Brands and Their Owners
Welcome to the Brand page for “AT&T ACTIVEARMOR”, which is offered here for Downloadable computer software for providing cybersecurity protection for mobile devices and computer networks; downloadable computer software for computer network security and cybersecurity management; downloadable computer networking software; downloadable cloud computing software for connecting wired and wireless devices and managing cybersecurity and computer network security thereof; downloadable computer software for data security, data storage and data protection; downloadable computer software for collecting, analyzing and reporting of data related to computer network security and cybersecurity; downloadable computer software for developing, deploying, and managing computer systems and applications for use in providing cybersecurity protection for mobile devices and home and computer business networks; downloadable computer software for computer network virtualization, orchestration, management, monitoring and optimization of data for computer network security and cybersecurity purposes; downloadable computer software for analyzing, managing, monitoring, and reporting developments, events, and issues in data centers and computer networks; downloadable computer software for operating, optimizing, configuring, maintaining, monitoring, managing and deploying software over cloud computing networks for computer network security and cybersecurity purposes; downloadable computer software for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, data centers and telephony systems for computer network security and cybersecurity purposes;at and t active armor;software as a service (saas) services featuring software for cybersecurity and computer network security information and event management (siem); providing online non-downloadable computer software for monitoring, gathering, analyzing and presenting cybersecurity and computer network security information from computer and telecommunication networks and security devices for computer and network vulnerability management and security compliance and for real-time analysis and monitoring of security alerts; computer systems analysis for the installation of computer systems in the field of cybersecurity and computer network security; design of computer networks for others in the field of cybersecurity and computer network security; design and development of computer software, for others, in the field of cybersecurity and computer network security; computer consultancy in the field of cybersecurity and computer network security; computer programming for others in the field of cybersecurity and computer network security; design of computer software in the field of cybersecurity and computer network security; installation of computer software in the field of cybersecurity and computer network security; rental of computer software in the field of cybersecurity and computer network security; maintenance of computer software in the field of cybersecurity and computer network security; updating of computer software for others in the field of cybersecurity and computer network security; duplication of computer programs in the field of cybersecurity and computer network security; conversion of computer program data or information in the field of cybersecurity and computer network security; recovery of computer data in the field of cybersecurity and computer network security; creating and maintaining web sites for others in the field of cybersecurity and computer network security; hosting others' web sites on a computer server for a global computer network in the field of cybersecurity and computer network security; technical consulting, technical project studies in the field of cybersecurity and computer network security; computer programming services for data processing using computers in connection with cybersecurity and computer network security; operation and maintenance of software in computer systems in relation to data and computer network security;.
Its status is currently believed to be active. Its class is unavailable. “AT&T ACTIVEARMOR” is believed to be currently owned by “AT&T INTELLECTUAL PROPERTY II, L.P.”
Owner: |
AT&T INTELLECTUAL PROPERTY II, L.P.
Owner Details |
---|---|
Description: |
Downloadable computer software for providing cybersecurity protection for mobile devices and computer networks; downloadable computer software for computer network security and cybersecurity management; downloadable computer networking software; downloadable cloud computing software for connecting wired and wireless devices and managing cybersecurity and computer network security thereof; downloadable computer software for data security, data storage and data protection; downloadable computer software for collecting, analyzing and reporting of data related to computer network security and cybersecurity; downloadable computer software for developing, deploying, and managing computer systems and applications for use in providing cybersecurity protection for mobile devices and home and computer business networks; downloadable computer software for computer network virtualization, orchestration, management, monitoring and optimization of data for computer network security and cybersecurity purposes; downloadable computer software for analyzing, managing, monitoring, and reporting developments, events, and issues in data centers and computer networks; downloadable computer software for operating, optimizing, configuring, maintaining, monitoring, managing and deploying software over cloud computing networks for computer network security and cybersecurity purposes; downloadable computer software for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, data centers and telephony systems for computer network security and cybersecurity purposes;AT AND T ACTIVE ARMOR;Software as a service (saas) services featuring software for cybersecurity and computer network security information and event management (siem); providing online non-downloadable computer software for monitoring, gathering, analyzing and presenting cybersecurity and computer network security information from computer and telecommunication networks and security devices for computer and network vulnerability management and security compliance and for real-time analysis and monitoring of security alerts; Computer systems analysis for the installation of computer systems in the field of cybersecurity and computer network security; design of computer networks for others in the field of cybersecurity and computer network security; design and development of computer software, for others, in the field of cybersecurity and computer network security; computer consultancy in the field of cybersecurity and computer network security; computer programming for others in the field of cybersecurity and computer network security; design of computer software in the field of cybersecurity and computer network security; installation of computer software in the field of cybersecurity and computer network security; rental of computer software in the field of cybersecurity and computer network security; maintenance of computer software in the field of cybersecurity and computer network security; updating of computer software for others in the field of cybersecurity and computer network security; duplication of computer programs in the field of cybersecurity and computer network security; conversion of computer program data or information in the field of cybersecurity and computer network security; recovery of computer data in the field of cybersecurity and computer network security; creating and maintaining web sites for others in the field of cybersecurity and computer network security; hosting others' web sites on a computer server for a global computer network in the field of cybersecurity and computer network security; technical consulting, technical project studies in the field of cybersecurity and computer network security; computer programming services for data processing using computers in connection with cybersecurity and computer network security; operation and maintenance of software in computer systems in relation to data and computer network security;
|
Categories: | DOWNLOADABLE COMPUTER SOFTWARE PROVIDING |