Crosswire Inc.

 Crosswire Inc. contact information is shown below
Owner:CROSSWIRE INC.
Owner Address:228 Park Avenue S, PMB 60665 New York NY 10003
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byCrosswire Inc.

Brand:

CROSSWIRE

Description:

Software; downloadable software for providing web security; downloadable software for use in registering, managing, securing, authorizing and synchronizing electronic user accounts and electronic access privileges; downloadable software for providing secure management tools for operations and administration functions, enabling software and resource management, provisioning of computer resources, and optimizing performance of computer systems and applications; downloadable software for computer system and application development, deployment, security and management; downloadable software for use in directory data replication; downloadable software for use in operating directory servers; downloadable software for use in integrating, securing and synchronizing cloud-based software programs with downloadable software programs; downloadable software for workflow automation and process automation; downloadable software for data management; downloadable software for security, namely, for reading software and hardware configurations and ensuring they follow best practices, sending notifications when those configurations change, and enforcing those best practices; downloadable software for standards compliance audits; downloadable software for automatically auditing and securing cloud infrastructure; downloadable software for internet security, namely, enforcing best security practices across all cloud infrastructure and external vendors; downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; downloadable software and applications for detecting fraudulent transactions and activities; downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; downloadable software and applications for use in analyzing and monitoring computer networks; downloadable software and applications in the field of application analytics; downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; downloadable data mining software;Insurance compliance consulting; insurance consulting; insurance information; insurance risk management;Business data analysis; business management analysis; analysis of business data; analysis of market research data and statistics; data processing services; data compiling and analyzing in the field of insurance; compiling and analyzing statistics, data and other sources of information for business purposes;Computer security services; monitoring of computer systems for security purposes; provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security assurance; administration of digital keys and digital certificates; providing fraud detection services for electronic funds transfer; credit and debit card and electronic check transactions;Software design and development; authentication, issuance and validation of digital certificates; user authentication services using technology for e-commerce transactions; providing user authentication services using blockchain-based software technology for cryptocurrency transactions; computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; electronic signature verification services using technology to authenticate user identity; technology consultation in the field of cybersecurity; cybersecurity services in the nature of restricting unauthorized access to computer systems; providing online non-downloadable software for providing web security; providing online non-downloadable software for use in registering, managing, securing, authorizing and synchronizing electronic user accounts and electronic access privileges; providing online non-downloadable software for providing secure management tools for operations and administration functions, enabling software and resource management, provisioning of computer resources, and optimizing performance of computer systems and applications; providing online non-downloadable software for computer system and application development, deployment, security and management; providing online non-downloadable software for use in directory data replication; providing online non-downloadable software for use in operating directory servers; providing online non-downloadable software for use in integrating, securing and synchronizing cloud-based software programs with downloadable software programs; providing online non-downloadable software for workflow automation and process automation; providing online non-downloadable software for data management; cloud permissions scanning; visibility permissions; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software for security, namely, for reading software and hardware configurations and ensuring they follow best practices, sending notifications when those configurations change, and enforcing those best practices; software as a service (SAAS) services featuring software for standards compliance audits; software as a service (SAAS) services featuring software for automatically auditing and securing cloud infrastructure; software as a service (SAAS) services featuring software for internet security, namely, enforcing best security practices across all cloud infrastructure and external vendors; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security threat analysis for protecting data; providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications in the field of application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software;

Category: SOFTWARE