CYBER SECURE

Brand Owner (click to sort) Address Description
CYBER SECURE AT SEA Barrett, Danelle 8005 Mitchell Loop SW Washington DC 20032 CYBER SECURE;Computer security consultancy in the field of maritime cyber security, namely, providing computer security threat analysis for protecting data; Cybersecurity computer consulting services specifically tailored for maritime vessel and platform owners and operators; Cybersecurity computer consulting services specifically tailored for maritime vessel and platform owners and operators, namely, computer hardware and computer software cybersecurity scanning and penetration testing of networks including vessel control and communications systems to determine if there are information security vulnerabilities or if they are currently experiencing or have had network intrusions or breaches; Providing cybersecurity computer consulting services, namely, advice on hardening maritime control systems and networks, preventing loss of data and intrusion into networks, how to handle incident response in the nature of how to detect, react, restore from malicious cybersecurity activity and how to improve computer cybersecurity of hardware and software on networks and control systems in maritime vessels and offshore platforms;
CYBERSECURE Torchstone Global Suite 300 1997 Annapolis Exchange Pkwy. Annapolis MD 21401 CYBER SECURE;Cyber profile security consulting services, namely, providing identification and analysis of client information in the public domain, and the development of strategies to protect private information online;
CYBERSECURE NETIZEN CORPORATION 4905 Tilghman St., Suite 210 Allentown PA 18104 CYBER SECURE;Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; Providing a secure electronic online system featuring technology which allows users to scan, assess, audit, identify, track, manage and monitor compliance and security information collected from information technology devices, systems and software applications; Providing a secured-access, members only website featuring technology that gives members the ability to monitor, track and identify security and compliance issues for their information technology systems, networks, software and databases; Providing a website that features technology that enables the secure exchange of information by users; Updating of computer software relating to computer security and prevention of computer risks;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method and system for sending, receiving and managing the exchange of messages between an intranet and multiple external users using a secure server as an intermediary interface for Internet communications. In one form, the secure server operates in a replication mode with a Lotus Domino server wherein secure transmissions are designated by an @secure URL. In another form, secure transmissions are implemented by establishing a secure connection to the secure server using a browser addressing the server URL. The server operating system interfaces with the intranet so that the intranet user can use standard groupware, such as Lotus Notes, to create, send and receive secure documents. External users are notified by normal e-mail of the presence of secure documents at the server and must connect to the server in a secure mode to retrieve documents. Responses to documents are automatically returned to the sender's e-mail server using secure transmission.