LEXSI S.A.S.

 LEXSI S.A.S. contact information is shown below
Owner:LEXSI S.A.S.
Owner Address:40 rue Jean Jaurès Les Mercuriales, Tour Ponant F-93170 BAGNOLET France
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byLEXSI S.A.S.

Brand:

LEXSI

Description:

Computer security software; computer software for the detection and removal of malware, particularly viruses, worms, trojan horses, adware, spyware; computer software for providing secure online transactions; computer software for providing online identity protection; computer software for fraud protection; computer software to detect, prevent, diagnose, and repair computer security breaches; computer maintenance software; computer software for the backup, storage, restoration and retrieval of data; computer software, computer hardware, computer firmware and computer peripheral devices for the protection of data security, particularly against fraudulent access; computer software for the backup and recovery of computer data; computer software for measuring the use of other computer software; computer software used in the development of data analysis applications and other computer software; computer software for data communication applications, and for the encryption and authentication of electronic information; computer software for copying data from one electronic storage medium to another electronic storage medium; computer software for teaching and training users how to use computer software and/or hardware; computer software for the surveillance, evaluation, demonstration and remote monitoring of other computer programs and computer processes; computer hardware and software for authenticating users and for maintaining and managing access to computer data, computer content, electronic communications, and computer networks; privacy management computer software for preventing, monitoring, certifying, cross-checking and reporting on the distribution and use of personal identity information on computer systems and networks and on global communication networks; computer software in the field of cryptographic, data and network security functions; computer software used for automating an identity authentication process by means of existing databases in connection with issuing and managing digital certificates used for the authentication or encryption of digital communications or the authentication of a digital signature in an electronic transaction or communication on the Internet and other computer networks; encryption computer software to enable the secure transmission of digital information; identity fraud detection computer software; computer software for monitoring computers for security purposes; downloadable electronic publications in the nature of manuals and data sheets for use with computer software;Electronic transmission services of data and computer files; telecommunications services for providing multiple user access to a global computer network; electronic communication services, namely, communications by and between computers and computer terminals; electronic transmission of data and instant messages; provision of access to databases; electronic mail services, namely, electronic transmission of mail and messages; secure electronic mail services, namely, providing electronic transmission of secure e-mails; automatic transfer of digital data by means of telecommunication channels; electronic transmission of anti-virus computer software and other computer and network security software via a global computer network; electronic transmission of communications and data via e-mail to enable encryption and decryption by managing and filtering of emails sent over the global computer network; providing online forums for transmitting messages between computer users about computers, computer hardware, computer software, computer peripheral devices, computer systems, computer networks, computer equipment, computer security, information technology, ecommerce and global computer network technology, mobile computing, communications via networks and equipment and telecommunication devices; consultancy and information related to the aforesaid services;Computer system monitoring services for security purposes; identity verification services; consultancy in the field of security; licensing of technology, source codes, computer software and other intellectual property rights; licensing of computer software for the protection of computers, computer systems, computer networks and websites on the Internet against computer viruses, hackers, tampering, unauthorized entry and unauthorized manipulation of data; software licensing (legal services); licensing of databases (legal services); consultancy and information related to the aforesaid services;The wording LEXSI has no meaning in a foreign language.;Monitoring of computer systems and networks for computer security purposes for protecting data and information from unauthorized access; provision of security threat management systems, namely, surveillance and monitoring of security vulnerabilities and problems in software products, on the Internet, and on computer networks for protecting data and information from unauthorized access; auditing and computer security control services for protecting data and information from unauthorized access; detection of computer security breaches or malware; protection services against computer viruses, malware and fraudulent access; technical services and technical support services provided by consultants in the field of computer diagnostics, computer software and computer system integration; advice on the protection against computer viruses and other malware; technical support services relating to computer software, particularly computer security software for protecting data and information from unauthorized access; computer services relating to computer security on the Internet for protecting data and information from unauthorized access; consulting relating to computers, particularly relating to data security, computer systems and networks for protecting data and information from unauthorized access; consulting services in the field of software as a service (SaaS); consulting services in the field of cloud computing services; computer software rental; designing databases and computer services; hosting databases for others on a computer server for a global computer network; hosting of web sites for others that feature information, computer applications, files and data in the field of computer software design; design, installation, updating and maintenance of software; data recovery IT services; technical support IT services, namely, troubleshooting of computer software problems; consulting relating to the design, selection and implementation of computer systems; provision of computer software information in the field of network and Internet security; onsite or remote monitoring of computer systems to protect data and information from unauthorized access; provision of computer software information relating to the encryption and authentication of electronic data; technical support services, namely, providing technical advice in the fields of digital media, data encryption, computer security, communication and software security; design and development of communication networks and data encryption and decryption IT services; identity authentication IT services; IT services for issuing and managing digital certificates used for the authentication or encryption of digital communication, or the authentication of a digital signature; development, design, implementation, testing, analysis services and consulting in the field of security systems, access, authorization, authentication, encryption and identification for use with computers, computer hardware and computer networks; Internet and computer security consultancy in the field of computer network security management services; search engine services for obtaining data on a computer network; computer technical support services, namely, providing technical advice in the field of computer security; providing software technical support services for the development of software applications; provision of data conversion services; application service provision, namely, hosting application software for others for use in computer security for the protection of data and information from unauthorized access; services of an application service provider, namely, provision of online software, non-downloadable, for testing computer security in the fields of computer and Internet security for protecting data and information from unauthorized access; scientific and technological services, namely, technological support in the field of computing; services provided by IT project consultants, particularly relating to computer security; provision of technical information relating to information technology in the field of communication devices, computers, computer hardware, computer software, computer peripheral devices, computer networks, particularly relating to computer software and computer hardware to ensure computer security for protecting data and information from unauthorized access; consulting and information relating to computer software, consulting and information relating to the aforesaid services;

Category: COMPUTER SECURITY SOFTWARE