TXONE NETWORKS INC.

 TXONE NETWORKS INC. contact information is shown below
Owner:TXONE NETWORKS INC.
Owner Address:5 F., No. 6, Lixing 6th Rd., East Dist., Hsinchu City 300096 Taiwan
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byTXONE NETWORKS INC.

Brand:

EDGEFIRE

Description:

computer hardware; downloadable computer security software; computer hardware, namely, firewalls; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, reporting on, patching and repairing security breaches in data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for monitoring data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for segmenting and protecting data, computers, computer and communication networks and network endpoints;EDGE FIRE;

Category: COMPUTER HARDWARE
Brand:

EDGEIPS

Description:

computer hardware; downloadable computer security software; computer hardware, namely, firewalls; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, reporting on, patching and repairing security breaches in data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for monitoring data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for segmenting and protecting data, computers, computer and communication networks and network endpoints;

Category: COMPUTER HARDWARE
Brand:

STELLARENFORCE

Description:

Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things (IOT) security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable computer software for whitelisting, approving and trusting other software, hardware and peripherals; downloadable computer software for blocking and blacklisting other software, hardware and peripherals; downloadable computer software for scanning, monitoring, verifying and permitting or blocking other computer software, hardware and peripherals; downloadable computer software for monitoring, segmenting and locking down data, computers, computer hardware, and network endpoints;STELLAR ENFORCE;

Category: DOWNLOADABLE COMPUTER SECURITY SOFTWARE
Brand:

STELLARONE

Description:

Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things (IOT) security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable anti-virus software; downloadable anti-malware software; downloadable computer software for Industrial Control Systems (ICS) application inventory monitoring and management; downloadable computer software for scanning for, detecting, identifying, and blocking malware, security threats and security breaches; downloadable computer software for patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software for providing virus and malware pattern updates; downloadable computer software for whitelisting, approving and trusting other software, hardware and peripherals; downloadable computer software for blocking and blacklisting other software, hardware and peripherals; downloadable computer software for scanning, monitoring, verifying and permitting or blocking other computer software, hardware and peripherals; downloadable computer software for monitoring, segmenting and locking down data, computers, computer hardware, and network endpoints;STELLAR ONE;

Category: DOWNLOADABLE COMPUTER SECURITY SOFTWARE
Brand:

STELLARPROTECT

Description:

Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things (IOT) security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable anti-virus software; downloadable anti-malware software; downloadable computer software for Industrial Control Systems (ICS) application inventory monitoring and management; downloadable computer software for scanning for, detecting, identifying, and blocking malware, security threats and security breaches; downloadable computer software for patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software for providing virus and malware pattern updates;STELLAR PROTECT;

Category: DOWNLOADABLE COMPUTER SECURITY SOFTWARE
Brand:

TXONE

Description:

TX ONE;Software as a service (SAAS) services featuring computer security software; providing online non-downloadable computer security software; software as a service (SAAS) services featuring computer firewall software; providing online non-downloadable computer firewall software; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer and network security policy management and enforcement; providing online non-downloadable software for computer and network security policy management and enforcement; software as a service (SAAS) services featuring computer software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for monitoring, segmenting and locking down data and computers; providing online non-downloadable software for monitoring, segmenting and locking down data and computers; software as a service (SAAS) services featuring computer software for securing industrial machinery, industrial control systems and manufacturing; providing online non-downloadable software for securing industrial machinery, industrial control systems and manufacturing; software as a service (SAAS) services featuring IOT security software; providing online non-downloadable IOT security software; software as a service (SAAS) services featuring security software for Industrial Control Systems (ICS); providing online non-downloadable security software for Industrial Control Systems (ICS); software as a service (SAAS) services featuring computer software for network and device security; providing online non-downloadable software for network and device security; software as a service (SAAS) services featuring virtual server software; providing online non-downloadable virtual server software; software as a service (SAAS) services featuring computer utility software; providing online non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for application whitelisting and blacklisting; providing online non-downloadable software for application whitelisting and blacklisting; software as a service (SAAS) services featuring computer software for providing virus and malware pattern updates; providing online non-downloadable software for providing virus and malware pattern updates; software as a service (SAAS) services featuring computer software for computer network management and configuration; providing online non-downloadable software for computer network management and configuration; software as a service (SAAS) services featuring computer software for managing computer hardware, switches and routers; providing online non-downloadable software for managing computer hardware, switches and routers; software as a service (SAAS) services featuring web consoles; providing online non-downloadable software, namely, web consoles; design and development of computer hardware and software; computer software consulting services; computer network consulting services; computer hardware consulting services; information technology consulting services; consulting services in the field of cloud computing; consulting in the field of cloud computing networks and applications; consulting services in the fields of computer software and software as a service; consulting services in the fields of computers, computer hardware, computer networks and network security; consulting services in the fields of industrial control systems and manufacturing computer hardware and software security, IOT security hardware and software; consultation in deploying and managing computer security hardware, software and network components; computer network and software consultation services for securing industrial machinery; custom configuration of computer software, computer hardware and computer networks; developing and deploying customized computer hardware and software in the fields of computer software, data and network security; technical support services, namely, troubleshooting and remediation of computer software, SAAS, computer hardware and network problems; technical support services, namely, computer network security incident response and remediation services; technical support services in the fields of computers, computer hardware, computer networks, network security and network architecture; technical support services in the fields of industrial control systems and manufacturing security, IOT security hardware and software; technical support services, namely, administration, management and updating of computers, computer hardware, computer software and computer networks; technical support services, namely, conducting onsite visits and review existing network environment, and consulting on computer network security and assisting with installation of computer hardware and software and network components; providing virtual computer systems and virtual computer environments through cloud computing; providing virtual security appliances, namely, virtual hardware and software for securing and protecting computers, computer hardware, industrial machinery and computer networks;

Category: TX ONE
Brand:

TXONE

Description:

Computer hardware; computer networking hardware; computer hardware, namely, firewalls; downloadable computer security software; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software and hardware for monitoring, segmenting and locking down data and computers; downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; IOT security software; downloadable security software for Industrial Control Systems (ICS); web consoles; downloadable computer software for network and device security; downloadable virtual server software; downloadable computer utility software; downloadable computer software for application whitelisting and blacklisting; downloadable computer software for providing virus and malware pattern updates; downloadable computer software for computer network management and configuration; downloadable computer software for managing computer hardware, switches and routers; USB flash drives; portable computer security hardware; portable computer hardware, peripherals and USB drives containing computer security software, computer antivirus, anti-spam, anti-malware and anti-ransomware software; portable computer hardware, peripherals and USB drives containing computer software for use in scanning for, identifying, reporting and removing malware, viruses; computer peripherals; computer peripheral devices; computer network switches;TX ONE;

Category: COMPUTER HARDWARE
Brand:

TXONE EDGEONE

Description:

computer hardware; computer software; software for information security; network firewall; computer firewall;TXONE EDGE ONE;designing of computer program; computer data processing; quality testing of products; designing of computer software; updating of computer software; consultancy of computer software design; analysis of computer system; designing of computer system; installation of computer software; providing temporary use of online non-downloadable computer software; recovery of computer data; conversion of physical data or documents into electronic carriers; conversion of non-physical computer programs and data; establishing and maintaining websites for others; managing host computer for others; managing servers for others; network authentication services; network security management services; consultancy of computer security; consultancy of computer data security; consultancy of network security; consultancy of designing and development of computer hardware; consultancy of computer technology; remote monitoring of computer systems; monitoring of computer systems for detecting faults; monitoring of computer systems for detecting unauthorized access or data leakage; providing information regarding computer technology and program designing via websites; cloud computing; software as a service (SaaS); providing information technology services through outsourcing; platform as a service (PaaS); development of computer platforms; consultancy of telecommunication network security; computer virus protection services;

Category: COMPUTER HARDWARE
Brand:

TXONE NETWORKS

Description:

The mark consists of one incomplete and four complete horizontal line in red, with a solid red circle at the left end of each line, two complete lines and two incomplete lines in white, each with a solid red circle at the left end of the line, all converging to form a right facing or forward facing arrow in red, adjacent to the word txOne in black appearing over the word networks in black.;The color(s) red, white and black is/are claimed as a feature of the mark.;NETWORKS;software as a service (SAAS) services featuring computer security software; providing online non-downloadable computer security software; software as a service (SAAS) services featuring computer firewall software; providing online non-downloadable computer firewall software; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer and network security policy management and enforcement; providing online non-downloadable software for computer and network security policy management and enforcement; software as a service (SAAS) services featuring computer software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for monitoring, segmenting and locking down data and computers; providing online non-downloadable software for monitoring, segmenting and locking down data and computers; software as a service (SAAS) services featuring computer software for securing industrial machinery, industrial control systems and manufacturing; providing online non-downloadable software for securing industrial machinery, industrial control systems and manufacturing; software as a service (SAAS) services featuring IOT security software; providing online non-downloadable IOT security software; software as a service (SAAS) services featuring security software for Industrial Control Systems (ICS); providing online non-downloadable security software for Industrial Control Systems (ICS); software as a service (SAAS) services featuring computer software for network and device security; providing online non-downloadable software for network and device security; software as a service (SAAS) services featuring virtual server software; providing online non-downloadable virtual server software; software as a service (SAAS) services featuring computer utility software; providing online non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for application whitelisting and blacklisting; providing online non-downloadable software for application whitelisting and blacklisting; software as a service (SAAS) services featuring computer software for providing virus and malware pattern updates; providing online non-downloadable software for providing virus and malware pattern updates; software as a service (SAAS) services featuring computer software for computer network management and configuration; providing online non-downloadable software for computer network management and configuration; software as a service (SAAS) services featuring computer software for managing computer hardware, switches and routers; providing online non-downloadable software for managing computer hardware, switches and routers; software as a service (SAAS) services featuring web consoles; providing online non-downloadable software, namely, web consoles; design and development of computer hardware and software; computer software consulting services; computer network consulting services; computer hardware consulting services; information technology consulting services; consulting services in the field of cloud computing; consulting in the field of cloud computing networks and applications; consulting services in the fields of computer software and software as a service; consulting services in the fields of computers, computer hardware, computer networks and network security; consulting services in the fields of industrial control systems and manufacturing computer hardware and software security, IOT security hardware and software; consultation in deploying and managing computer security hardware, software and network components; computer network and software consultation services for securing industrial machinery; custom configuration of computer software, computer hardware and computer networks; developing and deploying customized computer hardware and software in the fields of computer software, data and network security; technical support services, namely, troubleshooting and remediation of computer software, SAAS, computer hardware and network problems; technical support services, namely, computer network security incident response and remediation services; technical support services in the fields of computers, computer hardware, computer networks, network security and network architecture; technical support services in the fields of industrial control systems and manufacturing security, IOT security hardware and software; technical support services, namely, administration, management and updating of computers, computer hardware, computer software and computer networks; technical support services, namely, conducting onsite visits and review existing network environment, and consulting on computer network security and assisting with installation of computer hardware and software and network components; providing virtual computer systems and virtual computer environments through cloud computing; providing virtual security appliances, namely virtual hardware and software for securing and protecting computers, computer hardware, industrial machinery and computer networks;

Category: