Outpost24 AB

 Outpost24 AB contact information is shown below
Owner:OUTPOST24 AB
Owner Address:Blekingegatan 1 Karlskrona 37157 Sweden
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byOutpost24 AB

Brand:

BLUE HYDRA

Description:

Computer software for detecting wireless devices; computer software for remotely monitoring environmental conditions for network security;

Category: COMPUTER SOFTWARE DETECTING WIRELESS
Brand:

DEVICE RISK SCORECARD

Description:

Providing technical information about computer and network security;

Category: PROVIDING TECHNICAL INFORMATION ABOUT COMPUTER
Brand:

INTERNET OF EVIL THINGS

Description:

Providing online non-downloadable publications, namely, newsletters, magazines, reports and articles in the nature of internet security;Downloadable electronic publications namely, newsletters, magazines, reports and articles in the nature of internet security;Printed publications, namely, newsletters, magazines, reports and articles in the nature of internet security;

Category: PROVIDING ONLINE NON DOWNLOADABLE PUBLICATIONS
Brand:

IOT RISK SCORECARD

Description:

Providing technical information about computer and network security;

Category: PROVIDING TECHNICAL INFORMATION ABOUT COMPUTER
Brand:

OUTPOST24

Description:

OUT POST TWENTY FOUR;Compilation of commercial information and data related to computer software, computer software applications, computer hardware and related goods for third parties for marketing presentation and sales purposes; arranging contracts for third parties concerning the purchase and sale of computer software, computer software applications, computer hardware and related products;Computer programming; computer hardware development; computer software development; technological services relating to computers, namely, monitoring technological functions of computer network systems; computer software design; computer hardware design; technical advisory services relating to computer hardware and software; computer system analysis; technical advice and information regarding the security of computer networks; adaptation, updating and revision of computer software; advice and information regarding the security of computer networks;

Category: OUT POST TWENTY FOUR
Brand:

PWN PAD

Description:

Tablet computers;PWNIE PAD;PAD;

Category: TABLET COMPUTERS
Brand:

PWN PHONE

Description:

Smartphones;PHONE;

Category: SMARTPHONES
Brand:

PWN PLUG

Description:

Electronic devices, namely, commercial penetration testing drop boxes for use in remotely evaluating security of a computer system or network by simulating an attack from external or internal threats;PWNIE PLUG;PLUG;

Category: ELECTRONIC DEVICES
Brand:

PWN PRO

Description:

Computer hardware for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing;PRO;

Category: COMPUTER HARDWARE DETECTING
Brand:

PWN PULSE

Description:

Computer hardware in the field of computer security;

Category: COMPUTER HARDWARE FIELD
Brand:

PWN PULSE

Description:

Computer security services in the nature of network security assessments; software as a service (SAAS) services featuring software for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing;

Category: COMPUTER SECURITY SERVICES
Brand:

PWNIE

Description:

Computer hardware for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing;Computer security services in the nature of network security assessments; software as a service (SAAS) services featuring software for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing;

Category: COMPUTER HARDWARE DETECTING
Brand:

PWNIE EXPRESS

Description:

Computer hardware for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing;PONY EXPRESS;Computer security services in the nature of network security assessments; software as a service (SAAS) services featuring software for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing;

Category: COMPUTER HARDWARE DETECTING