TRAPP TECHNOLOGY, INC.

 TRAPP TECHNOLOGY, INC. contact information is shown below
Owner:TRAPP TECHNOLOGY, INC.
Owner Address:2600 N. Central Ave., 11th Floor Phoenix AZ 85004
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byTRAPP TECHNOLOGY, INC.

Brand:

ARMORPOINT

Description:

ARMOR POINT;Computer security services, namely, security information and event management (SIEM) in the nature of monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior; managed computer security services, namely, malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time; software as a service (SAAS) services featuring a combination of software and hardware for security information and event management (SIEM); platform as a service (PAAS) services featuring a combination of computer software platforms and hardware for performing security information and event management (SIEM); providing temporary use of non-downloadable computer software for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; providing temporary use of non-downloadable computer software for the automation of tasks in the field of security and network incident remediation; managed computer security services, namely, monitoring, reporting, analysis, and remediation of events collected from computer network and security devices for the purposes of protecting data and restricting unauthorized network access; computer security consultancy in the field of security incident and breach response and remediation; computer security consulting, namely, computer and network security assessment and testing services to diagnose areas of vulnerability and risk to prioritize remediation; providing temporary use of on-line non-downloadable cloud computing computer and network security software for network and application security for the purposes of protecting data and restricting unauthorized network access; software as a service (SAAS) services, namely, hosting of computer and network security software for use by others for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; computer software and computer management security services in the field of malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time;

Category: ARMOR POINT
Brand:

ARMORPOINT

Description:

The mark consists of the infinity symbol located to the left of the wording ARMORPOINT.;ARMOR POINT;Color is not claimed as a feature of the mark.;Computer security services, namely, security information and event management (SIEM) in the nature of monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior; managed computer security services, namely, malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time; software as a service (SAAS) services featuring a combination of software and hardware for security information and event management (SIEM); platform as a service (PAAS) services featuring a combination of computer software platforms and hardware for performing security information and event management (SIEM); providing temporary use of non-downloadable computer software for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; providing temporary use of non-downloadable computer software for the automation of tasks in the field of security and network incident remediation; managed computer security services, namely, monitoring, reporting, analysis, and remediation of events collected from computer network and security devices for the purposes of protecting data and restricting unauthorized network access; computer security consultancy in the field of security incident and breach response and remediation; computer security consulting, namely, computer and network security assessment and testing services to diagnose areas of vulnerability and risk to prioritize remediation; providing temporary use of on-line non-downloadable cloud computing computer and network security software for network and application security for the purposes of protecting data and restricting unauthorized network access; software as a service (SAAS) services, namely, hosting of computer and network security software for use by others for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; computer software and computer management security services in the field of malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time;

Category: