CRITICAL INFORMATICS SECURITY

Brand Owner (click to sort) Address Description
CI SECURITY Critical Informatics, Inc. 100 S. King Street, Suite 280 Seattle WA 98104 CRITICAL INFORMATICS SECURITY;SECURITY;Technology consultation in the field of information systems threat analysis and network security;
CI SECURITY Critical Informatics, Inc. 100 S. King Street, Suite 280 Seattle WA 98104 CRITICAL INFORMATICS SECURITY;SECURITY;Technology consultation in the field of information systems threat analysis and network security; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services namely remote and on-site management of information technology (IT) systems of others comprised of computer software systems used in provision of information technology security services for others; Monitoring of computer systems for detecting unauthorized access or data breach; providing computer virus protection services; providing computer services, namely, online scanning and detecting of viruses, spyware, adware, malware, ransomware, and other malicious code and programs on computers and electronic devices; computer security services, namely, restricting unauthorized network access by users without credentials to hard drives, computer networks and websites; Information technology security network infrastructure consulting services, namely, providing security strategies to assist businesses in protecting their intellectual property, data and network infrastructure against cyber security attack, and conducting security, vulnerability and penetration assessments; information technology computer security consultancy in the field of incident response, risk assessments, cyber security compliance, regulation compliance, and other practices of consultancy in relation to cyber security; Computer security threat analysis for protecting data from cyber threats and incidents; Managed information technology security services, namely, computer security threat analysis for protecting data; Monitoring of computer systems for detecting unauthorized access or data breach, namely, monitoring third-party information systems, operational technology (OT) and internet of things (IoT) networks for security detection and response purposes; Computer security threat analysis for protecting data, namely, assisting third-party enterprise network owners and operators to guard, monitor, detect, secure and respond to cyberattack and malware network and digital infrastructure intrusion incidents, both actual and attempted; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security consultancy and monitoring of computer systems for detecting unauthorized access or data breach, namely, Information, OT and IoT networks security incident and response services, consisting of monitoring third-party information systems and IoT and OT networks for security and incident response purposes, including detection and response plan development, delivery and implementation services;
CI SECURITY Critical Informatics, Inc. 100 S. King Street, Suite 280 Seattle WA 98104 CRITICAL INFORMATICS SECURITY;Monitoring third-party information systems, operational technology (OT) and internet of things (IoT) networks for security detection and response purposes; Assisting third-party enterprise network owners and operators to guard, monitor, detect, secure and respond to cyberattack and malware network and digital infrastructure intrusion incidents, both actual and attempted; Information, OT and IoT networks security incident and response services, consisting of monitoring third-party information systems and IoT and OT networks for security and incident response purposes, including detection and response plan development, delivery and implementation services;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The invention relates to a portable data carrier system having a control unit, a body, a data memory integrated in a chip, in which security-relevant data can be stored, and a feature for permitting information exchange between the control unit and an external access unit. A security device of the chip transmits a security signal that is influenced by an influencing feature integrated in the body and non-electrically connected with the security device. A detection feature of the security device detects the influenced security signal, an evaluation feature evaluates the detected, influenced security signal, and a blocking feature blocks a security-critical operating state of the data carrier system if the evaluation feature does not recognize a security signal influenced in the expected way.