Brands and Their Owners
Least Authority TFA GmbH contact information is shown below | |
Owner: | LEAST AUTHORITY TFA GMBH |
---|---|
Owner Address: | Thaerstr. 28 10249 Berlin Germany |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
LEAST AUTHORITY |
---|---|
Description: | Providing of training on how to use cryptography and training on security practice;Cloud computing software; cloud servers; cloud server software; cloud network monitoring software; security software; cryptography software; software testing software; privacy software; software for digital distributed storage;Transfer of data by telecommunications; wireless transfer of data via the Internet; wireless transfer of data via wireless application protocols;Internet security consultancy; telecommunication network security consultancy; analytical services relating to computers; comparative analysis studies of the performance of computer systems; software development, programming and implementation; information technology (IT) consultancy; IT security, protection and restoration; software as a service (SaaS); rental of software; cloud hosting provider services; cloud storage services for electronic files; providing virtual computer systems through cloud computing; consulting in the field of cloud computing networks and applications; programming of operating software for accessing and using a cloud computing network; providing temporary use of on-line non-downloadable operating software for accessing and using a cloud computing network; advisory services relating to computer programming; testing of computer programs; computer security services for protection against illegal network access; consultancy in the field of security software; provision of computer security risk management programs; provision of security services for computer networks, computer access and computerized transactions; computer programming services for electronic data security; design and development of Internet security programs; monitoring of computer systems for detecting unauthorized access or data breach; IT services for data protection; data warehousing; design and development of data storage systems; designing cryptographic protocols for use in software and IT systems; analyzing the selection and implementation cryptography in software and IT systems; |
Category: | PROVIDING TRAINING ON HOW |
Brand: |
LEAST AUTHORITY PRIVACY MATTERS |
---|---|
Description: | Providing of training on how to use cryptography and training on security practice;Cloud computing software; cloud servers; cloud server software; cloud network monitoring software; security software; cryptography software; software testing software; privacy software; software for digital distributed storage;Transfer of data by telecommunications; wireless transfer of data via the Internet; wireless transfer of data via wireless application protocols;The color(s) black and red is/are claimed as a feature of the mark.;Internet security consultancy; telecommunication network security consultancy; analytical services relating to computers; comparative analysis studies of the performance of computer systems; software development, programming and implementation; information technology (IT) consultancy; IT security, protection and restoration; software as a service (SaaS); rental of software; cloud hosting provider services; cloud storage services for electronic files; providing virtual computer systems through cloud computing; consulting in the field of cloud computing networks and applications; programming of operating software for accessing and using a cloud computing network; providing temporary use of on-line non-downloadable operating software for accessing and using a cloud computing network; advisory services relating to computer programming; testing of computer programs; computer security services for protection against illegal network access; consultancy in the field of security software; provision of computer security risk management programs; provision of security services for computer networks, computer access and computerized transactions; computer programming services for electronic data security; design and development of Internet security programs; monitoring of computer systems for detecting unauthorized access or data breach; IT services for data protection; data warehousing; design and development of data storage systems; designing cryptographic protocols for use in software and IT systems; analyzing the selection and implementation cryptography in software and IT systems; |
Category: | PROVIDING TRAINING ON HOW |
Brand: |
PRIVATE STORAGE |
---|---|
Description: | Cloud computing software; cloud servers; cloud server software; cloud network monitoring software; security software; cryptography software; software testing software; privacy software; software for digital distributed storage;Transfer of data by telecommunications; wireless transfer of data via the Internet; wireless transfer of data via wireless application protocols;The color(s) blue, grey, yellow and purple is/are claimed as a feature of the mark.;Internet security consultancy; telecommunication network security consultancy; analytical services relating to computers; comparative analysis studies of the performance of computer systems; software development, programming and implementation; information technology (IT) consultancy; IT security, protection and restoration; software as a service (SaaS); rental of software; cloud hosting provider services; cloud storage services for electronic files; providing virtual computer systems through cloud computing; consulting in the field of cloud computing networks and applications; programming of operating software for accessing and using a cloud computing network; providing temporary use of on-line non-downloadable operating software for accessing and using a cloud computing network; advisory services relating to computer programming; testing of computer programs; computer security services for protection against illegal network access; consultancy in the field of security software; provision of computer security risk management programs; provision of security services for computer networks, computer access and computerized transactions; computer programming services for electronic data security; design and development of Internet security programs; monitoring of computer systems for detecting unauthorized access or data breach; IT services for data protection; data warehousing; design and development of data storage systems; designing cryptographic protocols for use in software and IT systems; analyzing the selection and implementation cryptography in software and IT systems; |
Category: | CLOUD COMPUTING SOFTWARE |
Brand: |
WINDEN |
---|---|
Description: | Cloud computing software; cloud servers; cloud server software; cloud network monitoring software; security software; cryptography software; software testing software; privacy software; software for digital distributed storage;Transfer of data by telecommunications; wireless transfer of data via the Internet; wireless transfer of data via wireless application protocols;The color(s) black and white is/are claimed as a feature of the mark.;Internet security consultancy; telecommunication network security consultancy; analytical services relating to computers; comparative analysis studies of the performance of computer systems; software development, programming and implementation; information technology (IT) consultancy; IT security, protection and restoration; software as a service (SaaS); rental of software; cloud hosting provider services; cloud storage services for electronic files; providing virtual computer systems through cloud computing; consulting in the field of cloud computing networks and applications; programming of operating software for accessing and using a cloud computing network; providing temporary use of on-line non-downloadable operating software for accessing and using a cloud computing network; advisory services relating to computer programming; testing of computer programs; computer security services for protection against illegal network access; consultancy in the field of security software; provision of computer security risk management programs; provision of security services for computer networks, computer access and computerized transactions; computer programming services for electronic data security; design and development of Internet security programs; monitoring of computer systems for detecting unauthorized access or data breach; IT services for data protection; data warehousing; design and development of data storage systems; designing cryptographic protocols for use in software and IT systems; analyzing the selection and implementation cryptography in software and IT systems; |
Category: | CLOUD COMPUTING SOFTWARE |