Boise State University / Institute for Pervasive Cybersecurity

 Boise State University / Institute for Pervasive Cybersecurity contact information is shown below
Owner:BOISE STATE UNIVERSITY / INSTITUTE FOR PERVASIVE CYBERSECURITY
Owner Address:Attn: Trademark Licensing 1910 University Drive Boise ID 837251060
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byBoise State University / Institute for Pervasive Cybersecurity

Brand:

CYBERDOME

Description:

Computer hardware and downloadable software for analyzing and preventing cyber threats in the fields of computer security; downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; downloadable computer software for protecting and securing computer networks and applications; downloadable computer software for providing real-time security audits of an online application, network, and host;CYBER DOME;

Category: COMPUTER HARDWARE DOWNLOADABLE SOFTWARE
Brand:

CYBERDOME

Description:

Education Services in the nature of a competency-based learning platform in the nature of classes, workshops and seminars that enables learners to gain critical training and on-the-job training experience using methodologies, technologies, processes, and approaches in the fields of live-fire, real world monitoring of critical technology assets, namely, information technology (IT) security; Simulation-based training services in the field of cyber defense testing, namely, cyberwarfare exercises and information technology (IT) security operational training using sanitized data streams and structures; Training Services, namely, a live-fire Security Operations Center (SOC) that will provide 24x7x365 workforce development opportunities in the nature of classes, workshops and seminars by leveraging Security Clinic structures in the nature of monitoring, detection, response services for clientele;CYBER DOME;

Category: EDUCATION SERVICES NATURE
Brand:

CYBERDOME

Description:

CYBER DOME;Providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultation, namely, policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity computer software maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; computer security consultation, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security computer software maintenance services; data security consultation, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; computer security consultation, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer consultation, services, namely, endpoint detection and response to software and hardware threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall computer software security maintenance services; firewall security consultation, namely, security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; hardware security, namely, maintenance of computer hardware security systems; computer security consultation, namely, hardware security policy assessment; Technical support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security consultation, namely, security threat analysis for protecting data; computer security consultation, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber intrusions and threats; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network security consultation, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network security consultation, namely, policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; computer password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy; support services, namely, troubleshooting of computer software problems, troubleshooting of information technology (IT) security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing temporary use of online non-downloadable software for information technology (IT) security operations center management; software diagnostic services, namely, computer security threat analysis for protecting data; computer software maintenance services; information technology (IT) consultation for software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability;

Category: CYBER DOME