VIGILANT IP HOLDINGS LLC

 VIGILANT IP HOLDINGS LLC contact information is shown below
Owner:VIGILANT IP HOLDINGS LLC
Owner Address:7570 Bales Street, Suite 250 Liberty Township OH 45069
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byVIGILANT IP HOLDINGS LLC

Brand:

ADAPTIVE INTELLIGENCE PROCESS

Description:

Computer security consultation related to cyber security, network security, work stations, server security, and application security, namely, security vulnerability assessments, penetration assessments and virus and malware analysis; Information technology consulting services; IT consulting services; Consulting in the field of IT project management; Computer network design for others; Design and development of wireless computer networks; Design for others in the field of computer networks, software, and engineering for all industries; Software as a service (SAAS) services featuring software for monitoring the network and application security and securing data traffic; Cyber security incident response;

Category: COMPUTER SECURITY CONSULTATION RELATED
Brand:

ATTACK IMPACT RESILIENCE

Description:

Computer security consultation related to cyber security, network security, work stations, server security, and application security, namely, security vulnerability assessments, penetration assessments and virus and malware analysis; Information technology consulting services; IT consulting services; Consulting in the field of IT project management; Computer network design for others; Design and development of wireless computer networks; Design for others in the field of computer networks, software, and engineering for all industries; Software as a service (SAAS) services featuring software for monitoring the network and application security and securing data traffic; Cyber security incident response;

Category: COMPUTER SECURITY CONSULTATION RELATED
Brand:

CREDIT CARD SECURITY

Description:

Educational services, namely, providing seminars and workshops in the field of computer and information security, other than security of credit card information;Computer security consultation related to cyber security, network security, work stations, server security, and application security other than security of credit card information, namely, security vulnerability assessments, penetration assessments and virus and malware analysis; Information technology consulting services other than with respect to security of credit card information; IT consulting services other than with respect to security of credit card information; Consulting in the field of IT project management other than with respect to security of credit card information; Computer network design for others other than with respect to security of credit card information; Design and development of wireless computer networks other than with respect to security of credit card information; Design for others in the field of computer networks, software, and engineering for all industries, other than with respect to security of credit card information; Software as a service (SAAS) services featuring software for monitoring the network and application security and securing data traffic, other than with respect to security of credit card information;

Category: EDUCATIONAL SERVICES
Brand:

CYBERDNA

Description:

Incident response services, namely, consultancy for mitigating damage, in the nature of maintenance and repair of computer networks, from computer security breaches;CYBER DNA;Computer network security monitoring services, namely, monitoring computer systems and computer network systems for security purposes;Cybersecurity services, namely, restricting access to and by computer software and networks to and of undesired websites, media, software, individuals, facilities and malicious attackers; Incident response services, namely, technical support and consulting in the nature of diagnosing and investigating damage from computer security breaches; Malware analysis services, namely, technical support in the nature of remote and on-site troubleshooting for diagnosing intrusion incidents for computer hosts and computer network devices; software as a service (SaaS) for gathering threat intelligence designed to detect and defend against network security intrusions and investigate existing network security intrusions;

Category: INCIDENT RESPONSE SERVICES
Brand:

IT'S NEVER THE THREATS YOU SEE THAT COST YOU

Description:

IT IS NEVER THE THREATS YOU SEE THAT COST YOU;Computer security consultation related to cyber security, network security, work stations, server security, and application security, namely, security vulnerability assessments, penetration assessments and virus and malware analysis; Information technology consulting services; IT consulting services; Consulting in the field of IT project management; Computer network design for others; Design and development of wireless computer networks; Design for others in the field of computer networks, software, and engineering for all industries; Software as a service (SAAS) services featuring software for monitoring the network and application security and securing data traffic;

Category: IT NEVER THREATS
Brand:

KNOW MORE. SECURE MORE.

Description:

Computer network design for others; Computer security consultancy in the field of cyber security, network security, workstations, server security, and application security, namely, security vulnerability assessments, penetration assessments and virus and malware analysis; Consulting in the field of IT project management; Design and development of wireless computer networks; Information technology (IT) consulting services; Software as a service (SAAS) services featuring software for monitoring the network, application security, and securing data traffic; Design for others in the field of computer networks, software, and engineering for all industries;

Category: COMPUTER NETWORK DESIGN OTHERS
Brand:

MSP FUSION CENTER

Description:

MSP AND CENTER;Computer security consultation related to cyber security, network security, work stations, server security, and application security, namely, consulting with managed security providers (MSPs) for holistic security and compliance, intelligence sharing and a teamed approach to data analysis;

Category: MSP CENTER
Brand:

SECURITY IS THE KNOWLEDGE THERE IS NO THREAT

Description:

Computer security consultation related to cyber security, network security, work stations, server security, and application security, namely, security vulnerability assessments, penetration assessments and virus and malware analysis; Information technology consulting services; IT consulting services; Consulting in the field of IT project management; Computer network design for others; Design and development of wireless computer networks; Design for others in the field of computer networks, software, and engineering for all industries; Software as a service (SAAS) services featuring software for monitoring the network and application security and securing data traffic;

Category: COMPUTER SECURITY CONSULTATION RELATED
Brand:

TIMELINE OF SECURITY

Description:

TIME LINE OF SECURITY;Computer security consultancy in the field of cyber security, network security, workstations, server security, and application security, namely, security vulnerability assessments, penetration assessments and virus and malware analysis; Information technology (IT) consulting services; Consulting in the field of IT project management; Computer network design for others; Design and development of wireless computer networks; Design for others in the field of computer networks, software, and engineering for all industries; Software as a service (SAAS) services featuring software for monitoring the network, application security, and securing data traffic;

Category: TIME LINE SECURITY
Brand:

VIGILANT

Description:

The mark consists of a design of three concentric circles that each are split into four sections by a horizontal line combined with a vertical perpendicular bisector. In each of the concentric circles one of the four circle sections is missing. The stylized text VIGILANT is to the right of the design.;Information technology products related to cyber security, network security, work stations, server security, and application security, namely, computer hardware for security vulnerability assessments, penetration assessments and virus and malware analysis;In the statement, line 23 through 29 is deleted, and The mark consists of a design of three concentric circles that each are split into four sections by a horizontal line combined with a vertical perpendicular bisector. In each of the concentric circles one of the four circle sections is missing. The stylized text VIGILANT is to the right of the design. The drawing is amended to appear as follows: PUBLISH NEW CUT;Color is not claimed as a feature of the mark.;Computer security consultation related to cyber security, network security, work stations, server security, and application security, namely, security vulnerability assessments, penetration assessments and virus and malware analysis; Information technology consulting services; IT consulting services; Consulting in the field of IT project management; Computer network design for others; Design and development of wireless computer networks; Design for others in the field of computer networks, software, and engineering for all industries; Software as a service (SAAS) services featuring software for monitoring the network and application security and securing data traffic;

Category: