COMPUTER SECURITY THREAT ANALYSIS

Brand Owner (click to sort) Address Description
ADAPT-ICS Redbot Security 1312 17th St STE 523 Denver CO 80202 Computer security threat analysis for protecting data; Cybersecurity services in the nature of restricting unauthorized access to computer systems;
AESALON TECHNOLOGIES Cyber Business Analytics, Inc. 4423 Point Fosdick Dr NW, Suite 208 Gig Harbor WA 98335 Computer security threat analysis for protecting data;
AI SECURITY Plume Design, Inc. 325 Lytton Avenue, Suite 200 Palo Alto CA 94301 Computer security threat analysis for protecting data;
AI SECURITY LAB Blue Trail Software Holding, Inc. 45 Bobolink Road Orinda CA 94563 Computer security threat analysis for protecting data;
ARES CYBER SECURITY, LLC Pennell, Lawrence 2808 Linde Vista Dr Rialto CA 92377 Computer security threat analysis for protecting data;
BEACON Cross Atlantic Solutions 14707 S Dixie Hwy, Suite 403 Miami FL 33176 Computer security threat analysis for protecting data; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service (SAAS) services featuring software for accessing and analyzing real time data and receiving alerts as to the locations, behaviors, and attribution of communication devices in order to monitor cyber threats and mitigate risks in the field of cybersecurity; Technology consultation in the field of cybersecurity;
BETTER PRIVACY. LESS RISK. IOR Analytics 6106 Tyne St., Unit B Houston TX 77007 Computer security threat analysis for protecting data; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Data security consultancy; Software as a service (SAAS) services featuring software for automated data mapping, automated risk analysis, data collection and inspection for private of sensitive information;
BTECH BTECH SERVICE INC. 180 South Lake Avenue, Suite 430 Pasadena CA 91101 Computer security threat analysis for protecting financial and personal data from worms, malware, viruses and hackers in the field of credit union data security;
COLOR ATOMS Reyes International Holdings 3355 Lenox Rd., Suite 2050 Atlanta GA 30326 Computer security threat analysis for protecting data; Creating and maintaining internet sites for others; Design and development of electronic data security systems; E-mail system design and implementation for others; Electronic storage of documents and archived e-mails; Hosting websites on the Internet; Internet security consultancy; Web publishing, namely, creating a website and uploading it onto an Internet server; Website design consultancy; Website design and development for others;
CONTINUOUS COMPROMISE MONITORING Prevailion, Inc. Suite 1325 9950 Woodloch Forest The Woodlands TX 77380 Computer security threat analysis for protecting data; Computer security services, namely, continuous monitoring for breaches of others' computers and networks;
CS:ASSURE Capstorm PO Box 1159 Santa Rosa Beach FL 32459 Computer security threat analysis for protecting data; Computer services, namely, data recovery services; Data migration services; Data warehousing; Electronic data storage; Remote computer backup services; Data governance services; Data integration services;
CS:ENABLE Capstorm PO Box 1159 Santa Rosa Beach FL 32459 Computer security threat analysis for protecting data; Computer services, namely, data recovery services; Data migration services; Data warehousing; Electronic data storage; Remote computer backup services; Data governance services; Data integration services;
CS:GOVERN Capstorm PO Box 1159 Santa Rosa Beach FL 32459 Computer security threat analysis for protecting data; Computer services, namely, data recovery services; Data migration services; Data warehousing; Electronic data storage; Remote computer backup services; Data governance services; Data integration services;
CYBER CARE The I.T. Workshop C/O LegalForce RAPC Worldwide 446 E Southern Ave Tempe AZ 85282 Computer security threat analysis for protecting data;
CYBER DEFENSE CONTRACTORS Boston Autonomic 54 Perkins Street Gloucester MA 01930 Computer security threat analysis for protecting data;
CYFORMER Defense Contracting Inc 6245 Guardian Gateway, Suite 120 APG MD 21005 Computer security threat analysis for protecting data;
CYSKOR Andrew Adams 2519 N Mcmullen Booth Rd STE 510/198 Clearwater FL 33761 Computer security threat analysis for protecting data; Monitoring of computer systems for security purposes for detecting unauthorized access or data breach;
EVIDENCE OF COMPROMISE Prevailion, Inc. Suite 1325 9950 Woodloch Forest The Woodlands TX 77380 Computer security threat analysis for protecting data; Computer security services, namely, providing verified data on the security breaches of others' computers and networks;
HUMAN HUMAN SECURITY, INC. 111 West 33rd Street New York NY 10001 Computer security threat analysis in the nature of fraud detection for protecting data in the fields of computer security, computer networks security, banking, and online advertising and commerce; Electronic monitoring of electronic funds transfer, credit and debit card and electronic check transactions via a global computer network to detect fraud;
HYAS Hyas Infosec Inc. 3 Fan Tan Alley, Suite 500 Victoria, BC V8W3G9 Canada Computer security threat analysis for protecting data;
INTUITUS Aldrich, Timothy M. 32700 51st Pl SW Federal Way WA 98023 Computer security threat analysis for protecting data;
LINCOLN AI Shanker, Mihir Daya 5927 Almeda Road, Unit 22203 Houston TX 77004 Computer security threat analysis for protecting data; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Technology consultation in the field of artificial intelligence;
NATION STATE THREAT FINDER Cybertalons Suite 500 8300 Boone Blvd. Vienna VA 22182 Computer security threat analysis for protecting data; Data security consultancy;
NET REPORTER SCORE PhishingBox 400 East Vine Street, Suite 301 Lexington KY 40507 Computer security threat analysis for protecting data; Measurement evaluations in the field of computer security, namely, the security awareness of individuals within an organization;
PAGE SHIELD CLOUDFLARE, INC. 101 Townsend Street San Francisco CA 94107 Computer security threat analysis for protecting data;
QIDP HyperSphere Technologies, Inc. 980 Birmingham Road Ste 501 #262 Milton GA 30004 Computer security threat analysis for protecting data; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Data security consultancy; Design and development of electronic data security systems;
REVIVE HyperSphere Technologies, Inc. 980 Birmingham Road Ste 501 #262 Milton GA 30004 Computer security threat analysis for protecting data; data encryption services for providing security and anonymity for electronically transmitted credit card transactions; data security consultancy; design and development of electronic data security systems;
REVIVE CRYPTO HyperSphere Technologies, Inc. 980 Birmingham Road Ste 501 #262 Milton GA 30004 Computer security threat analysis for protecting data; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Data security consultancy; Design and development of electronic data security systems;
SECURING HUMANS AND THEIR DEVICES English, Sharee 6700 N. Linder Road, Suite 156 #241 Meridian ID 83646 Computer security threat analysis for protecting data; Computer virus protection services;
SOTERIA Soteria P.O. Box 29403 King Street Charleston SC 29403 Computer security threat analysis for protecting data; Computer consultation in the field of security, namely, identifying, assessing, and developing strategies for others in the fields of data security and the prevention of cyber threats; Design and development of electronic data security systems; Development of computer security systems and contingency planning for enterprise information systems, for the purpose of protecting against cyber threats; Development of customized enterprise software for others for use in cyber risk assessment and information security; Development of customized enterprise software for secure network operations, namely, for preventing unauthorized network access, in the field of cybersecurity; Updating of enterprise computer software relating to computer security and prevention of computer risks; Computer security consultancy, namely, designing custom IT security policies for others, training corporate and governmental employees on security practices, and facilitating the implementation of IT security policies; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, in the field of cybersecurity; Computer security consultancy in the field of cybersecurity, namely, analyzing cyber threat intelligence and cyber threats to information systems;  Internet security consultancy, namely, detecting and analyzing unauthorized or improper use of intellectual property and brand elements on the Internet; Maintenance of enterprise computer software relating to computer security and prevention of computer risks, namely, cyber threats;
SPOTLIGHT Cross Atlantic Solutions 14707 S Dixie Hwy, Suite 403 Miami FL 33176 Computer security threat analysis for protecting data; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service (SAAS) services featuring software for accessing and analyzing real time data and receiving alerts as to the locations, behaviors, and attribution of communication devices in order to monitor cyber threats and mitigate risks in the field of cybersecurity; Technology consultation in the field of cybersecurity;
TAILORED INTELLIGENCE Prevailion, Inc. Suite 1325 9950 Woodloch Forest The Woodlands TX 77380 Computer security threat analysis for protecting data; Computer security services, namely, providing customized information and insight on security breaches of others' computers, networks, and infrastructure;
TRUSTED EXECUTION BLOCK Samuel Bailey 330 Stonecastle Pass SW Atlanta GA 30331 Computer security threat analysis for protecting data; Design and development of electronic data security systems;
TRUSTED EXECUTION NETWORK Samuel Bailey 330 Stonecastle Pass SW Atlanta GA 30331 Computer security threat analysis for protecting data; Design and development of electronic data security systems;
VICTORY Victory CTO 816 Congress Ave., Ste 1200 Austin TX 78701 Computer security threat analysis for protecting data; Data security consultancy; Design and development of electronic data security systems; Internet security consultancy; Maintenance of computer software relating to computer security and prevention of computer risks;
VIGILANTE VIGILANTEATI, INC. Suite 150 2425 East Camelback Road Phoenix AZ 85016 Computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for collecting advanced cybersecurity threat intelligence;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method of active detection of at least one threat to the homeland security. Each such threat is either hidden inside at least one cargo container before transit, or is placed inside at least one cargo container while in transit; each such threat while interacting with its surrounding generates a unique threat signature. The method comprises the following steps: (A) substantially continuously probing each cargo container; (B) detecting at least one threat signature; (C) processing each detected threat signature to determine a likelihood of at least one threat to become a threat to the homeland security; (D) identifying at least one container that includes such threat to the homeland security; and (E) eliminating such threat to the homeland security.