CYBERSECURITY SERVICES

Brand Owner (click to sort) Address Description
AVINT Avint 40868 Tulip Poplar Place Aldie VA 20105 Cybersecurity services, namely, computer security threat analysis for protecting data, and investigating the source of the computer security threat; Computer cybersecurity engineering services; Cybersecurity compliance solutions in the nature of establishing risk-based controls to categorize and protect information from vulnerabilities and unauthorized access; Cybersecurity strategy services in the nature of establishing risk-based controls to categorize and protect information from vulnerabilities and unauthorized access;
BINARY ARMOR Sierra Nevada Corporation 444 Salomon Circle Sparks NV 89434 Cybersecurity services, in the nature of restricting unauthorized access to computer systems, namely, network security, network analytics, secure taping, threat detection and identification, network intrusion detection and identification virtual network security, software defined network security, encryption, deep packet inspection and data message processing, packet validation, packet conformance, packet redaction and packet blockage, in the fields of industrial control systems (ICS), supervisory control and data acquisition (SCADA), cross domain solutions (CDS), aviation, ships, virtual networking, rail, transportation and autonomous vehicles, manufacturing, oil and gas, utilities, smart metering, data transfers, machine to machine communications, building automation, communications and the internet of things (IoT); technical support services, Technical support services, namely, troubleshooting of computer software problems in the nature of remote and on-site integration and management services and solutions for monitoring, protecting, administration of SCADA, communication, data, and platform specific networks; technical consulting in the field of cybersecurity for utilities, oil and gas, industrial controls, SCADA, networking, national defense, computer system analysis, technical advisory services relating to computer programs, support, namely, monitoring and protecting industrial process control of plants and equipment in the utilities, oil and gas industries, and computer security, namely, by providing integration support, design and system architecture services in the fields of utilities, oil and gas, industrial controls, SCADA, networking, national defense and integrated solutions, namely, integration of cybersecurity systems and networks, controls, sensors, cameras, internet protocol based monitoring devices, industrial processes;
DELIVERING THE DIGITAL FUTURE M9 Solutions 3033 Wilson Blvd #480 Arlington VA 22201 Cybersecurity services, namely, restricting unauthorized access to computer systems; cybersecurity services for the public sector, namely, restricting unauthorized access to computer systems; information technology consulting services; software development services; cloud computing services, namely, consulting services in the field of cloud computing, cloud hosting provider services, cloud application development in the nature of computer software development, cloud migration planning and implementation support in the nature of data migration services, integration of public cloud computing environments in the nature of managing software and websites of others in the field of cloud computing; cloud computing, namely, system architecture, planning, design and infrastructure support in the nature of computer software design and troubleshooting of computer software problems in the field of cloud computing; cloud computing services for the public sector, namely, cloud hosting provider services; cloud computing software updating and maintenance; cloud computing featuring software for database management, data delivery and analytics; data warehousing; electronic data services;
DON'T LET BEDLAM HIT YOUR BANK ACCOUNT Block Line Systems Suite 110 5555 Airport Highway Toledo OH 43615 cybersecurity services;
FEROOT Feroot Security Inc. 325 Front St W., 4th Floor Toronto, Ontario M5V2Y1 Canada cybersecurity services; development and commercialization of cybersecurity software; technical consulting services in the field of cybersecurity; computer program security monitoring services; software security monitoring services; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; data protection services, namely, front-end security threat analysis, detection, response, and prevention; security automation services; cybersecurity software for client-side web applications and websites; software for analyzing and determining web application and website vulnerability and security; software for automating and managing content security policies deployed on web applications and websites;
FOCUS TAG NormShield, Inc. 800 Boylston St., Suite 2905 Boston MA 02199 Cybersecurity services, namely, flexible identification and labeling of important events, vulnerabilities, and related data points to direct users' attention to potential problems and possible remedies; testing, scanning and assessing of computer networks and systems to create graphical representations and textual analysis of information concerning critical security considerations;
HUNT THE HUNTER REDPOINT CYBERSECURITY 1375 Broadway New York NY 10018 Cybersecurity services, namely, restricting unauthorized access to computer systems; threat mitigation services, particularly, proactively searching data for cybersecurity threats, including preemptively identifying vulnerabilities and security weaknesses; identifying cybersecurity threats in an early stage of infection and removing the infection; and minimizing the ability of a cybersecurity threat to gain a foothold in an environment and removing the threat from the environment;
INELLIHAWQ Q6 Intelligence 6100 Hollywood Blvd., Suite 210 Hollywood FL 33024 Cybersecurity services, namely, penetration testing of computer and networks to assess information security vulnerability, incident response in the nature of testing information systems to determine vulnerability or breach, risk assessment in the nature of testing of information systems to determine vulnerability, design of security programs for information systems, digital computer and mobile device forensic services, cybersecurity due diligence in the nature of testing of information systems to determine vulnerability, third-party audit in the nature of testing of information systems to determine vulnerability; computer and electronic data services, namely, providing cyber threat data intelligence collection and analysis services and solutions therefor; computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities;
KNOW MORE. SECURE MORE. Vigilant Suite 220 9378 S. Mason Montgomery Rd. Mason OH 45040 Cybersecurity Services, Network Security Monitoring Services, Incident Response Services, Malware Analysis Services, products and threat intelligence designed to detect and defend against Network Security intrusions and investigate existing intrusions;
QUANTUM FORT Castelion 5911 Royal Point Court Kingwood TX 77345 Cybersecurity services, namely, technology consultation in the field of cybersecurity; Computer security consultancy; Computer services, namely, remote management of the information technology (IT) systems of others; Planning, design and management of information technology systems;
QWIRES QINTEL 322 North Shore Drive, Ste 300 Pittsburgh PA 15212 Cybersecurity services, namely, providing curated cybersecurity and cyberthreat data for others;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Application services gateways that execute electronic application programs/services allows the application programs/services to be managed and administered out of a network rather than locally. The application services gateways are elements in a services delivery system that execute application programs/services that control or otherwise interact with systems and devices of a home or business such as a heating and cooling system or a security system. The application services gateways have a LAN connection to a communication gateway that in turn communicates over a WAN to a remote services gateway. The remote services gateway channels data from a remote service platform to provide application programs/services and management services over the WAN to the communications gateway where it is then channeled to the application services gateways. The installation and management of the application programs/services residing and/or being executed at the local site on the application services gateways relieves the consumer of such responsibilities.