Brands and Their Owners
Brand | Owner (click to sort) | Address | Description |
---|---|---|---|
INTELLIGENT CONTENT PROTECTION | WEBSENSE, INC. | 10240 Sorrento Valley San Diego CA 92121 | COMPUTER SOFTWARE FOR WEB, HARDWARE, NETWORK, COMPUTER AND INTERNET SECURITY;CONTENT PROTECTION;COMPUTER SECURITY SERVICES, NAMELY, RESTRICTING ACCESS TO AND BY COMPUTER NETWORKS TO AND OF UNDESIRED WEB SITES, MEDIA, AND INDIVIDUALS AND FACILITIES FOR WEB, HARDWARE, NETWORK, COMPUTER AND INTERNET SECURITY; |
LEAKSEEKER | WEBSENSE, INC. | 10240 Sorrento Valley San Diego CA 92121 | COMPUTER SOFTWARE FOR WEB, HARDWARE, NETWORK, COMPUTER AND INTERNET SECURITY;LEAK SEEKER; |
SEEKER | WEBSENSE, INC. | 10240 Sorrento Valley San Diego CA 92121 | COMPUTER SOFTWARE FOR WEB, HARDWARE, NETWORK, COMPUTER AND INTERNET SECURITY; |
SOCIAL SKY | Social Sky Corporation Ltd. | Revivim 61 Herzeliya 46240 Israel | Computer software for web and mobile application development designed in accordance with third party specifications; Computer software for use in database management; Computer application software for use with computers, mobile phones and mobile devices, PDA's, portable media players, handheld computers, televisions, video game program systems and computer networks computers, namely, software for use in database management; Computer application software for use via the internet, with computers, mobile phones and mobile devices, PDA's, portable media players, handheld computers, televisions, video game program systems and computer networks computers, namely, software for use in database management; Computer application software for use with QR codes for use in advertising; Computer application software for use with QR codes for survey management applications; Computing platforms, namely, computer software platforms for community engagement; Computer firmware for use in database management; Computer hardware for security related applications; Network server engines for use by software developers to develop software faster and with greater efficiency;SOCIAL;Computer programming services in accordance with third party specifications and maintenance of computer programmes; Design and development of software in accordance with third party specifications; Designing and developing software for social marketing of mobile and web applications in accordance with third party specifications; Design and development of software; Designing and developing software for social marketing of mobile and web applications; Designing and developing computer game software and video game software for use with computers, handheld computers, mobile phones and mobile devices, PDA's, portable media players, televisions, video game program systems and computer networks; Designing and developing computer game software and video game software downloadable via the internet, for use with computers, handheld computers, mobile phones and mobile devices, PDA's, portable media players, televisions, video game program systems and computer networks; Providing on-line non-downloadable software for use in database management; |
SURFWATCH | Hacksurfer | P.O. Box 295 Glenelg MD 21737 | Computer software for web and mobile applications for providing data analytics and business intelligence featuring measurements of cybercrime activity;SURF WATCH; |
THREATSEEKER | FORCEPOINT FEDERAL HOLDINGS | 10900-A STONELAKE BLVD. QUARRY OAKS 1, SUITE 350 AUSTIN TX 78759 | COMPUTER SOFTWARE FOR WEB, HARDWARE, NETWORK, COMPUTER AND INTERNET SECURITY;THREAT SEEKER; |
WEBTASFX | INTELLIGENT SOFTWARE SOLUTIONS USA | 5450 TECH CENTER DRIVE COLORADO SPRINGS CO 80919 | Computer software for a Web 2.0 based software toolkit providing visualization, integration and analysis of disparate data, excluding financial exchange data, in a Service Oriented Architecture (SOA) compliant platform;WEB ENABLED TEMPORAL ANALYSIS SYSTEM; |
WHERE CYBER SOLUTIONS ARE FOUND | SurfWatch Labs, Inc. | P.O. Box 714 10001 Georgetown Pike Great Falls VA 22066 | Computer software for web and mobile applications for providing data analytics and business intelligence featuring measurements of cybercrime activity; |
Where the owner name is not linked, that owner no longer owns the brand |