CYBERSECURITY SERVICES NATURE

Brand Owner (click to sort) Address Description
AGENCY Agency Cyber, Inc. 401 Park Avenue, S. 10th Floor New York NY 10016 Cybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity; software as a services (SAAS) services featuring software for cybersecurity, in the nature of endpoint security, namely, securing and monitoring endpoint devices, desktop computers, laptops, mobile devices, internet of things (IoT) devices, and other computer network entry points, to identify, prevent, and protect against cyberattack, malware, viruses, breach, data theft, unauthorized access, exploitation, eavesdropping, phishing attacks, ransomware, or other malicious activities by hackers and malicious actors;
ARGUS Olatinpo, Oluwapelumi PO Box 4117 Gaithersburg MD 20885 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service using artificial intelligence to automate and create risk models for holistic, flexible simulation and risk assessment for networks, threat detection, prediction and response, and adaptive and learning-based computational tool for risk tracking, compliance checking, and asset protection and communicates security status through an interactive and real-time human-machine interface; Computer programming consultancy in the field of cybersecurity; Technology consultation in the field of cybersecurity;
BALKAN BalkanID, Inc. 9108 Simmons Road Austin TX 78759 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service (SAAS) services featuring software for intelligent identity, access, and entitlement governance; Software as a service (SAAS) services featuring software for organizational identity management using a combination of automation and risk-based decision support; Software as a service (SAAS) services featuring software for the identification, discovery, centralization, unification, management, optimization, integration, and security of users, actions, data, and files of SaaS applications; Software as a service (SAAS) services featuring software for monitoring, analyzing, auditing and reporting of users, actions, data, and files across SaaS applications; Software as a service (SAAS) services featuring software for automating information technology and security for SaaS applications; Software as a service (SAAS) services featuring software for security compliance monitoring, managing access rights and providing alerts and notifications for SaaS applications; Software as a service (SAAS) services featuring software for identifying and reporting security threats, automating remediation on breaches of security policies, enforcing security policies, and eliminating security vulnerabilities in SaaS applications;
BALKANID BalkanID, Inc. 9108 Simmons Road Austin TX 78759 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service (SAAS) services featuring software for intelligent identity, access, and entitlement governance; Software as a service (SAAS) services featuring software for organizational identity management using a combination of automation and risk-based decision support; Software as a service (SAAS) services featuring software for the identification, discovery, centralization, unification, management, optimization, integration, and security of users, actions, data, and files of SaaS applications; Software as a service (SAAS) services featuring software for monitoring, analyzing, auditing and reporting of users, actions, data, and files across SaaS applications; Software as a service (SAAS) services featuring software for automating information technology and security for SaaS applications; Software as a service (SAAS) services featuring software for security compliance monitoring, managing access rights and providing alerts and notifications for SaaS applications; Software as a service (SAAS) services featuring software for identifying and reporting security threats, automating remediation on breaches of security policies, enforcing security policies, and eliminating security vulnerabilities in SaaS applications; Software as a service (SAAS) services featuring software for restricting unauthorized access to computer systems and applications; Development of software for secure network operations;
BINARLY Binarly, Inc. 401 E California Blvd, APT 209 Pasadena CA 91106 Cybersecurity services in the nature of online non-downloadable software, firmware, and hardware cybersecurity assessments;
CANAURI WatchPoint Data, Inc. 415 12th Ave SE Cedar Rapids IA 52401 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
CEANO Ceano Health Ste. 555 30765 Pacific Coast Highway Malibu CA 90265 Cybersecurity services in the nature of restricting unauthorized access to computer systems and individuals online; computer services, namely, online reputation management and improvement services for others;
CLEAN.IO Clean.io, Inc. 3600 O'Donnell St #150 Baltimore MD 21224 Cybersecurity services in the nature of computer security, namely, restricting unauthorized and/or malicious code from executing prohibited functions in computer utility programs;
COVENANT SECURITY SOLUTIONS, INC. Covenant Security Solutions International, Inc. 30 N Gould St Ste 9449 Sheridan WY 82801 Cybersecurity services in the nature of restricting unauthorized access to computer systems; IT consulting services; Providing user authentication services using blockchain-based software technology for cryptocurrency transactions; Software development in the framework of software publishing;
CYBER DEFENSE MATRIX YU, Sounil 2310 Colts Brook Dr. Reston VA 20191 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
CYTAURUS BOYRAZYAN, GRIGOR GREGORY 840 APOLLO ST STE 100 EL SEGUNDO CA 90245 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service (SAAS) services featuring software for cybersecurity software deceptive software design to protect network from hackers. security of protection; Technology consultation in the field of cybersecurity;
CYTAURUS Cytaurus 6080 Center Dr 6Th Floor Los Angeles CA 90045 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service (SAAS) services featuring software for cybersecurity software deceptive software design to protect network from hackers. security of protection; Technology consultation in the field of cybersecurity;
CYVAULT Groupe Conseil PM SCADA INC. 249 St-Jacques, Suite #101 Montreal H2Y1M6 Canada Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer programming consultancy in the field of cybersecurity, internet security and data security; Computer security threat analysis for protecting data;
DARK SKY TECHNOLOGY Dark Sky Technology, Inc. 1400 W Oak St Fort Collins CO 80521 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity;
DEFEND YOUR DIGITAL ASSETS Gamma Defense 1001 Brickell Bay Drive Suite 2700 Miami FL 33131 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
DOT Impact Networking 13875 West Boulton Boulevard Lake Forest IL 60045 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security service, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer security consultancy; Technology consultation in the field of cybersecurity; Ethical hacking, namely, penetration testing and vulnerability scanning of computers and computer networks; Ethical hacking consultancy; Cybersecurity risk audit services;
EFIXPLORER Binarly, Inc. 401 E California Blvd, APT 209 Pasadena CA 91106 Cybersecurity services in the nature of downloadable software, firmware, and hardware cybersecurity assessments;EFI EXPLORER;
ENHALO CyberQ US 10290 Alliance Road Blue Ash OH 45242 Cybersecurity services in the nature of restricting unauthorized access to computer systems; consulting services in the field of cybersecurity; electronic monitoring of personally identifiable information on the dark web to detect industrial espionage and intellectual property theft;
EXIUM EXIUM INC. 820 Saddlebrook Dr Allen TX 75002 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;
FEARLESS IS A SCIENCE Cyber Convoy, Inc. 2 East Stemmer Lane Suffern NY 10901 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
FINCISO Lindberg, Randy S 523 Park Ridge Dr West Lafayette IN 47906 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
FWHUNT Binarly, Inc. 401 E California Blvd, APT 209 Pasadena CA 91106 Cybersecurity services in the nature of online non-downloadable software, firmware, and hardware cybersecurity assessments;
FYEO BTblock 2720 Xavier Street Denver CO 80212 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity; all of the aforementioned services not related to goods or services that filter and block advertisements, unwanted tracking codes, social media integration codes in software and within apps and electronic media;
GAMMA DEFENSE Gamma Defense 1001 Brickell Bay Drive Suite 2700 Miami FL 33131 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
GUARDIANCE Guardiance Inc. 25 SE 2nd Ave Ste 550 Miami FL 33131 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer programming consultancy in the field of cybersecurity; Technology consultation in the field of cybersecurity;
IMPACT SHIELD Impact Networking 13875 West Boulton Boulevard Lake Forest IL 60045 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security service, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer security consultancy; Technology consultation in the field of cybersecurity; Ethical hacking, namely, penetration testing and vulnerability scanning of computers and computer networks; Ethical hacking consultancy; Cybersecurity risk audit services;
LIVE FEARLESS Cyber Convoy, Inc. 2 East Stemmer Lane Suffern NY 10901 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
PASSKEY Peylei Technology, Inc. 1415 North Lilac Drive #140 Golden Valley MN 55422 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity;
PENSION CYBER SECURITY FRAMEWORK Linea Secure 4551 Glencoe Avenue, Suite 140 Marina del Rey CA 90292 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
PURCHASE HILL GROUP Thomas Kowalski 10 West 135th Street, Apt 12T New York NY 10037 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Information technology consulting services;
RAMZORT Ramzort Inc. 996 Maine Ave SW #210 Washington DC 20024 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
REVERSE BOUNTY SEW INC 4 Embarcadero Center Suite 1400 San Francisco CA 94111 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity;
RUN PANTHER Panther Labs, Inc. 461 2nd St., Unit 460T San Francisco CA 94107 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service (SAAS) services featuring software for identifying cybersecurity threats, computer network misconfigurations and suspicious activity in corporate and production environments;
SECURE * AUTHENTICATE * TRANSACT UNIKEN INC. 8268.002 466 Southern Blvd Chatham Township, Chatham Township NJ 07928 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
SECURESTRUX Securestrux 245 East King Street Lancaster PA 17602 Cybersecurity services in the nature of governance, risk and compliance, cybersecurity engineering, identity and access management, vulnerability scanning, security testing, managed security services, and security training;
SECURING THE APPLICATIONS THAT POWER THE ENTERPRISE AppOmni, Inc. 851 Cherry Ave #27-606 San Bruno CA 94066 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
SECURITY = TECHNOLOGY DONE RIGHT Siddiqui, Amna M 119 Castlebury Ct Coppell TX 75019 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Information technology consulting services; Application service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of healthcare, benefits programs, employee productivity, risk management; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Consulting in the field of information technology; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Franchising services, namely, planning and design of information technology systems for business franchises; Outsource service providers in the field of information technology; Planning, design and management of information technology systems; Providing a secure, web-based service enabling individuals to store and transmit information, including forensic tools, to assist law enforcement and search personnel should a child or dependent adult become a missing person; Providing a web site featuring technology that enables physicians to generate, manage and exchange medical information and documents regardless of medical organization or geographic location; Providing an interactive website featuring technology that allows users to enter, access, and synthesize information and generate reports for use in consulting with executives and businesses; Providing technology information updates for home security systems via the global computer network; Research services in the field of information and telecommunications technology;
SECURITY FOR YOU. Cardarelli, Anthony J 3840 Palmer Ct. Cincinnati OH 45245 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
SEE WHAT YOU'VE BEEN MISSING Cyber Sepio Systems Ltd. st3 156 Menachem Begin Rd. telaviv 6492108 Israel Cybersecurity services in the nature of protecting computing systems' critical infrastructure against threats from its supply chain;
SEPIO : Cyber Sepio Systems Ltd. st3 63 Rothschild Blvd. Tel Aviv Israel Cybersecurity services in the nature of protecting computing systems' critical infrastructure against threats from its supply chain;
STAIR - SEEK TRAIN ASSESS INCLUDE REWARD Waddell, Dan danwaddell@hotmail.com 5940 TAPESTRY DRIVE WOODBRIDGE VA 22193 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
TRUSTED BEHAVIOR REGISTRY Critical Start, Inc. 6100 Tennyson Parkway, Suite 200 Plano TX 75024 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
UNLOCKING DATA...ONE BYTE AT A TIME. Consulting Services Group Suite 310 205 Van Buren Street Herndon VA 20170 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology advisory services related to telecommunications, network infrastructure, cybersecurity, software development, systems engineering, and systems integration; Telecommunication network security consultancy; Telecommunications engineering consultancy; Computer network configuration services; Computer software development; Consulting in the field of telecommunications technology; Design and development of electronic data security systems; Design and development of on-line computer software systems; Design and development of wireless communication systems for transmission and reception of voice, data and video; Technology consultation in the field of cybersecurity;
US IT SECURITY Stark Innovations 7887 E Belleview Ave Ste 1100 Englewood CO 80111 Cybersecurity services in the nature of restricting unauthorized access to computer systems;
VDA VIGILANCE VDA Labs 5234 Plainfield Avenue, Suite C Grand Rapids MI 49525 Cybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity;
WE HELP YOU SECURE Johnson, Xavier DePaul 22732 Addison St. Southfield MI 48033 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Information technology consulting services; Computer programming consultancy in the field of Cybersecurity, Penetration Testing, Ethical Hacking, Consulting, IT Management, Vulnerability Assessments; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Outsource service provider in the field of information technology consulting; Planning, design and management of information technology systems; Technology consultation in the field of cybersecurity;
WIZNUCLEUS WizNucleus Inc. 200 Park Ave, Suite 1700 New York NY 10017 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service (SAAS) services featuring software for use by businesses for the purpose of cyber security, protection of technology assets, and compliance;
XCITIUM: THE POWER OF ZERO. XCITIUM INC. 200 BROADACRES DRIVE SECOND FLOOR BLOOMFIELD NJ 07003 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Platform as a service (PAAS) featuring computer software platforms for managing, monitoring and reporting security risks relating to information technology and computer networks; Platform as a service (PAAS) featuring computer software platforms for cybersecurity that integrate people, processes, and technology to predict, prevent, detect and respond to cybersecurity threats; Infrastructure as a service (IAAS) services, namely, hosting software for cybersecurity services for managing, monitoring and reporting security risks relating to information technology and computer networks, for use by others;
XCITIUM: ZERO DWELL TIME. XCITIUM INC. 200 BROADACRES DRIVE SECOND FLOOR BLOOMFIELD NJ 07003 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Platform as a service (PAAS) featuring computer software platforms for managing, monitoring and reporting security risks relating to information technology and computer networks; Platform as a service (PAAS) featuring computer software platforms for cybersecurity that integrate people, processes, and technology to predict, prevent, detect and respond to cybersecurity threats; Infrastructure as a service (IAAS) services, namely, hosting software for cybersecurity services for managing, monitoring and reporting security risks relating to information technology and computer networks, for use by others;
XCITIUM: ZERO DWELL TIME. ZERO TRUST. ZERO BREACHES. ZERO DOWNTIME. XCITIUM INC. 200 BROADACRES DRIVE SECOND FLOOR BLOOMFIELD NJ 07003 Cybersecurity services in the nature of restricting unauthorized access to computer systems; Platform as a service (PAAS) featuring computer software platforms for managing, monitoring and reporting security risks relating to information technology and computer networks; Platform as a service (PAAS) featuring computer software platforms for cybersecurity that integrate people, processes, and technology to predict, prevent, detect and respond to cybersecurity threats; Infrastructure as a service (IAAS) services, namely, hosting software for cybersecurity services for managing, monitoring and reporting security risks relating to information technology and computer networks, for use by others;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Application services gateways that execute electronic application programs/services allows the application programs/services to be managed and administered out of a network rather than locally. The application services gateways are elements in a services delivery system that execute application programs/services that control or otherwise interact with systems and devices of a home or business such as a heating and cooling system or a security system. The application services gateways have a LAN connection to a communication gateway that in turn communicates over a WAN to a remote services gateway. The remote services gateway channels data from a remote service platform to provide application programs/services and management services over the WAN to the communications gateway where it is then channeled to the application services gateways. The installation and management of the application programs/services residing and/or being executed at the local site on the application services gateways relieves the consumer of such responsibilities.