Brands and Their Owners
Brand | Owner (click to sort) | Address | Description |
---|---|---|---|
ACTIVE THREAT DECEPTION | ACALVIO TECHNOLOGIES, INC. | 2520 Mission College Blvd., Suite 110 Santa Clara CA 95054 | Enterprise computer hardware and software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;ACTIVE THREAT; |
BACKBOX | ETI-NET Inc. | Suite 400 505 Maisonneuve West Montreal Quebec H3A3C2 Canada | enterprise computer hardware and software for data backup and disaster recovery;BACK BOX; |
INTELLIPORT | Intellivence, Inc. | 1400 Coleman Avenue, Suite F28 Santa Clara CA 95050 | Enterprise computer hardware and software applications for providing access to and organization of enterprise data, applications and corporate resources, as well as services and sites available on the world wide web; |
INTELLIPORT | Intellivence, Inc. | 1400 Coleman Avenue, Suite F28 Santa Clara CA 95050 | ENTERPRISE COMPUTER HARDWARE AND SOFTWARE APPLICATIONS FOR PROVIDING ACCESS TO AND ORGANIZATION OF ENTERPRISE DATA, APPLICATIONS AND CORPORATE RESOURCES, AS WELL AS SERVICES AND SITES AVAILABLE ON THE WORLD WIDE WEB;INTELLIGENT PORT; INTELLIGENCE PORT; INTELLIGIBLE PORT;Color is not claimed as a feature of the mark.; |
SHADOW NETWORKS | ACALVIO TECHNOLOGIES, INC. | 2520 Mission College Blvd., Suite 110 Santa Clara CA 95054 | Enterprise computer hardware and software solutions for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;NETWORKS; |
SHADOWNET | ACALVIO TECHNOLOGIES, INC. | 2520 Mission College Blvd., Suite 110 Santa Clara CA 95054 | Enterprise computer hardware and software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;SHADOW NET;Software as a service (SAAS) services featuring enterprise software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems; |
Where the owner name is not linked, that owner no longer owns the brand |