COMPUTER NETWORK SECURITY SERVICES

Brand Owner (click to sort) Address Description
AI-ANALYST Centripetal Networks, Inc. 1875 Explorer Street, Suite 900 Reston VA 20190 Computer network security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Providing online non-downloadable software for monitoring cyber security analytics;
BREAKWATER Breakwater Security Associates, Inc. 2200 6th Avenue, Suite 925 Seattle WA 98121 Computer network security services; computer consulting services in the area of security and security systems for a global computer network;
CLOUD SECURITY PROVIDER Prolexic Technologies, Inc. C/O Brown, Raysman Millstein , et al 900 Third Avenue New York NY 10022 computer network security services, namely, monitoring of public-facing network traffic for security purposes, for purposes of mitigating distributed denial of service (DDoS) attacks on computer servers connected to the Internet;
CYBER UNIT Cyber Unit Inc. 3050 8th Ave W. Vancouver, BC V6K2C1 Canada computer network security services; computer security consultancy; internet security consultancy; software as a service (SAAS) provider in the fields of computer and internet security;
CYBERSCOPIC Reis Informatica Inc. 565 Trillium Dr, Unit 1 Kitchener, Ontario N2R1J4 Canada Computer network security services; computer security consultancy; internet security consultancy; maintenance of computer software relating to computer security and prevention of computer risks;
CYPHER-SAGE Cypher-Sage, Inc. 501-C West Colfax Palatine IL 60067 computer network security services;
DISTINCTLY DATA COMMVAULT SYSTEMS, INC. 1 Commvault Way Tinton Falls NJ 07724 Computer network security services, namely, monitoring of computer systems for security purposes; consulting services in the field of maintaining the security and integrity of databases and conducting security audits of computer network systems;data;Computer programming for others, computer consultation; computer support services, namely, provision of technical assistance and technical support; computer software design for others; Computer monitoring services which track software performance and processes and sends out historical reports and alerts, and providing back-up computer programs and facilities; integration of computer systems and networks; customization of computer hardware and software for end users;
END-TO-END NETWORKS INC. The End-To-End Group Inc. Unit #1 210 Cochrane Dr. Markham L3R8E6 Canada computer network security services;
FORTRESSONE FortressOne, Inc. 227 Bellevue Way N.E., PMB #511 Bellevue WA 98004 Computer network security services, namely, providing vulnerability analysis, access control, proactive computer network protection, intrusion detection and incident responses to others against online intruders via a global computer network;
GLOBAL INFORMATION SECURITY Global Information Security Inc 518 N. Tampa Street Tampa FL 33602 Computer network security services, namely, providing virus protection, encryption, firewalls and virtual private networks, namely, Internet protocol computer networks providing secure communications to the IP protocol between all communicating points;
GLOBAL INTERNET SECURITY Global Information Security Inc. 518 N. Tampa Street Tampa FL 33602 Computer network security services, namely, providing virus protection, encryption, firewalls and virtual private networks, namely, Internet protocol computer networks providing secure communications to the IP protocol between all communicating points;
GROUND TO CLOUD Prolexic Technologies, Inc. C/O Brown, Raysman Millstein , et al 900 Third Avenue New York NY 10022 computer network security services, namely, monitoring of public-facing network traffic for security purposes, for purposes of mitigating distributed denial of service (DDoS) attacks on computer servers connected to the Internet;
HACUMEN Neil Anderson 3862 Greendale Drive Fort Wayne IN 46815 Computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon;
HAD Prolexic Technologies, Inc. C/O Brown, Raysman Millstein , et al 900 Third Avenue New York NY 10022 computer network security services, namely, monitoring of public-facing network traffic for security purposes and for purposes of mitigating distributed denial of service (DDoS) attacks on computer servers connected to the Internet;
HTTP ANOMALY DETECTION AKAMAI TECHNOLOGIES, INC. 150 Broadway Cambridge MA 02142 Computer network security services, namely, monitoring of computer network systems for security purposes, all for purposes of mitigating distributed denial of service (DDoS) attacks on computer servers connected to a computer network, namely, the Internet;
JAVELIN Trail of Bits, Inc. 228 Park Ave S #80688 New York NY 10003 Computer network security services, namely, investigation, testing, assessment and analysis of entry points and weaknesses in computer networks and providing an online website portal for access to computer network security reports of test and assessment results and for facilitating the prioritization of improvements to computer network security;
KENNA CISCO TECHNOLOGY, INC. 170 West Tasman Drive San Jose CA 95134 computer network security services, namely, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon;
KENNA KENNA SECURITY 170 WEST TASMAN DRIVE SAN JOSE CA 951341706 computer network security services, namely, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon;
KENNA Kenna Security, Inc. 560 Mission Street, Suite 230 San Francisco CA 94105 computer network security services, namely, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon;
KENNA.APPSEC CISCO TECHNOLOGY, INC. 170 West Tasman Drive San Jose CA 95134 Computer network security services, namely, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon; software as a service (SAAS) services featuring software for scanning and testing of computers and networks to identify, assess, prioritize and remediate security vulnerabilities, for measuring security risks, and for analyzing security threats; temporary use of web based non downloadable cloud-based computer programs for use in scanning and testing computers and networks; consulting services in the field of computer security, network security, and internet security; provision of information in the field of computer security, network security, and internet security;
KENNA.VI CISCO TECHNOLOGY, INC. 170 West Tasman Drive San Jose CA 95134 Computer network security services, namely, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon; software as a service (SAAS) services featuring software for scanning and testing of computers and networks to identify, assess, prioritize and remediate security vulnerabilities, for measuring security risks, and for analyzing security threats; temporary use of web based non downloadable cloud-based computer programs for use in scanning and testing computers and networks; consulting services in the field of computer security, network security, and internet security; provision of information in the field of computer security, network security, and internet security;
KENNA.VM CISCO TECHNOLOGY, INC. 170 West Tasman Drive San Jose CA 95134 Computer network security services, namely, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon; software as a service (SAAS) services featuring software for scanning and testing of computers and networks to identify, assess, prioritize and remediate security vulnerabilities, for measuring security risks, and for analyzing security threats; temporary use of web based non downloadable cloud-based computer programs for use in scanning and testing computers and networks; consulting services in the field of computer security, network security, and internet security; provision of information in the field of computer security, network security, and internet security;
MEASUREMENT BOUND KEYS JW Secure, Inc. 1752 NW Market St., Ste 227 Seattle WA 98107 Computer and network security services, namely, authentication of credentials and encryption of data for mobile devices;
OWN YOUR DEFENSE LEVEL 3 COMMUNICATIONS 1025 Eldorado Boulevard Broomfield CO 80021 COMPUTER NETWORK SECURITY SERVICES, NAMELY, MONITORING OF NETWORK TRAFFIC FOR SECURITY PURPOSES, FOR PURPOSES OF PREVENTING DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS ON COMPUTER SERVERS CONNECTED TO THE INTERNET;DEFENSE;
QUALYS Qualys, Inc. 4th Floor 919 E. Hillsdale Foster City CA 94404 computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon;
QUALYS Qualys, Inc. 4th Floor 919 E. Hillsdale Foster City CA 94404 computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon;
QUALYSFREESCAN Qualys, Inc. 4th Floor 919 E. Hillsdale Foster City CA 94404 Computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon;
RBV Prolexic Technologies, Inc. C/O Brown, Raysman Millstein , et al 900 Third Avenue New York NY 10022 Computer network security services, namely, monitoring of public-facing network traffic for security purposes, for purposes of mitigating distributed denial of service (DDoS) attacks on computer servers connected to the Internet;
REAL BROWSER VERIFICATION AKAMAI TECHNOLOGIES, INC. 150 Broadway Cambridge MA 02142 computer network security services, namely, monitoring of public-facing network traffic for security purposes, for purposes of mitigating distributed denial of service (DDoS) attacks on computer servers connected to the Internet;
REMOTE ATTACK MONITORING SERVICE Prolexic Technologies, Inc. C/O Brown, Raysman Millstein , et al 900 Third Avenue New York NY 10022 computer network security services, namely, mitigating distributed denial of service (DDoS) attacks on computer servers connected to the Internet;
SEE LEARN ADAPT ACT Sourcefire, Inc. 9770 Patuxent Woods Drive Columbia MD 21046 Computer network security services, namely, network and online scanning, detecting and eliminating viruses, malware and unauthorized data and programs on computers and electronic devices;
SINGULAR INFORMATION MANAGEMENT COMMVAULT SYSTEMS, INC. 1 Commvault Way Tinton Falls NJ 07724 Computer network security services, namely, monitoring of computer systems for security purposes; consulting services in the field of maintaining the security and integrity of databases and conducting security audits of computer network systems;INFORMATION MANAGEMENT;
SOLVING FORWARD COMMVAULT SYSTEMS, INC. 1 Commvault Way Tinton Falls NJ 07724 Computer network security services, namely, monitoring of computer systems for security purposes; consulting services in the field of maintaining the security and integrity of databases and conducting security audits of computer network systems;
VALATOR VERIDIAN CORPORATION 3300 Plymouth Road Ann Arbor MI 48105 computer network security services, namely, designing security programs for computer networks and providing related consulting services; monitoring of network security systems;
VALLATOR VERIDIAN CORPORATION 3300 Plymouth Road Ann Arbor MI 48105 computer network security services, namely, designing security programs for computer networks and providing related consulting services; monitoring of network security systems;
VERITECT VERIDIAN CORPORATION 3300 Plymouth Road Ann Arbor MI 48105 computer network security services; designing security programs for computer networks and providing related consulting services; monitoring of network security systems;
ZINDEX IDZ LTD Kemp House, 160 City Road London EC1V2NX United Kingdom Computer network security services, namely, providing network surveillance for others to restrict access to premises and tangible items for personal and tangible security purposes;Computer network security services, namely, restricting access to and by computer networks to and of undesired web sites, media, digital mobile devices, individuals and facilities, featuring software for identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon; Computer network security consultancy services featuring providing network vulnerability testing and risk assessment services, network penetration and penetration mitigation services, and network monitoring and management, detection and reporting of malicious network activity; Computer network security consultancy services to assist others in identifying and managing network security risks and locating and mitigating network security breaches; Providing computer cyber security consultancy services; Computer network security consultancy services in the field of maintaining the security and integrity of networks and databases;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A security administration server providing various security services in the LAN and a host server operating in connection thereto are provided. There is installed a security administration server (S) having a function for collecting various log information managed in various devices to be monitored (C) operating in the LAN, a function for generating an image by extracting information useful for security management of the LAN from collected log information and visualizing such information to a form easy for a person to use, and a function for sending the image to another monitoring device (C). Further, the security administration server (S) provides various security services in connection with a host server (H) operating in an external network.