Brands and Their Owners
Brand | Owner (click to sort) | Address | Description |
---|---|---|---|
ADAPT-ICS | Redbot Security | 1312 17th St STE 523 Denver CO 80202 | Computer security threat analysis for protecting data; Cybersecurity services in the nature of restricting unauthorized access to computer systems; |
AESALON TECHNOLOGIES | Cyber Business Analytics, Inc. | 4423 Point Fosdick Dr NW, Suite 208 Gig Harbor WA 98335 | Computer security threat analysis for protecting data; |
AI SECURITY | Plume Design, Inc. | 325 Lytton Avenue, Suite 200 Palo Alto CA 94301 | Computer security threat analysis for protecting data; |
AI SECURITY LAB | Blue Trail Software Holding, Inc. | 45 Bobolink Road Orinda CA 94563 | Computer security threat analysis for protecting data; |
ARES CYBER SECURITY, LLC | Pennell, Lawrence | 2808 Linde Vista Dr Rialto CA 92377 | Computer security threat analysis for protecting data; |
|
|||
BEACON | Cross Atlantic Solutions | 14707 S Dixie Hwy, Suite 403 Miami FL 33176 | Computer security threat analysis for protecting data; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service (SAAS) services featuring software for accessing and analyzing real time data and receiving alerts as to the locations, behaviors, and attribution of communication devices in order to monitor cyber threats and mitigate risks in the field of cybersecurity; Technology consultation in the field of cybersecurity; |
BETTER PRIVACY. LESS RISK. | IOR Analytics | 6106 Tyne St., Unit B Houston TX 77007 | Computer security threat analysis for protecting data; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Data security consultancy; Software as a service (SAAS) services featuring software for automated data mapping, automated risk analysis, data collection and inspection for private of sensitive information; |
BTECH | BTECH SERVICE INC. | 180 South Lake Avenue, Suite 430 Pasadena CA 91101 | Computer security threat analysis for protecting financial and personal data from worms, malware, viruses and hackers in the field of credit union data security; |
COLOR ATOMS | Reyes International Holdings | 3355 Lenox Rd., Suite 2050 Atlanta GA 30326 | Computer security threat analysis for protecting data; Creating and maintaining internet sites for others; Design and development of electronic data security systems; E-mail system design and implementation for others; Electronic storage of documents and archived e-mails; Hosting websites on the Internet; Internet security consultancy; Web publishing, namely, creating a website and uploading it onto an Internet server; Website design consultancy; Website design and development for others; |
CONTINUOUS COMPROMISE MONITORING | Prevailion, Inc. | Suite 1325 9950 Woodloch Forest The Woodlands TX 77380 | Computer security threat analysis for protecting data; Computer security services, namely, continuous monitoring for breaches of others' computers and networks; |
CS:ASSURE | Capstorm | PO Box 1159 Santa Rosa Beach FL 32459 | Computer security threat analysis for protecting data; Computer services, namely, data recovery services; Data migration services; Data warehousing; Electronic data storage; Remote computer backup services; Data governance services; Data integration services; |
CS:ENABLE | Capstorm | PO Box 1159 Santa Rosa Beach FL 32459 | Computer security threat analysis for protecting data; Computer services, namely, data recovery services; Data migration services; Data warehousing; Electronic data storage; Remote computer backup services; Data governance services; Data integration services; |
CS:GOVERN | Capstorm | PO Box 1159 Santa Rosa Beach FL 32459 | Computer security threat analysis for protecting data; Computer services, namely, data recovery services; Data migration services; Data warehousing; Electronic data storage; Remote computer backup services; Data governance services; Data integration services; |
CYBER CARE | The I.T. Workshop | C/O LegalForce RAPC Worldwide 446 E Southern Ave Tempe AZ 85282 | Computer security threat analysis for protecting data; |
CYBER DEFENSE CONTRACTORS | Boston Autonomic | 54 Perkins Street Gloucester MA 01930 | Computer security threat analysis for protecting data; |
CYFORMER | Defense Contracting Inc | 6245 Guardian Gateway, Suite 120 APG MD 21005 | Computer security threat analysis for protecting data; |
CYSKOR | Andrew Adams | 2519 N Mcmullen Booth Rd STE 510/198 Clearwater FL 33761 | Computer security threat analysis for protecting data; Monitoring of computer systems for security purposes for detecting unauthorized access or data breach; |
EVIDENCE OF COMPROMISE | Prevailion, Inc. | Suite 1325 9950 Woodloch Forest The Woodlands TX 77380 | Computer security threat analysis for protecting data; Computer security services, namely, providing verified data on the security breaches of others' computers and networks; |
HUMAN | HUMAN SECURITY, INC. | 111 West 33rd Street New York NY 10001 | Computer security threat analysis in the nature of fraud detection for protecting data in the fields of computer security, computer networks security, banking, and online advertising and commerce; Electronic monitoring of electronic funds transfer, credit and debit card and electronic check transactions via a global computer network to detect fraud; |
HYAS | Hyas Infosec Inc. | 3 Fan Tan Alley, Suite 500 Victoria, BC V8W3G9 Canada | Computer security threat analysis for protecting data; |
INTUITUS | Aldrich, Timothy M. | 32700 51st Pl SW Federal Way WA 98023 | Computer security threat analysis for protecting data; |
LINCOLN AI | Shanker, Mihir Daya | 5927 Almeda Road, Unit 22203 Houston TX 77004 | Computer security threat analysis for protecting data; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Technology consultation in the field of artificial intelligence; |
NATION STATE THREAT FINDER | Cybertalons | Suite 500 8300 Boone Blvd. Vienna VA 22182 | Computer security threat analysis for protecting data; Data security consultancy; |
NET REPORTER SCORE | PhishingBox | 400 East Vine Street, Suite 301 Lexington KY 40507 | Computer security threat analysis for protecting data; Measurement evaluations in the field of computer security, namely, the security awareness of individuals within an organization; |
PAGE SHIELD | CLOUDFLARE, INC. | 101 Townsend Street San Francisco CA 94107 | Computer security threat analysis for protecting data; |
QIDP | HyperSphere Technologies, Inc. | 980 Birmingham Road Ste 501 #262 Milton GA 30004 | Computer security threat analysis for protecting data; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Data security consultancy; Design and development of electronic data security systems; |
REVIVE | HyperSphere Technologies, Inc. | 980 Birmingham Road Ste 501 #262 Milton GA 30004 | Computer security threat analysis for protecting data; data encryption services for providing security and anonymity for electronically transmitted credit card transactions; data security consultancy; design and development of electronic data security systems; |
REVIVE CRYPTO | HyperSphere Technologies, Inc. | 980 Birmingham Road Ste 501 #262 Milton GA 30004 | Computer security threat analysis for protecting data; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Data security consultancy; Design and development of electronic data security systems; |
SECURING HUMANS AND THEIR DEVICES | English, Sharee | 6700 N. Linder Road, Suite 156 #241 Meridian ID 83646 | Computer security threat analysis for protecting data; Computer virus protection services; |
SOTERIA | Soteria | P.O. Box 29403 King Street Charleston SC 29403 | Computer security threat analysis for protecting data; Computer consultation in the field of security, namely, identifying, assessing, and developing strategies for others in the fields of data security and the prevention of cyber threats; Design and development of electronic data security systems; Development of computer security systems and contingency planning for enterprise information systems, for the purpose of protecting against cyber threats; Development of customized enterprise software for others for use in cyber risk assessment and information security; Development of customized enterprise software for secure network operations, namely, for preventing unauthorized network access, in the field of cybersecurity; Updating of enterprise computer software relating to computer security and prevention of computer risks; Computer security consultancy, namely, designing custom IT security policies for others, training corporate and governmental employees on security practices, and facilitating the implementation of IT security policies; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, in the field of cybersecurity; Computer security consultancy in the field of cybersecurity, namely, analyzing cyber threat intelligence and cyber threats to information systems; Internet security consultancy, namely, detecting and analyzing unauthorized or improper use of intellectual property and brand elements on the Internet; Maintenance of enterprise computer software relating to computer security and prevention of computer risks, namely, cyber threats; |
SPOTLIGHT | Cross Atlantic Solutions | 14707 S Dixie Hwy, Suite 403 Miami FL 33176 | Computer security threat analysis for protecting data; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service (SAAS) services featuring software for accessing and analyzing real time data and receiving alerts as to the locations, behaviors, and attribution of communication devices in order to monitor cyber threats and mitigate risks in the field of cybersecurity; Technology consultation in the field of cybersecurity; |
TAILORED INTELLIGENCE | Prevailion, Inc. | Suite 1325 9950 Woodloch Forest The Woodlands TX 77380 | Computer security threat analysis for protecting data; Computer security services, namely, providing customized information and insight on security breaches of others' computers, networks, and infrastructure; |
TRUSTED EXECUTION BLOCK | Samuel Bailey | 330 Stonecastle Pass SW Atlanta GA 30331 | Computer security threat analysis for protecting data; Design and development of electronic data security systems; |
TRUSTED EXECUTION NETWORK | Samuel Bailey | 330 Stonecastle Pass SW Atlanta GA 30331 | Computer security threat analysis for protecting data; Design and development of electronic data security systems; |
VICTORY | Victory CTO | 816 Congress Ave., Ste 1200 Austin TX 78701 | Computer security threat analysis for protecting data; Data security consultancy; Design and development of electronic data security systems; Internet security consultancy; Maintenance of computer software relating to computer security and prevention of computer risks; |
VIGILANTE | VIGILANTEATI, INC. | Suite 150 2425 East Camelback Road Phoenix AZ 85016 | Computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for collecting advanced cybersecurity threat intelligence; |
Where the owner name is not linked, that owner no longer owns the brand |