COMPUTER FORENSIC SERVICES

Brand Owner (click to sort) Address Description
ACCELSUS LLC Accelsus PO Box 4287 Leesburg VA 20175 Computer forensic services; Computer security threat analysis for protecting data; Computer systems integration services; Data security consultancy; Design and development of electronic data security systems; Product development for others;
BLOODHOUND FORENSICS Bloodhound Forensics, Inc. P.O. Box 335 Moss Beach CA 94038 Computer forensic services;
CLOUD FORENSICS NUVESTACK, INC. 299 South Main Street, Ste 1300 Salt Lake City UT 84111 Computer forensic services; Consulting services in the field of collection of evidence for forensic purposes; Providing information in the field of collection of evidence for forensic purposes; Software as a service (SAAS) services featuring software for forensic analysis of mobile devices; Software as a service (SAAS) services featuring software for digital forensics data collection from computers and mobile telephones; Software as a service (SAAS) services, namely, hosting software for use by others for use collecting, analyzing, and storing evidence from computing devices;
COMPOUNDING THE POSITIVES... PROVIDING EXPONENTIAL RESULTS DAHNS 6901 Ontario Street, Suite 204 Springfield VA 22152 Computer forensic services; Computer network configuration services; Computer programming services for others in the field of software configuration management; Computer services, namely, on-site management of the information technology (IT) systems; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer services, namely, remote and on-site management of the information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer software installation and maintenance; Computer technical support services, namely, 24/7 service desk/help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer technology support services, namely, help desk services; Consulting in the field of configuration management for computer hardware and software; Consulting in the field of information technology; Consulting in the field of virtualization technologies for enterprises and businesses; Design, installation, updating and maintenance of computer software; Installation and maintenance of computer software; Installation and maintenance of Internet access software; Installation and repair of computer software, including mobile performance of such services on customer premises; Installation of computer software; Installation, maintenance and repair of cell phone related software; Installation, maintenance and repair of computer software; Installation, maintenance and repair of software for computer systems; Installation, repair and maintenance of computer software; Installing computer programs; Maintenance and updating of computer software; Maintenance and upgrading of computer software; Maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Maintenance of software for Internet access; Planning, design and implementation of virtualization technologies for enterprises and businesses; Planning, design and management of information technology systems; Preparation, update, installation and maintenance of computer software; Professional computer services, namely, network analysis, LAN/WAN design, wireless engineering, virtualization and computer project management; Remote computer network technical monitoring and software maintenance services; Technical advice relating to operation of computers; Technical support services, namely, 24x7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; Technical support services, namely, migration of datacenter, server and database applications; Technical support services, namely, remote administration and management of in-house and hosted datacenter devices, databases and software applications; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Technical support services, namely, troubleshooting of industrial process control computer software problems; Technical support, namely, monitoring of network systems; Technical support, namely, providing back-up computer programs and facilities;
CYBER WITHOUT BORDERS Donnelly, John F. 6012 Southport Drive Bethesda MD 20814 Computer forensic services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices;
CYFORCE Emerson & Lewis Consulting, LLP http://www.cyforceforensics.com PO Box 302638 St Thomas 00803 US Virgin Islands Computer forensic services; Computer consultation in the field of internet security; Computer consultation in the field of computer security; Computer consultation in the field of cyber security; Computer consultation in the field of digital security; Computer consultation in the field of digital forensics;
CYFORI Cyfori 2141 Alto Lago Canyon Lake TX 78133 Computer forensic services; Computer security consultancy; Computer security consultancy in the field of cybersecurity, digital forensics and threat intelligence; Computer security threat analysis for protecting data; Computer network security consultancy; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Data security consultancy; Digital forensic investigations in the field of computer crimes; Internet security consultancy; Technology consultation in the field of cybersecurity; Telecommunication network security consultancy;
DARK SKY DEFENSE I-1 Group 1309 Coffeen Avenue STE 1200 Sheridan WY 82801 Computer forensic services; Computer programming consultancy in the field of cybersecurity; Computer software development; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Design and development of wireless computer networks; Development of software for secure network operations; Development, updating and maintenance of software and database systems; Research and development of technology in the field of forensic intelligence and information, computer and internet security; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Testing, analysis, and evaluation of computer and internet security to assure compliance with legal, regulatory and self-regulatory industry standards; Technology consultation in the field of cybersecurity;
DART ELIJAH 111 N Wabash Ave Suite 2018 CHICAGO IL 60602 Computer forensic services;
DFIR Harbingers 8 Cornerstone Way Lexington MA 02420 Computer forensic services; Computer security threat analysis for protecting data; Computer security consultancy in the field of cyber related and digital devices computers, mobile phones, tablets, and networking devices; Computer security services, namely, restricting unauthorized network access by identifying signs of malicious or illegal actions and coordinating the affected individuals or organizations; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks;
DISCOVERING DIGITAL SECRETS Techfusion Corporation 87 BLANCHARD ROAD Cambridge MA 02138 Computer forensic services;
E-INVESTIGATIONS Weiss, Daniel 29733 Strawberry Hill Drive Agoura Hills CA 91301 Computer forensic services;
ELIJAH TECHNOLOGIES Andrew Reisman 2885 Lake Ridge Ln Weston FL 33332 Computer forensic services;
FAAS Tecx 6 Pointers Ridge Fredericksburg VA 22405 Computer forensic services; Consulting services in the field of cloud computing; Providing virtual computer systems and virtual computer environments through cloud computing;
FOLLOW THE BLOCKS PRAXIS DETECTION SVCS 1270 W McCormick Rd Amarillo TX 79118 Computer forensic services; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Consulting services in the field of collection of evidence for forensic purposes; Consulting services in the fields of forensic science; Data security consultancy; Digital forensic investigations in the field of computer crimes; Internet security consultancy; Providing information in the field of collection of evidence for forensic purposes; Providing information in the fields of forensic science via the Internet;
FORENSIC TELEMETRY Certichron inc Suite 320 50 W. San Fernando St San Jose CA 95113 Computer forensic services;
INFORMATION OF THINGS Vidoc Razor 46 N. Main Street Kingwood TX 77339 Computer forensic services;
INSIDER FORENSICS INSIDER FORENSICS 1792 CEDAR DRIVE SEVERN MD 21144 Computer forensic services; Information technology consulting services; Technological planning and consulting services in the field of threat assessments;
LARSON SECURITY Larson Security 17 Peterson Place North Oaks MN 55127 Computer forensic services; consulting services in the field of collection of evidence for forensic purposes;
LUCID TRUTH TECHNOLOGIES Kenneth G. Hartman Consulting Services 526 West 14th St., Ste. 231 Traverse City MI 49684 Computer forensic services; Digital forensic investigations in the field of computer crimes;
NAXO Naxo Labs 33 W 60th Street, Floor 2 New York NY 10023 Computer forensic services;
NAXO LABS Naxo Labs 33 W 60th Street, Floor 2 New York NY 10023 Computer forensic services;
NOT HIDDEN NOW Clayton Hoskinson & Associates, Inc. 1924 Oakhurst Circle Norman OK 730711628 Computer Forensic Services;
ORDINARY SKILL Fulton, John William 49 N. Merkle Rd. Bexley OH 43209 Computer forensic services;
PIECING TOGETHER COMPUTER FORENSIC PUZZLES Curtis W. Rose & Associates Suite 251 14625 Baltimore Avenue Laurel MD 20707 Computer forensic services;
PRYVOS Pryvos, Inc. P.O. Box 222 Cobb Island MD 206250222 Computer forensic services; Computer security consultancy;
REAL SUMMARY Larson Security 17 Peterson Place North Oaks MN 55127 Computer forensic services; consulting services in the field of collection of evidence for forensic purposes;
REEL Larson Security 17 Peterson Place North Oaks MN 55127 Computer forensic services; consulting services in the field of collection of evidence for forensic purposes;
REEL SUMMARY Larson Security 17 Peterson Place North Oaks MN 55127 Computer forensic services; consulting services in the field of collection of evidence for forensic purposes;
RSA RSA Security 176 Middlesex Turnpike Bedford MA 01730 Computer forensic services; Consulting services in the field of cloud computing; Computer services, namely, integration of private and public cloud computing environments; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Computer services, namely, encrypted data recovery services; Data encryption and decoding services; Design and development of electronic data security systems; Internet Protocol (IP) address verification services; Providing electronic verification of on-line orders of digital content and generating electronic permission codes which then allow users to access said digital content; Computer security consultancy;
SILICON FORENSICS Silicon Forensics 1242 E. LEXINGTON AVE. POMONA CA 91766 Computer forensic services;
THE POWER OF ONE Trustpoint International Suite 200 3200 Cobb Galleria Parkway Atlanta GA 30339 Computer forensic services; Computer forensic services, namely, forensic collection of data, data culling and filtering via computer forensic industry accepted workflows, processing of native data for extraction and upload to a review database, metadata extraction, image creation of native data, and creation of custom fields of data;
THREATRESPONDER NetSecurity Corporation Suite 235 22375 Broderick Drive Dulles VA 20166 Computer forensic services; Computer security consultancy; Computer software development, computer programming and maintenance of computer software for enabling the collection, analysis, processing, preservation, and reporting of electronic evidence over a network; Consulting services in the field of collection of evidence for forensic purposes; Providing information in the field of collection of evidence for forensic purposes;
UNIQUE WIRE Brian Feucht 340 NE Evans St. McMinnville OR 97128 Computer forensic services; Data automation and collection service using proprietary software to evaluate, analyze and collect digital service data;
UNVEIL Herbert Isham 180 STATE STREET, STE. 202 SOUTHLAKE TX 76092 Computer forensic services;
WHEN NO ONE ELSE CAN Techfusion Corporation 87 BLANCHARD ROAD Cambridge MA 02138 Computer forensic services;
WHERE DATA IS NEVER LOST Techfusion Corporation 87 BLANCHARD ROAD Cambridge MA 02138 Computer forensic services;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A mechanism that enables flexible expansion of proxy firewall services is disclosed. In accordance with the present invention, the firewall system can be configured to include a dispatch host computer and one or more load host computers. Proxy firewall services can be provided by proxy applications that reside on either the dispatch host computer and/or the load host computers. In one embodiment, a load host computer can be configured to support multiple proxy applications. In other embodiments, a load host computer can be dedicated to a single resource intensive application. In this framework, a network administrator can flexibly decide how to accommodate the demand for proxy firewall services. Load hosts can be added or removed from the firewall system without disrupting ongoing security services. In one embodiment, this feature is enabled through the inclusion of a configuration file on the dispatch host computer that stores information relating to the load host computers in the firewall system.