GOSECURE INC.

 GOSECURE INC. contact information is shown below
Owner:GOSECURE INC.
Owner Address:SUITE 1600 4225 EXECUTIVE SQUARE LA JOLLA CA 92037
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byGOSECURE INC.

Brand:

ACTIVE DEFENSE

Description:

Computer software for use in malware detection in personal computers and for use in computer security incident response; computer hardware; computer software for use in managing enterprise security for advanced persistent threat and advanced malware threats on computers; computer software and hardware relating to computer security and prevention of computer risks, namely, for incident response and computer security; computer hardware consisting of a server for use in managing enterprise security threats on computers;

Category: COMPUTER SOFTWARE USE
Brand:

COUNTERTACK

Description:

Computer hardware and software for use in computer security and protection;COUNTER TACK;

Category: COMPUTER HARDWARE SOFTWARE
Brand:

COUNTERTACK SENTINEL

Description:

computer software platform for use in computer and computer network security and protection;COUNTER TACK SENTINEL;

Category: COMPUTER SOFTWARE PLATFORM USE
Brand:

DELIVERING THE WORLD'S SAFEST INBOXES

Description:

Providing temporary use of on-line non-downloadable computer software, namely, web based data protection software, e-mail data protection software, e-mail continuity software for data recovery, e-mail archive software, email spam filters and e-mail encryption software;

Category: PROVIDING TEMPORARY USE ON LINE
Brand:

DIGITAL DNA

Description:

[ Computers, ] computer software, computer programs, computer shareware, and computer firmware for classifying data objects;DIGITAL;

Category: COMPUTERS
Brand:

EDGEWAVE

Description:

EDGE WAVE;Web, hardware, network, computer, e-mail and Internet security services, namely, restricting access to and by computer networks to and of undesired web sites, design and development of e-mail messaging security and electronic data security systems;

Category: EDGE WAVE
Brand:

EPRISM

Description:

E PRISM;Non-downloadable computer software, namely, web based data protection software, e-mail data protection software, e-mail continuity software, e-mail archive software, email spam filters and e-mail encryption software;

Category: E PRISM
Brand:

GOSECURE

Description:

GO SECURE;Business consulting services relating to the use and integration of technology to protect computer and internet information;Consulting services in the field of maintaining the security and integrity of databases; Security audits, namely, security assessment of physical locations, information systems, working environments;Computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities and enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials for the purpose of threat detection; Computer security response services, namely, emergency response services for computer security systems and computer network technology; Computer security consultation services in the field of protecting computer and internet information; Computer systems integration services for the purpose of protecting computer and internet information; Computer consultation in the field of computer and network security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies; Computer security services, namely, scanning and penetration testing of desktops, servers, routers, network devices, databases and applications for security audits;

Category: GO SECURE
Brand:

GOSECURE

Description:

Recorded and downloadable software platform for the detection and mitigation of cybersecurity incidents;GO SECURE;Providing temporary use of online non-downloadable software platform for the detection and mitigation of cybersecurity incidents;

Category: RECORDED DOWNLOADABLE SOFTWARE PLATFORM
Brand:

GOSECURE TITAN

Description:

GO SECURE TITAN;Providing temporary use of online non-downloadable software platform for the detection and mitigation of cybersecurity incidents; Software as a service (SAAS) services featuring software for managing responses to cybersecurity incidents; Software as a service (SAAS) services featuring software for remediation of cybersecurity incidents; Computer security consulting, advisory and computer security services in the nature of responding to cybersecurity threats, namely, restricting unauthorized access to computer networks; investigating, and analyzing cybersecurity incidents and data breaches; collecting, analyzing and monitoring technical, computer, and network data to identify potential cybersecurity events, risks, and improvements; analyzing cybersecurity data using artificial intelligence, deep learning, and machine learning software and algorithms; development and engineering of computer software systems to monitor, analyze and report on cybersecurity related events; performing computer security threat analysis for protecting data; penetration testing of computers and networks to assess information security vulnerability; assessments of IT applications, systems, infrastructure, and computer networks to assess information security vulnerability; analysis of cybersecurity performance, vulnerabilities, and risk;

Category: GO SECURE TITAN
Brand:

HBGARY

Description:

Computers, downloadable computer software, computer shareware, and computer firmware for use in memory forensics or computer incident response for classifying and analyzing data objects; downloadable computer programs for use in memory forensics or computer incident response for classifying and analyzing data objects in the computer security space; computer software for use in malware detection in personal computers and for use in computer security incident response; computer hardware; computer software for use in managing enterprise security for advanced persistent threat and advanced malware threats on computers; computer software and hardware relating to computer security and prevention of computer risks, namely, for incident response and computer security; computer hardware consisting of a server for use in managing enterprise security threats on computers; computer software and hardware for use in tracing, storing and logging data for the purpose of monitoring and preventing computer threats and risks; computer software relating to computer security and prevention of computer threats and risks; computer software for use in tracing data in a software application and logging the behavior of software programs as they execute;The name HBGARY does not identify a living individual.;[ Non-downloadable computer software and computer programs for use in memory forensics or computer incident response for classifying and analyzing data objects in the computer security space; non-downloadable computer software and hardware for use in managing enterprise security threats on computers; non-downloadable computer software and hardware for use in tracing, storing and logging data for the purpose of monitoring and preventing computer threats and risks; non-downloadable computer software relating to computer security and prevention of computer threats and risks; computer security incident response services relating to computer security, computer forensics and malware analysis; computer malware analysis services, namely, on-line scanning, detecting, quarantining and eliminating malware on computers and electronic devices; custom software development services related to memory forensics, malware analysis and computer incident response for classifying and analyzing data objects in the computer security space ];

Category: COMPUTERS
Brand:

INOCULATOR

Description:

Computer security software relating to computer forensics and malware analysis; computer software and computer programs for use in scanning, detecting, removing and blocking malicious software (malware) and other computer security threats over an enterprise network; computer software for use in managing enterprise security threats on computers; computer software relating to computer security and prevention of computer risks;

Category: COMPUTER SECURITY SOFTWARE RELATING
Brand:

IPRISM

Description:

Computer software for use in controlling and blocking user access to sites on a global computer network based on content;I PRISM;

Category: COMPUTER SOFTWARE USE
Brand:

RESPONDER

Description:

[ Computers, ] downloadable computer software for use in memory forensics or computer incident response for classifying and analyzing data objects in the computer security space; downloadable computer programs for use in memory forensics or computer incident response for classifying and analyzing data objects in the computer security space;Non-downloadable computer software for use in memory forensics or computer incident response for classifying and analyzing data objects in the computer security space;

Category: COMPUTERS
Brand:

THE WORLD'S SAFEST INBOXES

Description:

INBOXES;Providing temporary use of on-line non-downloadable computer software, namely, web based data protection software, e-mail data protection software, e-mail continuity software for data recovery, e-mail archive software, email spam filters and e-mail encryption software;

Category: INBOXES
Brand:

THREATTEST

Description:

Computer software, namely, data protection software, e-mail data protection software, e-mail continuity software for reading and sending e-mail messages during a business infrastructure failure and when the business infrastructure has been compromised, e-mail archive software, email spam filters and e-mail encryption software;THREAT TEST;Providing temporary use of on-line non-downloadable computer software, namely, web based data protection software, e-mail data protection software, e-mail continuity software for reading and sending e-mail messages during a business infrastructure failure and when the business infrastructure has been compromised, e-mail archive software, email spam filters and e-mail encryption software;

Category: COMPUTER SOFTWARE
Brand:

TITAN

Description:

Providing temporary use of an online non-downloadable software platform for the detection and mitigation of cybersecurity incidents for others; Software as a service (SAAS) services featuring software for managing responses to cybersecurity incidents for others; Software as a service (SAAS) services featuring software for remediation of cybersecurity incidents for others; Computer security consulting, advisory and management of computer security services in the nature of managing and responding to cybersecurity threats, namely, restricting unauthorized access to computer networks; managing investigating, and analyzing cybersecurity incidents and data breaches for others; collecting, analyzing and monitoring technical, computer, and network data to identify potential cybersecurity events, risks, and improvements for others; analyzing cybersecurity data using artificial intelligence, deep learning, and machine learning software and algorithms for others; development and engineering of computer software systems to monitor, analyze and report on cybersecurity related events for others; performing computer security threat analysis for protecting data for others; penetration testing of computers and networks to assess information security vulnerability for others; assessments of IT applications, systems, infrastructure, and computer networks to assess information security vulnerability for others; analysis of cybersecurity performance, vulnerabilities, and risk for others;

Category: PROVIDING TEMPORARY USE