iSIGHT Security inc.

 iSIGHT Security inc. contact information is shown below
Owner:ISIGHT SECURITY INC.
Owner Address:8333 Douglas Avenue, Suite 1460 Dallas TX 75225
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byiSIGHT Security inc.

Brand:

GEOSIGHT

Description:

Communications computer software for use in geo-locating logical network addresses, namely, for use in locating the physical proximity of a computer address based on the measure of time;GEO SIGHT;

Category: COMMUNICATIONS COMPUTER SOFTWARE USE
Brand:

ISIGHT

Description:

Training in the use of a simulated enterprise network computer environment, said simulation consisting of simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely, router firewalls, proxy servers and network address translation devices, for the foregoing equipment for computer security interdiction training; Educational testing services, namely, the testing of others in the field of computer security interdiction, using a simulated enterprise network computer environment, said simulation consisting of simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely router firewalls, proxy servers and network address translation devices, for the foregoing equipment; Organizing educational competitions in the field of computer security interdiction, using a simulated enterprise network computer environment, said simulation consisting of simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely router firewalls, proxy servers and network address translation devices, for the foregoing equipment; Providing training in the use of computers for all aspects of computer network attack, defense, response and investigation;Financial risk management; financial risk management consultation;I SIGHT;Business risk management; business risk management consultation;Consulting services in the field of maintaining the security and integrity of databases; consulting services in the field of national security;Computer consultation in the field of computer security; research in the field of intelligence and security technology;

Category: TRAINING USE
Brand:

ISIGHT PARTNERS

Description:

[Risk management; risk management consultation];INTERNET SIGHT PARTNERS;[Consulting services in the field of maintaining the security and integrity of databases; consulting services in the field of national security];PARTNERS;Computer consultation in the field of computer security; research in the field of intelligence and security;

Category: RISK MANAGEMENT
Brand:

ISIGHT SECURITY

Description:

Risk management; Risk management consultation;I SIGHT SECURITY;consulting services in the field of maintaining the security and integrity of databases; consulting services in the field of national security; monitoring security systems and, consulting and legal services in the field of privacy and security laws, regulations, and requirements;SECURITY;computer consultation in the field of computer security; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; research in the field of intelligence and security;

Category: RISK MANAGEMENT
Brand:

SECURITY BEYOND THE EDGE

Description:

Financial risk management; Financial risk management consultation;Consulting services in the field of maintaining the security and integrity of databases; consulting services in the field of national security;SECURITY;Computer consultation in the field of computer security; research in the field of intelligence and security;

Category: FINANCIAL RISK MANAGEMENT
Brand:

THREATSCAPE

Description:

In the statement, column 1, line 11, computer, is deleted, and lines 12, 13, and 14, are deleted; and in line 15, individuals and facilities; is deleted. In the statement, column 2, line 4, monitoring, is deleted and lines 5, 6, 7, and 8 are deleted.;[ Risk management; Risk management consultation ];[ Consulting services in the field of maintaining the security and integrity of databases; Consulting services in the field of national security ] [ ; Monitoring security systems; Consulting and legal services in the field of privacy and security laws, regulations, and requirements ];Computer consultation in the field of computer security; [ Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; ] Research in the field of intelligence and security;

Category: STATEMENT
Brand:

THREATSPACE

Description:

Computer security interdiction training, using a simulated enterprise network computer environment, said simulation to include simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely, router firewalls, proxy servers and network address translation devices, for the foregoing equipment; educational testing of others in the field of computer security interdiction, using a simulated enterprise network computer environment, said simulation to include simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely, router firewalls, proxy servers and network address translation devices, for the foregoing equipment; organizing competitions in the field of computer security interdiction, using a simulated enterprise network computer environment, said simulation to include simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely, router firewalls, proxy servers and network address translation devices, for the foregoing equipment; providing training for all aspects of computer network attack, defense, response and investigation;THREAT SPACE;Computer services, namely, computer programming to create a simulated enterprise network computer environment, said simulation to include simulated hardware, software, servers, workstations, portable computers, routers, switches and security elements, namely, router firewalls, proxy servers and network address translation devices, for the foregoing, intended to be used to conduct computer security interdiction training, testing and competitions;

Category: COMPUTER SECURITY INTERDICTION TRAINING