FindOwnerSearch
Brands and Their Owners
Brand | Owner (click to sort) | Address | Description |
---|---|---|---|
QOSTODIAN PRIME | Qohash Inc. | 394 rue de Sainte-Hélène Québec, QC G1K3L7 Canada | Downloadable security software for use in database management for quantifying organizational risk; downloadable software for maintaining data security; downloadable software for conducting tamper-proof digital logs, digital audit trails and forensic analysis of data; downloadable software for detecting unauthorized access and data breach; downloadable software to store, retrieve and detect data from computers and computer hardware; downloadable software for management, protection and monitoring of personal, health, corporate and financial data; downloadable software for eliminating duplicated personal, health, corporate and financial data;Software as a service (SaaS) services featuring security software for use in database management for quantifying organizational risk; Software as a service (SaaS) services featuring software for maintaining data security; Software as a service (SaaS) services featuring software for conducting tamper-proof digital logs, digital audit trails and forensic analysis of data; Software as a service (SaaS) services featuring software for detecting unauthorized access and data breach; Software as a service (SaaS) services featuring software to store, retrieve and detect data from computers and computer hardware; Software as a service (SaaS) services featuring software for management, protection and monitoring of personal, health, corporate and financial data; Software as a service (SaaS) services featuring software for eliminating duplicated personal, health, corporate and financial data; |
QOSTODIAN RECON | Qohash Inc. | 394 rue de Sainte-Hélène Québec, QC G1K3L7 Canada | Downloadable security software for use in database management of customer personal, health, corporate and financial data; downloadable software for maintaining data security; downloadable software for conducting tamper-proof digital logs, digital audit trails and forensic analysis of data; downloadable software for detecting unauthorized access and data breach; downloadable software to store, retrieve and detect data from computers and computer hardware; downloadable software for management, protection and monitoring of personal, health, corporate and financial data; downloadable software for eliminating duplicated personal, health, corporate and financial data;Software as a service (SaaS) services featuring security software for use in database management of customer personal, health, corporate and financial data; Software as a service (SaaS) services featuring software for maintaining data security; Software as a service (SaaS) services featuring software for conducting tamper-proof digital logs, digital audit trails and forensic analysis of data; Software as a service (SaaS) services featuring software for detecting unauthorized access and data breach; Software as a service (SaaS) services featuring software to store, retrieve and detect data from computers and computer hardware; Software as a service (SaaS) services featuring software for management, protection and monitoring of personal, health, corporate and financial data; Software as a service (SaaS) services featuring software for eliminating duplicated personal, health, corporate and financial data; |
RUNTIME ENCRYPTION | Fortanix, Inc. | 444 Castro Street #702 Mountain View CA 94041 | downloadable security software for use in applications, which uses cryptography to prevent infrastructure compromises;ENCRYPTION; |
SMART SENTINEL | Cyber Defence QCD Corporation | #308 - 1505 Laperriere Avenue Ottawa, Ontario K1Z7T1 Canada | downloadable security software for use to detect anomalous activity such as cyber attacks on end point devices;SMART;providing online and/or web-based non-downloadable security software for use to detect cyber attacks on the network, specifically end point devices; Monitoring of end point devices, specifically the detection and response of anomalous activity on end point devices; computer security threat analysis for protecting data; computer security consultancy; |
Where the owner name is not linked, that owner no longer owns the brand |