Brands and Their Owners
iSIGHT Security inc. contact information is shown below | |
Owner: | ISIGHT SECURITY INC. |
---|---|
Owner Address: | 8333 Douglas Avenue, Suite 1460 Dallas TX 75225 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
GEOSIGHT |
---|---|
Description: | Communications computer software for use in geo-locating logical network addresses, namely, for use in locating the physical proximity of a computer address based on the measure of time;GEO SIGHT; |
Category: | COMMUNICATIONS COMPUTER SOFTWARE USE |
Brand: |
ISIGHT |
---|---|
Description: | Training in the use of a simulated enterprise network computer environment, said simulation consisting of simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely, router firewalls, proxy servers and network address translation devices, for the foregoing equipment for computer security interdiction training; Educational testing services, namely, the testing of others in the field of computer security interdiction, using a simulated enterprise network computer environment, said simulation consisting of simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely router firewalls, proxy servers and network address translation devices, for the foregoing equipment; Organizing educational competitions in the field of computer security interdiction, using a simulated enterprise network computer environment, said simulation consisting of simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely router firewalls, proxy servers and network address translation devices, for the foregoing equipment; Providing training in the use of computers for all aspects of computer network attack, defense, response and investigation;Financial risk management; financial risk management consultation;I SIGHT;Business risk management; business risk management consultation;Consulting services in the field of maintaining the security and integrity of databases; consulting services in the field of national security;Computer consultation in the field of computer security; research in the field of intelligence and security technology; |
Category: | TRAINING USE |
Brand: |
ISIGHT PARTNERS |
---|---|
Description: | [Risk management; risk management consultation];INTERNET SIGHT PARTNERS;[Consulting services in the field of maintaining the security and integrity of databases; consulting services in the field of national security];PARTNERS;Computer consultation in the field of computer security; research in the field of intelligence and security; |
Category: | RISK MANAGEMENT |
Brand: |
ISIGHT SECURITY |
---|---|
Description: | Risk management; Risk management consultation;I SIGHT SECURITY;consulting services in the field of maintaining the security and integrity of databases; consulting services in the field of national security; monitoring security systems and, consulting and legal services in the field of privacy and security laws, regulations, and requirements;SECURITY;computer consultation in the field of computer security; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; research in the field of intelligence and security; |
Category: | RISK MANAGEMENT |
Brand: |
SECURITY BEYOND THE EDGE |
---|---|
Description: | Financial risk management; Financial risk management consultation;Consulting services in the field of maintaining the security and integrity of databases; consulting services in the field of national security;SECURITY;Computer consultation in the field of computer security; research in the field of intelligence and security; |
Category: | FINANCIAL RISK MANAGEMENT |
Brand: |
THREATSCAPE |
---|---|
Description: | In the statement, column 1, line 11, computer, is deleted, and lines 12, 13, and 14, are deleted; and in line 15, individuals and facilities; is deleted. In the statement, column 2, line 4, monitoring, is deleted and lines 5, 6, 7, and 8 are deleted.;[ Risk management; Risk management consultation ];[ Consulting services in the field of maintaining the security and integrity of databases; Consulting services in the field of national security ] [ ; Monitoring security systems; Consulting and legal services in the field of privacy and security laws, regulations, and requirements ];Computer consultation in the field of computer security; [ Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; ] Research in the field of intelligence and security; |
Category: | STATEMENT |
Brand: |
THREATSPACE |
---|---|
Description: | Computer security interdiction training, using a simulated enterprise network computer environment, said simulation to include simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely, router firewalls, proxy servers and network address translation devices, for the foregoing equipment; educational testing of others in the field of computer security interdiction, using a simulated enterprise network computer environment, said simulation to include simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely, router firewalls, proxy servers and network address translation devices, for the foregoing equipment; organizing competitions in the field of computer security interdiction, using a simulated enterprise network computer environment, said simulation to include simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely, router firewalls, proxy servers and network address translation devices, for the foregoing equipment; providing training for all aspects of computer network attack, defense, response and investigation;THREAT SPACE;Computer services, namely, computer programming to create a simulated enterprise network computer environment, said simulation to include simulated hardware, software, servers, workstations, portable computers, routers, switches and security elements, namely, router firewalls, proxy servers and network address translation devices, for the foregoing, intended to be used to conduct computer security interdiction training, testing and competitions; |
Category: | COMPUTER SECURITY INTERDICTION TRAINING |