Brands and Their Owners
Brand | Owner (click to sort) | Address | Description |
---|---|---|---|
AVA | Ava Security Limited | Upper Ground Floor, The Charter Building Charter Place, Uxbridge Middlesex UB81JG United Kingdom | Cyber security software; cyber security software for network and device exfiltration prevention; cyber security software with artificial intelligence; cyber security software with machine learning; video surveillance cameras; software for management of video surveillance cameras; analytics software for video streams including facial recognition, artificial intelligence and machine learning; downloadable cloud computing software for video surveillance; video surveillance systems; electric and electronic video surveillance installations; electronic surveillance apparatus; security surveillance apparatus; network surveillance cameras; security surveillance robots; target surveillance apparatus; target surveillance apparatus; target surveillance apparatus; network monitoring cameras for surveillance; network monitoring cameras, namely, for surveillance; security software; security cameras; security alarms; security warning apparatus; security control apparatus; downloadable computer security software; security alarm systems; software to control building environmental, access and security systems; computer software for the remote control of security apparatus; closed circuit television systems (CCTV); closed circuit television cameras; facial recognition apparatus; facial recognition software; artificial intelligence apparatus; operating software; cloud computing software; downloadable cloud computing software; application software for cloud computing software; video recorders; electrical and electronic apparatus and instruments, all for detection, alarm, security and surveillance purposes, monitoring and checking (control) apparatus and instruments; closed circuit television monitoring systems; monitoring installations and apparatus; video scanning apparatus; data storage media; data storage devices; data storage apparatus; parts and fittings for all the aforesaid goods; for all of the aforesaid goods in the field of security;Physical storage of electronically stored digital video files; physical storage of electronically stored data, documents, digital photographs, music, images, video, and computer games;Installation of security and safety equipment; maintenance and servicing of security alarms; advisory services relating to the installation of security and safety equipment; installation of security systems, apparatus and devices;Forensic analysis of surveillance video for fraud and theft prevention purposes; surveillance services; closed-circuit surveillance; providing reconnaissance and surveillance services; rental of security surveillance apparatus; rental of security surveillance equipment; security services; security consultancy; security services for buildings and premises; rental of security and surveillance apparatus; rental of closed circuit television monitoring apparatus; monitoring of alarms, security and surveillance systems; security and surveillance services;Consultancy in the field of security software; computer and technology services for securing computer data and personal and financial information and for the detection of unauthorized access to data and information; computer and internet security consultancy and data encryption services; monitoring of computer systems for security services; providing information for computer and internet security; providing software applications in security; cloud computing service for video surveillance; computerised data storage for video streams; computerised data storage services for video streams; internet security consultancy; computer security consultancy; programming of internet security programs; rental of internet security programs; IT security, protection and restoration; electronic storage of videos; electronic storage of digital video files; hosting a website for the electronic storage of digital photographs and videos; cloud computing services; cloud hosting provider services; hosting multimedia content; hosting of websites; computerised data storage; online data storage; electronic data storage; electronic storage of data; electronic data storage services; computerised data storage services; |
AWARE CLOUD | Ava Security Limited | Upper Ground Floor, The Charter Building Charter Place, Uxbridge Middlesex UB81JG United Kingdom | Cyber security software; cyber security software for network and device exfiltration prevention; cyber security software with artificial intelligence; cyber security software with machine learning; software for management of video surveillance cameras; analytics software for video streams including facial recognition, artificial intelligence and machine learning; downloadable cloud computing software for video surveillance; video surveillance cameras; video surveillance systems; electric and electronic video surveillance installations; electronic surveillance apparatus; security surveillance apparatus; network surveillance cameras; security surveillance robots; target surveillance apparatus; target surveillance apparatus; target surveillance apparatus; network monitoring cameras for surveillance; network monitoring cameras, namely, for surveillance; security software; security cameras; security alarms; security warning apparatus; security control apparatus; downloadable computer security software; security alarm systems; software to control building environmental, access and security systems; computer software for the remote control of security apparatus; closed circuit television systems (CCTV); closed circuit television cameras; facial recognition apparatus; facial recognition software; artificial intelligence apparatus; operating software; cloud computing software; downloadable cloud computing software; application software for cloud computing software; video recorders; electrical and electronic apparatus and instruments, all for detection, alarm, security and surveillance purposes, monitoring and checking (control) apparatus and instruments; closed circuit television monitoring systems; monitoring installations and apparatus; video scanning apparatus; data storage media; data storage devices; data storage apparatus; computer software to enable the searching of videos; parts and fittings for all the aforesaid goods;Physical storage of electronically stored digital video files; physical storage of electronically stored data, documents, digital photographs, music, images, video, and computer games;Installation of security and safety equipment; maintenance and servicing of security alarms; advisory services relating to the installation of security and safety equipment; installation of security systems, apparatus and devices;Forensic analysis of surveillance video for fraud and theft prevention purposes; surveillance services; closed-circuit surveillance; providing reconnaissance and surveillance services; rental of security surveillance apparatus; rental of security surveillance equipment; security services; security consultancy; security services for buildings and premises; rental of security and surveillance apparatus; rental of closed circuit television monitoring apparatus; monitoring of alarms, security and surveillance systems; security and surveillance services;Consultancy in the field of security software; computer and technology services for securing computer data and personal and financial information and for the detection of unauthorized access to data and information; computer and internet security consultancy and data encryption services; monitoring of computer systems for security services; providing information for computer and internet security; computer security consultancy; programming of internet security programs; rental of internet security programs; internet security consultancy; providing software applications in security; cloud computing service for video surveillance; computerised data storage for video streams; computerised data storage services for video streams; rental of security programs; electronic storage of videos; electronic storage of digital video files; hosting a website for the electronic storage of digital photographs and videos; cloud computing services; cloud hosting provider services; hosting multimedia content; hosting of websites; computerised data storage; online data storage; electronic data storage; electronic storage of data; electronic data storage services; computerised data storage services; software as a service; software as a service featuring software for machine learning; providing artificial intelligence computer programs on data networks; provision of security services for computer networks; |
FULL STACK SECURITY | SOPHOS SECURITY TECHNOLOGY LIMITED | 2 GRAND CANAL SQUARE 6TH FLOOR DUBLIN Ireland | Cyber security software; computer software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber risks, threats, events, intrusions, breaches and attacks; computer software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; computer software for ensuring the security of computer software, computer hardware, and computer networks; computer software for ensuring the security of IT systems and infrastructure; computer software for ensuring the security of servers; computer software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; computer software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; computer software to assist and instruct user in understanding, managing, and mitigating cyber security risks, threats, events, intrusions, breaches and attacks; computer software for monitoring computer software, computer hardware, and computer network security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; computer software for monitoring IT systems and infrastructure to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks;SECURITY;Software as a service (SAAS) featuring cyber security software; software as a service (SAAS) featuring software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of IT systems and infrastructures; software as a service (SAAS) featuring software for server security; software as a service (SAAS) featuring software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; software as a service (SAAS) featuring software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; software as a service (SAAS) featuring software to assist and instruct user in understanding, managing, and mitigating cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for monitoring computer software, computer hardware, and computer network security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; software as a service (SAAS) featuring software for monitoring IT system and infrastructure security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; technology consultation in the field of cyber security, computer software security, computer hardware security, computer network security, and IT systems and infrastructure security; cyber risks and security consultancy services; |
FULL STACK SECURITY | Barricade Security Systems Limited | Unit C/D, Building 2100 Cork Airport Business Park Cork Ireland | Cyber security software; computer software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber risks, threats, events, intrusions, breaches and attacks; computer software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; computer software for ensuring the security of computer software, computer hardware, and computer networks; computer software for ensuring the security of IT systems and infrastructure; computer software for ensuring the security of servers; computer software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; computer software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; computer software to assist and instruct user in understanding, managing, and mitigating cyber security risks, threats, events, intrusions, breaches and attacks; computer software for monitoring computer software, computer hardware, and computer network security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; computer software for monitoring IT systems and infrastructure to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks;SECURITY;Software as a service (SAAS) featuring cyber security software; software as a service (SAAS) featuring software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of IT systems and infrastructures; software as a service (SAAS) featuring software for server security; software as a service (SAAS) featuring software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; software as a service (SAAS) featuring software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; software as a service (SAAS) featuring software to assist and instruct user in understanding, managing, and mitigating cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for monitoring computer software, computer hardware, and computer network security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; software as a service (SAAS) featuring software for monitoring IT system and infrastructure security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; technology consultation in the field of cyber security, computer software security, computer hardware security, computer network security, and IT systems and infrastructure security; cyber risks and security consultancy services; |
Where the owner name is not linked, that owner no longer owns the brand |