COMPREHENSIVE ENTERPRISE SECURITY ASSESSMENT

Brand Owner (click to sort) Address Description
CAPTAAS NetSentries Technologies FZCO DTEC, Dubai Silicon Oasis Dubai Arab Emirates Comprehensive enterprise security assessment and vulnerability testing, namely, security risk assessment against applications, cloud environments, computers and networks to detect information security vulnerabilities, provided to business enterprises; Providing a cloud based platform featuring on-line, non-downloadable software that leverages Artificial Intelligence and Machine Learning Algorithms for use in continuous security risk assessment, reviewing and assessing information security vulnerabilities, auditing information related thereto and providing curated, threat intelligence for proactive defense and response to support global organizations' to reduce business risk and to achieve compliance with applicable regulations, laws and industry requirements;
CYBER THREAT INFORMED DEFENSE (CTID) NetSentries Technologies FZCO DTEC, Dubai Silicon Oasis Dubai Arab Emirates Comprehensive enterprise security assessment and vulnerability testing, namely, security risk assessment against applications, cloud environments, computers and networks to detect information security vulnerabilities, provided to business enterprises; Providing a cloud based platform featuring on-line, non-downloadable software that leverages Artificial Intelligence and Machine Learning Algorithms for use in continuous security risk assessment, reviewing and assessing information security vulnerabilities, auditing information related thereto and providing curated, threat intelligence for proactive defense and response to support global organizations' to reduce business risk and to achieve compliance with applicable regulations, laws and industry requirements;
DEFEND FORWARD NetSentries Technologies FZCO DTEC, Dubai Silicon Oasis Dubai Arab Emirates Comprehensive enterprise security assessment and vulnerability testing, namely, security risk assessment against applications, cloud environments, computers and networks to detect information security vulnerabilities, provided to business enterprises; Providing a cloud based platform featuring on-line, non-downloadable software that leverages Artificial Intelligence and Machine Learning Algorithms for use in continuous security risk assessment, reviewing and assessing information security vulnerabilities, auditing information related thereto and providing curated, threat intelligence for proactive defense and response to support global organizations' to reduce business risk and to achieve compliance with applicable regulations, laws and industry requirements;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A streaming media assessment system comprises assessment servers, media clients, data collection points, helper agents, and report servers. An assessment tool is downloaded or otherwise installed on an end-user client machine and associated with its media player. An assessment server is in communication with the assessment tool over the network and can send control messages to conduct tests and gather information from the assessment tool. The client machine media player is controlled to stop and start by the assessment tool and it will provide measurements that can be forwarded to the assessment servers. Analyses are then produced by the assessment servers of the actual media streams that were received by many such client machine media players. The report servers issue various formatted reports for the system's sponsors and subscribers.