the purpose of protection of users, data and network assets; Computer services, namely, designing and implementing protection of users, data and network assets for others; Computer software development in the field of cybersecurity and internet security; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Design and development of computer software for protecting data and services; Design of computer networks and software for others for the protection of users, data and network assets; Design, development, and implementation of software for protection of users, data and network assets; Design, development, and implementation of software for providing user and device authentication services for business transactions; Electronic monitoring and reporting of network threat and risk using computers or sensors; Providing temporary use of online, non-downloadable enterprise software for detection and automated mitigation of cybersecurity risks and threats; Software as a service (SAAS) services, namely, hosting software for use by others for use use in protection of users, data and network assets; Software as a service (SAAS) services featuring software for detection and automated mitigation of cybersecurity risks and threats using artificial intelligence;
AGENTLESS ZERO TRUST ISOLATION Airgap Networks Inc. 3277 S. White Rd, Suite #168 San Jose CA 95148 Computer security services, namely, restricting unauthorized access to users, devices, network, applications, data and IT infrastructure; Computer security services, namely, restricting unauthorized access to users, machines, devices and applications; Computer security services, namely, restricting unauthorized network access by unauthorized users for use in protection of users, data and network assets; Computer services, namely, remote management of information technology (IT) systems of others comprised of network assets, data, users and devices; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for the purpose of protection of users, data and network assets; Computer services, namely, designing and implementing protection of users, data and network assets for others; Computer software development in the field of cybersecurity and internet security; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Design and development of computer software for protecting data and services; Design of computer networks and software for others for the protection of users, data and network assets; Design, development, and implementation of software for protection of users, data and network assets; Design, development, and implementation of software for providing user and device authentication services for business transactions; Electronic monitoring and reporting of network threat and risk using computers or sensors; Providing temporary use of online, non-downloadable enterprise software for detection and automated mitigation of cybersecurity risks and threats; Software as a service (SAAS) services, namely, hosting software for use by others for use use in protection of users, data and network assets; Software as a service (SAAS) services featuring software for detection and automated mitigation of cybersecurity risks and threats using artificial intelligence;
ALATIERE Alatiere, Inc. 8401 Colesville Road, Suite 500 Silver Spring MD 20910 COMPUTER SECURITY SERVICES, NAMELY COMPUTER NETWORK SECURITY MONITORING SERVICES AND FIREWALL SERVICES FOR OTHERS; COMPUTER MONITORING AND BACK-UP SERVICES, NAMELY MONITORING THE COMPUTER SYSTEMS OF OTHERS AND PROVIDING BACK-UP COMPUTER PROGRAMS AND FACILITIES;
ALLSTATE ALLSTATE INSURANCE COMPANY Allstate Plaza Northbrook IL 60062 Computer security services, namely, restricting unauthorized network access by users without credentials; computer security services for protecting personal data, personal communication, and information from unauthorized access by restricting unauthorized access to websites, computer networks, and hard drives hosted on the Internet;
ALWIL AVAST SOFTWARE S.R.O. PIKRTOVA 1737/1A Prague 4 CZ-14000 Czech Republic Computer security services, namely, monitoring of computer systems for security purposes;ALWIL has no meaning in a foreign language.;
ALWIL AVAST SOFTWARE A.S. MICHLE, BUDEJOVICKA 1518/76 PRAGUE 4 14000 Czech Republic Computer security services, namely, monitoring of computer systems for security purposes;ALWIL has no meaning in a foreign language.;
ALWIL Alwil Software, a.s. Prubezna 76, 100 000 Praha 10 Czech Republic Computer security services, namely, monitoring of computer systems for security purposes;ALWIL has no meaning in a foreign language.;
ANCHOR IT DatAnchor, Inc. 8000 Walton Parkway, Suite 224 New Albany OH 43054 Computer security services, namely, restricting unauthorized network access by anchoring data within a network; Computer security services, namely, restricting unauthorized access to data; Data security consultancy; Design and development of electronic data security systems; Development of security systems and contingency planning for information systems; Internet security consultancy;
ANSWERS, NOT ALERTS MANDIANT, INC. 11951 Freedom Drive, 6th Floor Reston VA 20190 Computer security services, namely, managed detection and response services in the nature of Technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices;
APPLICATION AUTHORITY Digicert, Inc. 2801 NORTH THANKSGIVING WAY SUITE 500 LEHI UT 84043 Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates;APPLICATION;
ARAMID Lyndon Lattie 1434E. Canary Dr. Tempe AZ 85297 Computer security services in the nature of administering digital certificates;
ATENSE Atense, Inc. 5761 Robbie Rd #3403 Plano TX 75024 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;
ATLAS CLOUD WORKSPACE HUMAN IT Suite 300 400 Mount Hood Street The Dalles OR 97058 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-site management of information technology (IT) systems of others; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems;
AUBIX AUBix 2353 Bent Creek Road, Suite 100 Auburn AL 36830 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of hosting computer software applications; Consulting in the field of configuration management for computer hardware and software; Data warehousing; Hosting internet sites for others; Hosting of digital content on the Internet; Server hosting;
BE THE HUNTER NOT THE PREY LMNTRIX Pty Ltd as trustee for LMNTRIX Unit Trust L5, 155 Clarence St SYDNEY NSW 2000 Australia Computer security services, namely, intrusion detection, detection of cyberthreats, detection of data breaches, providing data capture of computer systems, deception detection for cyber security, providing cyber forensic analysis of breaches, providing emulation of security systems, assessment of computer system infiltration, restricting unauthorized access to hard drives and computer networks, development of security systems for information systems, administering digital certificates, monitoring of computer systems for detecting unauthorized access; computer security consultancy; managed computer intrusion detection and incident response services, namely, monitoring of computer systems for detecting unauthorized access; managed computer security services, namely, administering digital certificates;
BE WEB STRONG WEB.COM GROUP, INC. 5335 GATE PARKWAY JACKSONVILLE FL 32256 Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Domain name registrar services; Domain name registration services; Identification verification services, namely, providing authentication of personal identification information via secure storage and transmitting such information via the Internet; Monitoring of computer systems for security purposes; Providing user authentication services in e-commerce transactions;
BEW GLOBAL PROOFPOINT, INC. 892 Ross Drive Sunnyvale CA 94089 Computer security services, namely, aggregating, managing and displaying security information, monitoring the security status of computer networks and connected devices, and generating security responses based on network alerts and selected metrics;GLOBAL;Technical support, namely monitoring technological functions of computer network systems, namely, monitoring and managing security-related hardware, software, and networks of others to provide protection of data, networks, hardware, and analysis of hardware and network activities that may require such protection from network intrusions; providing information updates on security threats to computer networks and protected data; provide consultation in the field of data security for assessing and protecting critical assets, identifying compliance issues, incident response support, and identifying technical and non-technical solutions;
BLOKWORX BLOKWORX, INC. Suite 199 700 Larkspur Landing Circle Larkspur CA 94939 Computer security services in the nature of the installation and maintenance of computer firewall hardware for third parties;BLOK WORK;Computer security consultancy; Computer security services in the nature of the installation and maintenance of computer firewall software for third parties; Computer security services in the nature of endpoint defense response and endpoint protection; Computer security services in the nature of penetration testing and vulnerability scanning and location; Computer security services in the nature of monitoring and providing alerts to third parties regarding threats and vulnerabilities; Computer security services in the nature of end-to-end threat prevention and detection services; Computer security services in the nature of providing security reports and metrics regarding third party systems, applications, virtualizations, and networks;
BRAND SECURITY McDonnell, Craig 81 Falcon Drive Highland Ranch CO 80126 Computer security services, namely, providing and managing virtual private networks, intrusion detection systems, firewalls, computer and information access control systems, computer vulnerability monitoring systems, risk management software, compliance management software, encryption technologies, and computer security configuration for businesses and government organizations on electronic communications networks; monitoring, managing and assessing computer networks security and related practices for others; consulting in the field of computer networks, data recovery, security, risk management, and compliance;
CAASM Chaasm Incorporated 5596 Westmoreland Rd Whitesboro NY 13492 Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to infrastructure and application services; Computer services, namely, cloud hosting provider services;
CARBON BLACK CARBON BLACK, INC. 1100 Winter Street Waltham MA 02451 Computer security services, namely, restricting and controlling access privileges of users of computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices, and of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; cloud computing featuring software for use in providing security for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) featuring software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; software as a service (SAAS) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; platform as a service (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (PAAS) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; providing online non-downloadable software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, endpoints, mobile phones and portable and handheld electronic devices; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, endpoints, mobile phones and portable and handheld electronic devices, including on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis;
CARDEROCK SOLUTIONS GROUP The Carderock Group 15819 Thistlebridge Drive Rockville MD 20853 Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Monitoring of computer systems for security purposes; Video monitoring of facilities, viewable through a global computer network, for security purposes; Providing a web site that features information on the development of international law, regulations, legal policies, and legal practices in a manner that promotes global governance by all types of organizations; Providing a web site featuring information on the development of privacy, security and data governance law;Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Maintenance of computer software relating to computer security and prevention of computer risks; Rental of computers relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Testing, analysis, and evaluation of computer network security to assure compliance with Federal and State governments, healthcare, financial, insurance, critical infrastructure, oil and gas, gaming and retail industry standards;
CCC DIGITAL KEY Car Connectivity Consortium 3855 SW 153rd Drive Beaverton OR 97003 Computer security services in the nature of administering digital keys and digital certificates, and providing authentication, issuance, validation, and revocation of digital keys and digital certificates; Software as a service (SAAS) services, namely, hosting software for use by others in the field of information security and for the administration, encryption, decryption, and authentication of data, for digital certificate issuance, verification, and management, and for the verification and management of digital keys and credentials; Authentication, issuance, and validation of digital certificates; Authentication and validation of internet of things devices; Computer security consulting about creating and implementing procedures and practices for issuing and managing digital certificates; Providing vehicle diagnostic information to customers regarding their vehicles via telecommunications networks; Computer services, namely, providing a web-based system and online portal featuring online non-downloadable software that enables users to access vehicle information, namely, motor vehicle functions and functions relating to driver safety, convenience, communication, entertainment, and navigation, and to allow users to track and locate stolen vehicles, and store and synchronize collected personalized user and vehicle information through a data cloud; Identification verification services, namely, providing authentication of personal identification information for others;CAR CONNECTIVITY CONSORTIUM DIGITAL KEY;Digital keys; Computer software for administering digital keys; Computer software for issuance and validation of digital certificates; Computer software for authentication, issuance, validation, and revocation of digital certificates; Computer software for administering digital certificates; Computer software for authentication of personal identification information; Computer software for authentication and validation of internet of things devices; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Downloadable or recorded computer software for authenticating computer users; Downloadable or recorded computer software for network and computer security; Downloadable or recorded computer software for accessing secure computer systems and services; Downloadable mobile applications for use with home and building automation systems; Downloadable mobile applications for controlling automated components of homes and buildings; Downloadable software, on-board computer software, and mobile application software that provides customized information about the functions and features of a motor vehicle and provides users the ability to remotely control features of their motor vehicle, namely, locking and unlocking vehicle doors, starting or turning off the vehicle, remotely check and control status of motor vehicle operating systems, namely, climate systems, defogging systems, engine oil life, fuel level, tire pressure and battery charge, connect to an advisor at a call center, locate a motor vehicle dealership and schedule maintenance and repair service, and request roadside assistance; Encoded keys in the nature of encoded key cards and electronic key fobs being remote control apparatus; USB web keys, namely, USB computer access control keys and USB computer security keys; Electrical access control apparatus in the nature of electronic access control systems for interlocking doors and electronic key fobs being remote control apparatus and computer programs in the nature of software for operating electronic key fobs and locking vehicles;The certification mark, as intended to be used by authorized persons, is intended to certify that goods manufactured or distributed by authorized persons and the services provided by authorized persons comply with designated standards pertaining to authentication, issuance, validation, and revocation of digital keys and digital certificates.;DIGITAL KEY;
CERT AND ALERT TechGuard Security Suite 1 1722 Corporate Xing O'Fallon IL 62269 Computer security services, namely, technical support and consulting including incident response, policy development, training and the design, selection, testing, scanning, assessing, monitoring, programming, implementation, installation, upgrading, updating, maintenance, repair and use of computer security hardware and software as well as the user manuals and technical and instruction manuals sold therewith;
CERTASSURE Certassure Inc. 1569 Glencrest Drive San Jose CA 95118 Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates;
CERTASSURE INC. CERTASSURE INC 1569 Glencrest Drive San Jose CA 95118 Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates;INC.;
CHAPERON X Inc. 853 Trail Ridge Drive Louisville CO 80027 Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates;
CINGO Cingo Solutions Suite #106 491 North Bluff Street Saint George UT 84770 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;
CLEARME Clear Screening Technologies 5910 S UNIVERSITY C-18, #336 GREENWOOD VILLAGE CO 80121 Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Electronic signature verification services using technology to authenticate user identity;
CLICKATELL SECURE Clickatell Corporation 303 Twin Dolphin Drive, Suite 600 Redwood City CA 94065 Computer security services, namely, verifying that a requested access to a computer system is from a person and not a machine and authenticating the identity of a person requesting access to a computer system;SECURE;
CLIENT SELECT SecureWorks Corp. Suite 500 One Concourse Parkway Atlanta GA 30328 Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts;Computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; technical support services in the field in the field of computer network security, namely, troubleshooting of computer hardware and software problems, monitoring the performance of computer networks and identifying technical solutions for computer network security problems;
CLOUDFS Panzura 5850 Granite Pkwy, Suite 450 Plano TX 75024 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Software as a service (SAAS) services featuring software for file system and data management in a hybrid cloud environment;
CNOS Sustainable Living Innovations, Inc. 1614 15th St, Suite 200 Denver CO 80202 Computer security services, namely, restricting unauthorized network access by implementing a firewall; Providing on-line non-downloadable software for providing a single access point to multiple applications related to building management;
CNOS Innovative Building Technologies 710 Second Avenue Suite 1400 Seattle WA 98104 Computer security services, namely, restricting unauthorized network access by implementing a firewall; Providing on-line non-downloadable software for providing a single access point to multiple applications related to building management;
COGNITIVE AUTHENTICATION Acceptto Corporation 529 SW 3rd Avenue, Ste 200 Portland OR 97204 Computer security services, namely, enforcing, restricting, and controlling access based on the privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; Computer security services, namely, enforcing, restricting and controlling access privileges of users of financial transaction computing resources for cloud, mobile or network resources based on assigned credentials; Providing user authentication services using biometric hardware and software technology for financial transactions, data access, and secure entry and exit door access to users and enforce and control access privileges of users;
COGNITIVE CONTINUOUS AUTHENTICATION Acceptto Corporation 529 SW 3rd Avenue, Ste 200 Portland OR 97204 Computer security services, namely, enforcing, restricting, and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; Computer security services, namely, enforcing, restricting, and controlling access privileges of users of financial transaction computing resources for cloud, mobile or network resources based on assigned credentials; Providing user authentication services using biometric hardware and software technology for financial transactions, data access, and secure entry and exit door access to users and enforce and control access privileges of users;
COMPROMISE NOTHING. Information Systems Integration 27 Royal Heights San Antonio TX 78257 Computer security services, namely, restricting unauthorized access to computer networks and digital information; Information technology consulting services in the field of computer security, data security, Internet security, and testing of electronic data security systems;
CONCEALSR CONCEAL, INC. 5180 Parkstone Dr., Suite 260 Chantilly VA 20151 Computer security services, namely, restricting unauthorized access to network computing resources and cloud, mobile, or network databases by distributing data across multiple cloud networks; computer security services, namely, restricting unauthorized access to network servers by providing a layer of network security on servers for the purpose of protecting data related to user information, location, and identity; computer security services, namely, restricting unauthorized access to network communications by shifting communications via multiple cloud-based infrastructures;Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network;CONCEAL SR;Business strategic planning services in the field of computer and network security solutions;
CONNECT TO MORE Blackfoot Telephone Cooperative, Inc. 1221 North Russell Street Missoula MT 59802 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to computers, servers, networks, and the data found within these devices; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Infrastructure as a service (IAAS) services, namely, hosting servers for use by others; Updating and maintaining cloud-based computer software through computer and server application and operating system updates, enhancements and patches;
CONTEXTUAL CLOUD SECURITY Lightspin Technologies Ltd. Derech Menachem Begin 150 Tel Aviv-Yafo Israel Computer security services, namely, threat analysis and intelligence; Computer security services, namely, vulnerability and threat assessment; Computer security services, namely, threat analysis for cloud, mobile or network resources;
CONTINUOUS BEHAVIORAL AUTHENTICATION Acceptto Corporation 529 SW 3rd Avenue, Ste 200 Portland OR 97204 Computer security services, namely, enforcing, restricting, and controlling access for cloud, mobile, Internet of Things (IOT) or network resources based on privileges, assigned credentials or behavior of users; Providing user authentication services utilizing biometric hardware and software for financial transactions, data access or secure entry or exit access;
CONTINUOUS BEHAVIORAL AUTHENTICATION SECUREAUTH CORPORATION 38 Discover, Suite 100 Irvine CA 92618 Computer security services, namely, enforcing, restricting and controlling access to cloud, mobile, Internet of Things (IoT), or network resources by means of authentication technology that continuously authenticates a user's identity based on contextual and behavioral data; Providing verification services, namely, user authentication services, utilizing software and biometric hardware for financial transactions, data access or secure entry by means of authentication technology that continuously authetnicates a user's identity based on contextual and behavioral data;
CREATIVE DIGITAL PROTECTION AGENCY Information Systems Integration 27 Royal Heights San Antonio TX 78257 Computer security services, namely, restricting unauthorized access to computer networks and systems through creative strategy and an untethered approach to technology solutions and vendors; Data security consultancy;
CREATIVE DIGITAL PROTECTION EFFECT Information Systems Integration 27 Royal Heights San Antonio TX 78257 Computer security services, namely, restricting unauthorized access to computer networks and systems through creative strategy and an untethered approach to technology solutions and vendors; Data security consultancy;
CRITICAL WATCH Achilles Guard Inc. 1400 Quorum Drive, Suite 330 Dallas TX 75254 computer security services, namely, network vulnerability management;
CRITICAL WATCH Achilles Guard Inc. 1400 Quorum Drive, Suite 330 Dallas TX 75254 computer security services, namely, network vulnerability management;
CRITICAL WATCH Alert Logic, Inc. 1776 Yorktown Street, Suite 150 Houston TX 77056 Computer security services, namely, security intelligence in the nature of monitoring computer systems for security purposes for protecting data and information from unauthorized access; computer security services, namely, risk assessment in the field of security threat analysis for protecting computer networks from unauthorized access;
CRYPTOMAN ZitoVault Inc. 2647 Gateway Road Suite 105-125 Carlsbad CA 92009 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;
CRYPTOSCALE ZitoVault Inc. 2647 Gateway Road Suite 105-125 Carlsbad CA 92009 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;
CRYPTOSCALER ZitoVault Inc. 2647 Gateway Road Suite 105-125 Carlsbad CA 92009 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;
CSG The Carderock Group 15819 Thistlebridge Drive Rockville MD 20853 Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Monitoring of computer systems for security purposes; Video monitoring of facilities, viewable through a global computer network, for security purposes; Providing a web site that features information on the development of international law, regulations, legal policies, and legal practices in a manner that promotes global governance by all types of organizations; Providing a web site featuring information on the development of privacy, security and data governance law;Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Maintenance of computer software relating to computer security and prevention of computer risks; Rental of computers relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Testing, analysis, and evaluation of computer network security to assure compliance with Federal and State governments, healthcare, financial, insurance, critical infrastructure, oil and gas, gaming and retail industry standards;
CSM Creative Breakthroughs, Inc. 1260 Library Street Detroit MI 48226 Computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer software monitoring services for protecting data and information from unauthorized access; computer security consultancy services; internet security consultancy services; data security consultancy services; information technology security consultancy services; business technology software consultation services; technical support services, namely, on-site and remote troubleshooting, resolving, and reporting problems with computer security, internet security, data security, information technology security, and business technology software consultation services;
CVC Civic Technologies, Inc. 548 Market St #45306 San Francisco CA 94104 Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Software as a service (SAAS) services featuring software for managing sales of digital assets and tokenized assets;
CYBER LABS INTERNATIONAL Brunet, Craig 10200 E Cinder Cone Trail Scottsdale AZ 85262 Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity;Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;
CYLOC Cyloc Solutions Suite 200 4500 Forbes Blvd Lanham MD 20706 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, cloud hosting provider services; Computer services, namely, integration of private and public cloud computing environments; Consulting services in the field of design and development of engineering processes; Consulting services in the field of home automation; Consulting services in the field of hosting computer software applications; Authentication, issuance and validation of digital certificates; Computer security consultancy; Computer services, namely, remote management of the information technology (IT) systems of others; Consulting in the field of information technology; Consulting services in the field of cloud computing; Creating and designing website based indexes of information for others using information technology; Creating website based indexes of information for others using information technology; Data security consultancy; Designing website based indexes of information for others using information technology; Franchising services, namely, planning and design of information technology systems for business franchises; Information technology consulting services; Internet security consultancy; IT consulting services; Outsource service provider in the field of information technology consulting; Outsource service providers in the field of information technology; Planning, design and management of information technology systems; Providing information in the fields of technology and software development via an on-line website; Providing information relating to computer technology and programming via a website; Providing consulting and advisory in the field of information technology to individuals, government agencies, and commercial organizations.; Providing technology information relating to oil and gas industry; Providing technology information updates for home security systems via the global computer network; Providing a web site that features information on computer technology and programming; Providing a website that features technology that enables the secure exchange of information by users; Providing virtual computer systems and virtual computer environments through cloud computing; Research services in the field of information and telecommunications technology; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Testing of security systems;
CYVENT Genventure Corporation 1395 Brickell Avenue, Suite 800 Miami FL 33131 Computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites, and cloud data storage; Computer security threat analysis for protecting data; Maintenance of computer software relating to computer security and prevention of computer risks; Computer security consultancy; Computer security consultancy in the field of cyber security, namely, evaluation of intrusion detection and prevention risks and capabilities, including risks and capabilities in relation to software applications and firewalls, and configuration of intrusion detection and prevention computer systems; Data security consultancy; Information technology consulting services; Internet security consultancy;
DATA CLOAKING DATA CLOAKING 67-35 KESSEL STREET FOREST HILLS NY 11375 Computer security services, namely, computer network security for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security services, namely, analysis of computer software, computer data, computer network, and computer hardware activities, security integration, computer network security, data storage, data transmission, data authentication, and data encryption, to protect data from malicious traffic, data loss, data corruption, malicious computer network intrusions, and cyber intrusion; computer security consulting services regarding scanning, monitoring, blocking, alerting, data authentication, data encryption and computer software, to protect data from malicious traffic, data loss, data corruption via computers and computer networks;
DECENTRALIZED PIN Hypr Corp. Ste 710 45 West 34th Street New York NY 10001 Computer security services, namely, restricting unauthorized network access by users without credentials; software as a service featuring software for use in providing secure access to desktops, workstations, and mobile devices and enabling recognition of user credentials;
DEEP CLOAK Nautilus Medical 117 S Cook St #247 Barrington IL 60010 Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates;
DIEFI FortKnoxster Ltd. Suite 23 Portland House ??Glacis Road Gibraltar GX111AA Gibraltar Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Providing temporary use of non-downloadable cloud-based software for storing and sharing data, documents, files, information, and multimedia content with others via global computer networks; Software as a service (SAAS) services featuring software for notifying beneficiaries of digital assets; Providing temporary use of on-line non-downloadable software for recovery of crypto currencies for use with digital asset allocation; Providing temporary use of on-line non- downloadable software for recovery of crypto currencies for providing information about digital asset notification, allocation, and protection; Software as a service (SAAS) services featuring software for recovery of crypto currencies for providing notification, allocation, and protection of digital assets, cryptocurrencies, and non-fungible tokens;
DIGICERT Digicert, Inc. 2801 NORTH THANKSGIVING WAY SUITE 500 LEHI UT 84043 Computer security services in the nature of providing issuance of digital certificates for others via a global computer network;
DIRECT CERT PORTAL Digicert, Inc. 2801 NORTH THANKSGIVING WAY SUITE 500 LEHI UT 84043 Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates;PORTAL;
DISRUPT. DEFEND. UNITE. CARBON BLACK, INC. 1100 Winter Street Waltham MA 02451 Computer security services, namely, restricting and controlling access privileges of users of computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices, and of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; cloud computing featuring software for use in providing security for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) featuring software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; software as a service (SAAS) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; platform as a service (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (PAAS) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; providing online non-downloadable software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, endpoints, mobile phones and portable and handheld electronic devices; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, endpoints, mobile phones and portable and handheld electronic devices, including on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis;
DUO CISCO TECHNOLOGY, INC. 170 West Tasman Drive San Jose CA 95134 Computer security services in the nature of providing user authentication for data security;Software as a service (SAAS) services, namely, hosting software for use by others for data security purposes by providing authentication;
DUO DUO SECURITY 170 WEST TASMAN DRIVE SAN JOSE CA 95134 Computer security services in the nature of providing user authentication for data security;Software as a service (SAAS) services, namely, hosting software for use by others for data security purposes by providing authentication;
DUO DEVICE INSIGHT Duo Security, Inc. 123 North Ashley Street, Suite 200 Ann Arbor MI 48103 Computer security services in the nature of providing user authentication for data security;Software as a service (SAAS) services, namely, hosting software for use by others for data security purposes by providing authentication;
DUO PUSH CISCO TECHNOLOGY, INC. 170 West Tasman Drive San Jose CA 95134 Computer security services in the nature of providing user authentication for data security;Software as a service (SAAS) services, namely, hosting software for use by others for data security purposes by providing authentication;
DYNAMIC DATA DEFENSE Cigent Technology Inc. 2211 Widman Way, Suite 150 Fort Meyers FL 33901 Computer security services, namely, restricting unauthorized network access by unauthorized users; Computer security services, namely, restricting unauthorized access to data via hard drives, networks or other data storage technology;
DYNAMIC DATA DEFENSE ENGINE Cigent Technology Inc. 2211 Widman Way, Suite 150 Fort Meyers FL 33901 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized network access by unauthorized users; Computer security services, namely, restricting unauthorized access to data without authorization;
DYNAMIC DEFENSE ENGINE Cigent Technology Inc. 2211 Widman Way, Suite 150 Fort Meyers FL 33901 Computer security services, namely, restricting unauthorized network access by unauthorized users; Computer security services, namely, restricting unauthorized access to data via hard drives, networks or other data storage technology;
DYNAMIC KEY I-Linke Inc. Attn: Victoria Teng or Joshua Tsui-Teng 13338 Fontaine Dr. Saratoga CA 95070 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of electronic data security systems;
DYNAMIC PASSWORD I-Linke Inc. Attn: Victoria Teng or Joshua Tsui-Teng 13338 Fontaine Dr. Saratoga CA 95070 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of electronic data security systems;
E-TRUST OBJECTIVE GROUP INC 299 ALHAMBRA CIR SUITE 403 CORAL GABLES FL 33134 Computer security services, namely, managing computer security systems for others; Computer security consultancy;
E-TRUST E-TRUST 299 Alhambra Cir #403 Coral Gables FL 33134 Computer security services, namely, managing computer security systems for others; Computer security consultancy;
EDGE SHIELD EDGE COMMUNICATIONS SOLUTIONS 6505 Windcrest Drive, Suite 200 Plano TX 75024 Computer security services, namely, restricting access to computer networks by verifying and authenticating users;
EDGILE Edgile, Inc. 560 S. Winchester Blvd. Suite 500 San Jose CA 95128 Computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities and technical consulting services in the field of identity management, namely, in the development and implementation of digital identity systems for authenticating, authorizing, and administering user identity and information over global computer networks;
ENTERPRISE PATROL Xapiens International Group, Inc. City View Plaza I, Suite 300 Carretera 165 Guaynabo 00969 Puerto Rico Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Monitoring of computer systems for security purposes; Security services, namely, threat simulation vulnerability analysis and mitigation and emergency and crisis response;
ENTERPRISE SCAN Xapiens International Group, Inc. City View Plaza I, Suite 300 Carretera 165 Guaynabo 00969 Puerto Rico Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Monitoring of computer systems for security purposes; Security services, namely, threat simulation vulnerability analysis and mitigation and emergency and crisis response;
EZIAM 8K Miles Software Services, Inc. 12647 Alcosta Boulevard, Suite 450 San Ramon CA 94583 Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; providing user authentication services for obtaining medical related information electronically; monitoring computer systems for security purposes;Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resource based on assigned credentials;
FEDRAMP United States General Services Administration 1800 F. Street, N.W. Washington DC 20405 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;
FEDRAMP United States General Services Administration 1800 F. Street, N.W. Washington DC 20405 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;
FYDE Fyde, Inc. 55 East 3rd Avenue San Mateo CA 94401 Computer security services, namely, detecting and providing protection against fraud, phishing, hacking, intrusion, cyberattacks, unauthorized access, identity theft, data theft, and deceptive or fraudulent communications and websites; Software as a service (SAAS) services featuring software for detecting and providing protection against fraud, phishing, hacking, intrusion, cyberattacks, unauthorized access, identity theft, data theft, and deceptive or fraudulent communications and websites; Consulting services in the field of computer security services, namely, detecting and providing protection against fraud, phishing, hacking, intrusion, cyberattacks, unauthorized access, identity theft, data theft, and deceptive or fraudulent communications and websites; Providing information in the field of computer security services, namely, detecting and providing protection against fraud, phishing, hacking, intrusion, cyberattacks, unauthorized access, identity theft, data theft, and deceptive or fraudulent communications and websites; Providing a website featuring articles, blog entries, hyperlinks, and information in the field of computer security services, namely, detecting and providing protection against fraud, phishing, hacking, intrusion, cyberattacks, unauthorized access, identity theft, data theft, and deceptive or fraudulent communications and websites;
FYLE Wilson, Cameron 518 S. Lamar Blvd. # 3 Oxford MS 38655 Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, cloud hosting provider services;
GHOST SECURITY Ghost Security Inc. 2407 S Congress Ave. E526 Austin TX 78703 Computer security services, namely, restricting unauthorized network access by web applications; Software as a service (SAAS) services featuring software for services featuring software for computer and network security;
GLOBAL IDENTITY FISCHER INTERNATIONAL IDENTITY 9045 Strada Stell Court, Suite 201 Naples FL 34109 Computer security services, namely, monitoring or controlling computer systems for security purposes;IDENTITY;Computer hardware and software consultation; Computer services, namely, acting as a shared service or provided service for controlling information technology resources and/or managing computer systems for others, namely, applications, infrastructure, namely, computer systems, operating systems, databases and directories, and related data for applications and infrastructure, namely, computer systems, operating systems, databases and directories;
GLOBAL THREAT INTEL Excelaca 32 Linwood Rd Fort Walton Beach FL 32547 Computer security services, namely, restricting unauthorized access to networks, systems, and websites;
GOLD GoldKey Security Corporation 26900 E. Pink Hill Rd. 26900 E. Pink Hill Rd. Independence MO 64057 Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates;
GOLD KEY ISC International Limited Suite 201 9700 W. Bluemound Road Milwaukee WI 53226 computer security services, namely, providing a digital data protection envelope by updating of computer software relating to computer security and prevention of computer risks using multiple encryption layers;
GREAT WALLS OF FIRE TechGuard Security Suite 1 1722 Corporate Xing O'Fallon IL 62269 Computer security services, namely, monitoring of computer systems for security purposes; computer security consultation, namely, providing computer security technical support, incident responses, policy development;
GWOF Techguard Security 743 Spirit 40 Park Drive Chesterfield MO 63005 computer security services, namely monitoring of computer systems for security purposes;computer consultation in the field of computer security, namely, providing computer security technical support in the nature of assessing, identifying and correcting threats to a computer network, incident responses in the nature of a 24/7 service to address compromises in computer networks, and policy development;
HONEYCOMBE POLYGRAPH MESH Inside-Out Defense Corporation 6352 Grand Oak Way San Jose CA 95135 Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer network security consultancy; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer system analysis; Creating an on-line community for Computer and Network Security; Data security consultancy; Development of security systems and contingency planning for information systems; Internet security consultancy; Maintenance of computer software relating to computer security and prevention of computer risks; Providing technology information updates for home security systems via the global computer network; Recording software protection programs and security programs onto magnetic media; Rental of computers relating to computer security and prevention of computer risks; Telecommunication network security consultancy; Testing of security systems; Testing, analysis, and evaluation of Polygraph Analysis to assure compliance with industry standards; Updating of computer software relating to computer security and prevention of computer risks;
HTLF Heartland Financial USA, Inc. Suite 600 700 Locust Street Dubuque IA 52001 Computer security services, namely, electronic monitoring of credit card and banking activity to detect fraud in the fields of credit cards, banking, electronic funds transfer, debit card and electronic check transactions via a global computer network; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer virus and malware protection services; electronic monitoring of credit card activity to detect fraud via the internet; user authentication services using technology for e-commerce transactions;
HUMAN ID TOOLOW 2721 Shattuck Ave 2721 Shattuck Ave, #288 Berkeley CA 94705 Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates;
IDEA AGNOSTIC Information Systems Integration 27 Royal Heights San Antonio TX 78257 Computer security services, namely, restricting unauthorized access to computer networks and systems through creative strategy and an untethered approach to technology solutions and vendors; Data security consultancy;
IDENTITY FOR ENTITIES Syntegrity Networks, Inc. Suite 390 2815 2nd Ave Seattle WA 98121 Computer security services, namely, restricting unauthorized access to computing resources;
IDTY CASTANEDA CHAVEZ, ROBERTO AUGUSTO CALLE LAS PERDICES 114,INT. 304,URB. SAN ISIDRO, LIMA 00051 Peru Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Design and implementation of software and technology solutions for the purpose of product and document authentication and tracking, and brand monitoring and protection, to protect against counterfeiting, tampering, and diversion, and to ensure the integrity of genuine products and documents; Design, development, and implementation of software for paperless authentication procedures; Electronic signature verification services using technology to authenticate user identity; Providing user authentication services using biometric hardware and software technology for e-commerce transactions; Providing user authentication services using blockchain-based software technology for cryptocurrency transactions; Providing user authentication services using single sign-on technology for online software applications; User authentication services using single sign-on technology for online software applications; User authentication services using technology for e-commerce transactions;
IID Digital Footprints International 2390 Mission College Boulevard, Ste 501 Santa Clara CA 95054 Computer security services, namely, providing detection, diagnostic, and mitigation services designed to protect against online phishing, malware, brand and Domain Name System abuse;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.