COMPUTERIZED SECURITY SERVICES

Brand Owner (click to sort) Address Description
CALL-TRACK DSI-ITI 107 ST. FRANCIS STREET, 33RD FLOOR MOBILE AL 36602 Computerized security services, namely, providing automated low-risk offender monitoring for use by probation and parole officers using proprietary software to monitor parolees and probationers through the use of telephonic responses to automated questions; monitoring, for security purposes, parolees and probationers through the use of proprietary software providing automated questions by telephone;
COMPETITIVE THREAT INTELLIGENCE InfoArmor 7001 N. Scottsdale Road #2020 Scottsdale AZ 85253 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity;
DEFENSE GRADE CYBER SECURITY SERVICES The Macalan Group, Inc. 5825 Mark Dabling Blvd. Suite 160 Colorado Springs CO 80919 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Monitoring of computer systems for security purposes;CYBER SECURITY SERVICES;Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;
DELL DELL INC. One Dell Way Round Rock TX 78682 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity which typically indicate problems such as theft, wrongdoing, training issues, or customer service issues for legal service providers and law firms; Consulting services in the field of maintaining the security and integrity of databases for legal service providers and law firms;Technological planning and consulting services in the field of legal service providers and law firms; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for legal service providers and law firms; Consulting services in the field of cloud computing for legal service providers and law firms;
EQUINOX PAYMENTS Brookfield Equinox 703 Evans Avenue, Suite 400 Toronto, Ontario M9C5E9 Canada Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity which typically indicate problems such as theft, wrongdoing, training issues, or customer service issues;PAYMENTS;Computer services, namely, creating an on-line virtual environment for point-of-sale services;
EVENTITY VMWARE, INC. 3401 Hillview Avenue Palo Alto CA 94304 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consulting services in the field of maintaining the security and integrity of databases; Monitoring of computer systems for security purposes; Monitoring of security systems;Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of electronic data security systems; Maintenance of computer software relating to computer security and prevention of computer risks; Research in the field of intelligence and security technology;
EVENTITY E8 Security, Inc. 720 University Avenue, Suite 200 Palo Alto CA 94301 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consulting services in the field of maintaining the security and integrity of databases; Monitoring of computer systems for security purposes; Monitoring of security systems;Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of electronic data security systems; Maintenance of computer software relating to computer security and prevention of computer risks; Research in the field of intelligence and security technology;
FLEET 360 Fleet 360 Suite 603 601 Marquette Ave Minneapolis MN 55402 Computerized security services, namely, electronically monitoring, detecting, and reporting on suspicious and abnormal patterns of point of sale activity which typically indicate problems such as theft, wrongdoing, training issues, or customer service issues;
ID RESOLUTION'S WRAP. (WHOLESALE IDENTITY REPAIR AND PROTECTION PROGRAM) ID Resolution 80 MORRISTOWN ROAD UNIT 3B BERNARDSVILLE NJ 07924 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consultation in the field of data theft and identity theft; Financial identity monitoring services for fraud protection purposes; Fraud and identity theft protection services;
PHANTOM SPLUNK INC. 270 Brannan Street San Francisco CA 94107 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; consulting services in the field of homeland security; consulting services in the field of national security; monitoring of computer systems for security purposes; security consultancy;
PHOENIX FM SignatureLink, Inc. 605 Crescent Blvd. Suite 200 Rdigeland MS 39157 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Fraud detection services in the field of credit cards for on-line purchasing;
PINPOINT AUDIT SUPPLYLOGIX 6535 North State Highway 161 Irving TX 75039 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity;AUDIT;
PRECIPIO UnitedLex Corporation 6130 Sprint Parkway, Suite 300 Overland Park KS 66211 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consulting and legal services in the field of privacy and security laws, regulations, and requirements; Consulting services in the field of maintaining the security and integrity of databases; Security due diligence services for individuals or businesses traveling or opening an office overseas, in the nature of detailed foreign country briefings, vetting of local personnel, establishing host country government contacts, and providing information on sustainable security measures overseas; Security services, namely, providing security assessments of physical locations, information systems, and working environments;Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;
PROTECTING AMERICA THROUGH TECHNOLOGY Verified-Safe Suite G-147 102 Hartman Drive Lebanon TN 37087 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity which typically indicate problems such as theft, wrongdoing, training issues, or customer service issues; Identification verification services, namely, providing authentication of personal identification information; Identification verification services, namely, providing authentication of personal identification information via secure storage and transmitting such information via the Internet; Providing an interactive web site that facilitates the verification of a person's background credentials; Providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network;
SECURE SIGINT Mapes, Michael 3510 Hollycrest Drive Colorado Springs CO 80920 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity;SECURE;
STREAMLINED MACHINE LEARNING Features Analytics SA 2 rue de Charleroi 1400 Nivelles Belgium Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns in financial transactions, including eCommerce and point of sale activity indicating theft, fraud, or other criminal activity;Computer software consultancy and research services in the field of electronically monitoring, detecting and reporting on suspicious and abnormal patterns in financial transactions, including eCommerce and point of sale activity indicating theft, fraud, or other criminal activity; Computer modeling services in the field of electronically monitoring, detecting and reporting on suspicious and abnormal patterns in financial transactions, including eCommerce and point of sale activity indicating theft, fraud, or other criminal activity;
VERIFIED-SAFE Verified-Safe Suite G-147 102 Hartman Drive Lebanon TN 37087 Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity which typically indicate problems such as theft, wrongdoing, training issues, or customer service issues; Identification verification services, namely, providing authentication of personal identification information; Identification verification services, namely, providing authentication of personal identification information via secure storage and transmitting such information via the Internet; Providing an interactive web site that facilitates the verification of a person's background credentials; Providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network;
WE OPTIMIZE IT DATAPIPE, INC. 10 Exchange Place Jersey City NJ 07302 Computerized security services in the nature of monitoring the computers network systems of others for security purposes;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A security administration server providing various security services in the LAN and a host server operating in connection thereto are provided. There is installed a security administration server (S) having a function for collecting various log information managed in various devices to be monitored (C) operating in the LAN, a function for generating an image by extracting information useful for security management of the LAN from collected log information and visualizing such information to a form easy for a person to use, and a function for sending the image to another monitoring device (C). Further, the security administration server (S) provides various security services in connection with a host server (H) operating in an external network.