Brands and Their Owners
Brand | Owner (click to sort) | Address | Description |
---|---|---|---|
CHECKPHISH | Bolster AI, Inc. | 4966 El Camino Real, Ste #101 Los Altos CA 94022 | Downloadable computer software for detecting, monitoring, and preventing network security risks and privacy risks; Downloadable computer software for network security; Downloadable computer software using artificial intelligence for network security; Downloadable computer software using artificial intelligence for detecting, monitoring, and preventing network security risks and privacy risks;CHECK FISH;Computer security services, namely, restricting unauthorized network access by monitoring and reporting on cyber-threats for others; Computer security services, namely, restricting unauthorized access to users without credentials; Computer security threat analysis for protecting data; Providing temporary use of on-line non-downloadable software for use in the detection and prevention of online fraud and for credit card fraud detection; Software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; Software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; |
CYBER FRAUD NETWORK | FiVerity, Inc. | 3 Allied Dr., Suite #303 Dedham MA 02026 | Downloadable computer software for detecting financial crimes and fraud;Software as a service (SAAS) services featuring software for sharing intelligence related to detecting financial crimes and fraud; |
DAD'S NEXT-GEN FIREWALL | Wright Network Solutions | 444 W Scott Ave. Gilbert AZ 85233 | Downloadable computer software for detecting and preventing computer system intrusions and malware, controlling and managing computer system user access, and for managing enforcement of computer system policies; Downloadable computer software for monitoring, analyzing or reporting of computer system information, data and traffic; Downloadable computer software for encryption, protecting computer system user privacy, and local caching of remote data; Downloadable computer software for optimizing computer system resources and availability; Computer hardware;NEXT-GEN FIREWALL; |
DART | THE EOSYS GROUP, INC. | 140 WEAKLEY LANE SMYRNA TN 371672026 | Downloadable computer software for detecting, capturing and classifying visible quality defects on finished automotive parts and consumer products; downloadable software for use as an analytical tool to identify the root causes of defects so that they can be minimized or eliminated entirely without the need for post-production repairs;Providing on-line non-downloadable computer software for detecting, capturing and classifying visible quality defects on finished automotive parts and consumer products; providing on-line non-downloadable software for use as an analytical tool to identify the root causes of defects so that they can be minimized or eliminated entirely without the need for post-production repairs; |
DECODE THE POSSIBILITIES | Firefly BioWorks, Inc. | Building 1400W, 3rd Floor 1 Kendall Square Cambridge MA 02139 | downloadable computer software for detecting, identifying, reading, decoding and analyzing cells, molecules or encoded particles, and for processing, managing, displaying, and creating reports of generated data; downloadable computer software for scientific, laboratory, clinical or medical analysis of cells, molecules or encoded particles;medical diagnostic reagents and assays; encoded particles for multi-plexed detection of proteins and nucleic acids for medical or clinical use; diagnostic kits consisting primarily of reagents, particles, vials and buffers for medical or clinical use; assays for monitoring, detecting, and quantifying biological molecules for medical or clinical use; diagnostic kits consisting primarily of reagents, particles, vials and buffers for monitoring, detecting, and quantifying biological molecules for medical or clinical use;reagents and assays for scientific or research purposes; encoded particles for multi-plexed detection of proteins and nucleic acids for scientific or research use; diagnostic kits consisting primarily of reagents, particles, vials and buffers for scientific or research use; assays for monitoring, detecting, and quantifying biological molecules for scientific or research use; diagnostic kits consisting primarily of reagents, particles, vials and buffers for monitoring, detecting, and quantifying biological molecules for scientific or research use;custom design and development of reagents and assays; custom design and development of encoded particles; custom design and development of assays for monitoring, detecting, and quantifying biological molecules; |
|
|||
DEFENDER | Guardiar Europe BVBA | Blokkestraat 34/B Zwevegem 8550 Belgium | Downloadable computer software for detecting cyber security threats in electronic apparatus, instruments and systems used as security and access control for physical premises; |
EARLY CHANGES EVERYTHING | Marcus Autism Center, Inc. | 1920 Briarcliff Rd NE Atlanta GA 30329 | Downloadable computer software for detecting developmental disorders; downloadable computer software for detecting developmental disorders in children; downloadable computer software for detecting autism spectrum disorder; downloadable software for assessment, screening, monitoring, or diagnosis of developmental or cognitive conditions; downloadable computer software for collection and analysis of eye-tracking data and blink data from test subjects; downloadable computer software for displaying stimuli to users and collecting eye-movement data, blink data, and other data in response thereto; scientific apparatuses, namely, apparatuses for displaying stimuli to users and collecting eye-movement data, blink data, and other data in response thereto, not for medical use; scientific apparatuses and downloadable computer software for measuring the engagement of users with respect to an audiovisual stimulus;Charitable fundraising services; charitable fundraising services for hospital operations; charitable fundraising to provide benefit care for patients of hospitals; charitable fundraising to provide benefit care for individuals with autism spectrum disorder and other developmental disorders;Promoting public awareness of child and family health, wellness, and nutritional issues; promoting public awareness of the need to improve the quality of life for children; promoting public awareness of developmental disorders; promoting public awareness of autism spectrum disorder;Healthcare services; pediatric healthcare services; providing information relating to child and family health, wellness, and nutritional issues via the internet; providing an internet website featuring news and information relating to diagnosis and treatment of developmental disorders; medical testing for diagnostic or treatment purposes in the field of developmental disorders; providing information in the field of developmental disorders; medical diagnosis of developmental disorders; medical services in the nature of detecting developmental disorders; detecting developmental disorders in children; detecting autism spectrum disorder; medical services in the nature of detecting autism spectrum disorder in children; medical services in the nature of assessing, screening, monitoring, or diagnosing developmental or cognitive conditions; medical services in the nature of collecting and analyzing eye-tracking data and blink data for detection of developmental disorders;Medical devices for detecting developmental disorders; medical devices for detecting developmental disorders in children; medical devices for detecting autism spectrum disorder; medical devices for assessment, screening, monitoring, or diagnosis of developmental or cognitive conditions; medical devices for collection and analysis of eye-tracking data and blink data from test subjects; medical eye-tracking and blink-detection devices for detecting autism spectrum disorder in children; medical developmental-disorder-detection devices for collecting eye-tracking data and blink data from test subjects;Medical research services; medical research services relating to developmental disorders; providing online non-downloadable software for detecting developmental disorders; software as a service (SaaS) services featuring software for detecting developmental disorders in children; providing online non-downloadable software for detecting autism spectrum disorder; providing online non-downloadable software for assessment, screening, monitoring, or diagnosis of developmental or cognitive conditions; providing online non-downloadable software for collection and analysis of eye-tracking data and blink data; providing online non-downloadable software for displaying stimuli to users and collecting eye-movement data, blink data, and other data in response thereto; software as a service (SaaS) services featuring software for measuring the engagement of users with respect to an audiovisual stimulus; |
EDETECTIVE | Compliance in the Cloud Corporation | 3423 Tourmaline Trail Round Rock TX 78681 | Downloadable computer software for detecting presence of personally identifiable information within unstructured data; |
FIREFLY BIOWORKS | ABCAM PLC | DISCOVERY DRIVE, CAMBRIDGE BIOMEDICAL CAMPUS CAMBRIDGE CB2 0AX | downloadable computer software for detecting, identifying, reading, decoding and analyzing cells, molecules or encoded particles, and for processing, managing, displaying, and creating reports of generated data; downloadable computer software for scientific, laboratory, clinical or medical analysis of cells, molecules or encoded particles;FIREFLY BIO WORKS;reagents and assays for scientific or research purposes; encoded particles for multi-plexed detection of proteins and nucleic acids for scientific or research use; diagnostic kits consisting primarily of reagents, particles, vials and buffers for scientific or research use; assays for monitoring, detecting, and quantifying biological molecules for scientific or research use; diagnostic kits consisting primarily of reagents, particles, vials and buffers for monitoring, detecting, and quantifying biological molecules for scientific or research use;custom design and development of reagents and assays; custom design and development of encoded particles; custom design and development of assays for monitoring, detecting, and quantifying biological molecules; |
INFOTRACE | Soliton Systems Kabushiki Kaisha | 2-4-3 Shinjuku, Shinjuku-ku Tokyo 160-0022 Japan | Downloadable computer software for detecting and blocking malware, computer security threat detection and investigations, and isolating servers or endpoints from networks, in the field of cybersecurity;INFO TRACE;Providing a website featuring non-downloadable software for use in database management, detecting and blocking malware, computer security threat detection and investigations, and isolating servers or endpoints from networks in the field of cybersecurity; cloud computing featuring software for use in database management, detecting and blocking malware, computer security threat detection and investigation, and isolating servers or endpoints from networks in the field of cybersecurity; monitoring telecommunication network system by remote access to ensure proper functioning; off-site data backup; data migration services; recovery of computer data; data conversion of electronic information; computer security consultancy; |
LIGHT INSPECTOR | METIS Systems S.r.l. | Via del Fontanile Arenato, 295 I-00163 Rome Italy | Downloadable computer software for detecting embossing from the surfaces of inanimate objects and works of art and estimating three-dimensional elevation data; Downloadable computer software for using computer graphics applied to data scanned from inanimate objects and works of art; Downloadable computer software for the manipulation of images and three-dimensional data of inanimate objects and works of art; Downloadable computer software for image manipulation of scanned surfaces data of inanimate objects and works of art through different lighting schemes; Downloadable computer software for data and image processing to create models and reproductions of three-dimensional surfaces of inanimate objects and works of art; Downloadable computer software for processing single or multiple scans of images related to one or more surfaces of inanimate objects and works of art;LIGHT; |
LOG360 | ZOHO CORPORATION | 4141, Hacienda Drive Pleasanton CA 94588 | Downloadable computer software for detecting threats and mitigating attacks with its threat intelligence, user and entity behaviour analytics (UEBA), file integrity monitoring, network device auditing and user activity monitoring;LOG THREE HUNDRED SIXTY; LOG THREE SIX ZERO;Providing temporary use of on-line non-downloadable software for detecting threats and mitigating attacks with its threat intelligence, user and entity behaviour analytics (UEBA), file integrity monitoring, network device auditing and user activity monitoring; |
LUX | ZOOX, INC. | 1149 Chess Drive Foster City CA 94404 | Downloadable Computer software for detecting vehicle location; Downloadable Computer software for detecting vehicle location in relation to surrounding objects; Downloadable Computer software for detecting surrounding objects in relation to a moving vehicle; Downloadable Computer software for safety and incident detection; Downloadable Computer software for emergency assistance; Downloadable Computer software that enables a vehicle to communicate with persons and objects in the vicinity of the vehicle; Downloadable Computer software that monitors and analyzes data to detect objects in an area surrounding a vehicle; Downloadable Computer software for accessing GPS and motion sensor data for safety and emergency response purposes; Downloadable Emergency notification system software; Downloadable Emergency notification system software for providing alerts, push-notifications, and other remote notifications to users; Downloadable Emergency notification system software for accessing a communication network and allowing audio and data communication between users and emergency and support responders; Downloadable Notification system software for alerting persons, animals, and other objects in the vicinity of the presence of a vehicle; Downloadable Notification system software that produces lighting signals and lighting messages; warning lights systems for motor vehicles for pedestrian safety, namely, systems that incorporate bar lights; Emergency warning lights systems, namely, systems that incorporate flashing lights; Vehicle warning lighting systems, namely, systems that incorporate flashing and steady warning lights for vehicles; |
PATCHSTACK | Webarx OÜ | Akadeemia tn 1 Pärnu 80011 Estonia | Downloadable computer software for detecting and protecting computer networks and software applications from hacking attacks; downloadable computer software that controls input and output to computer files by tracking log in access; downloadable computer software for searching, assessing and fixing weaknesses and vulnerabilities in the software code, open software code and configuration of computer systems and software applications, computer networks and computer applications; downloadable computer software for monitoring user behaviors on computer network system for malicious activities; downloadable computer software for storing, managing and analyzing log files from servers, network devices and software applications; downloadable computer software for detecting and preventing threats of hacking of information systems, computer networks and software applications; downloadable computer software for managing, analyzing, and monitoring information technology (IT) infrastructure and security; downloadable computer software for managing, analyzing, and monitoring computer-based information systems and networks; computer hardware, namely, firewalls and networks security devices; downloadable computer software for computer network security; downloadable anti-piracy software; downloadable anti-spyware software; downloadable computer software for the creation of firewalls; Downloadable mobile applications for detecting and protecting computer networks and software applications from hacking attacks; Downloadable mobile application that controls input and output to computer files by tracking log in access; Downloadable mobile applications for searching, assessing and fixing weaknesses and vulnerabilities in the software code, open software code and configuration of computer systems, software applications, computer networks and computer applications; Downloadable mobile applications for monitoring user behaviors on computer network system for malicious activities; Downloadable mobile applications for storing, managing and analyzing log files from servers, network devices and software applications; Downloadable mobile applications for detecting and preventing threats of hacking of information systems, computer networks and software applications; Downloadable mobile applications for managing, analyzing, and monitoring information technology (IT) infrastructure and security; Downloadable mobile applications for managing, analyzing, and monitoring computer-based information systems and networks; Downloadable mobile applications for computer network security; Downloadable mobile applications for the creation of firewalls; computer apparatus, instruments and tools for cyber security and software development;PATCH STACK;Compilation of information into computer databases; Systemization of information into computer databases; Updating and maintenance of data in computer databases; Management and compilation of computerised databases; Collection and compilation of information into computer databases in the field of computer and network security; Conducting incentive award programs for technology professionals to compete for financial payouts to promote the responsible hacking and disclosure of security holes and vulnerabilities in computer software, Internet protocols, and network architecture; conducting incentive award programs for technology professionals to compete for financial payouts to promote the research in the field of Internet security and the development of technology, tools, and techniques in the field of computer and Internet security to identify and address security holes and vulnerabilities in computer software, Internet protocols, and network architecture;Software as a service (SAAS) services featuring software for computer and network security; Software as a service (SAAS) services featuring computer and network security software, specifically, software for simulating computer, network, and premises security threats, data breaches, and other network and computer attacks, for the purpose of assessing security maturity and incident readiness; Software as a service (SAAS) services featuring computer and network security software, specifically, software for providing threat and vulnerability analysis, security posture and risk analysis and assessment, social engineering and security readiness training, security maturity and incident readiness training, risk triage and response training, perimeter enumeration and discovery services, data breach analysis and forensic incident response and remediation services, and scanning and penetration testing of computers and networks to assess information security vulnerability; Software as a service (SAAS) services featuring computer and network security software, specifically, software for managing, analyzing, and monitoring information technology (IT) infrastructure and security and fixing vulnerabilities; Software as a service (SAAS) featuring software for use in the detection, monitoring, and removal of viruses, worms, spyware, adware, malware, spam and phishing activity, vulnerabilities and unauthorized data and computer programs on third party web sites; Software as a service featuring software for use in searching, assessing and fixing weaknesses and vulnerabilities in the software code, open software code and configuration of computer systems and software applications, computer networks and computer applications; Platform as a service (PAAS) featuring computer software platforms for managing, analyzing, and monitoring information technology (IT) infrastructure and security and fixing vulnerabilities; Platform as a service (PAAS) featuring computer software platforms for simulating computer, network, and premises security threats, data breaches, and other network and computer attacks, for the purpose of assessing security maturity and incident readiness; Platform as a service (PAAS) featuring computer software platforms for providing threat and vulnerability analysis, security posture and risk analysis and assessment, social engineering and security readiness training, security maturity and incident readiness training, risk triage and response training, perimeter enumeration and discovery services, data breach analysis and forensic incident response and remediation services, and scanning and penetration testing of computers and networks to assess information security vulnerability; Platform as a service (PAAS) featuring computer software platforms for the detection, monitoring, and removal of viruses, worms, spyware, adware, malware, spam and phishing activity, vulnerabilities and unauthorized data and computer programs on third party web sites; Platform as a service featuring computer software platforms for the for searching, assessing and fixing weaknesses and vulnerabilities in the software code, open software code and configuration of computer systems and software applications, computer networks and computer applications; Creating and designing website based indexes of information for others using information technology; Computer security consultancy; Computer security consultancy in the field of detecting and preventing threats of hacking of information systems, computer networks and software applications; On-line information and advisory services relating to computer security software and hardware products; Computer systems analysis; computer security consultation services to assist companies in the creation and management of vulnerability disclosure processes and collaboration with independent security researchers; computer system analysis, namely, data analysis for the purpose of generating and transmitting reports on and ratings of the level of security of third party software residing on the computers of others; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems for detecting unauthorized access or data breach; Computer security services in the nature of testing for and identifying vulnerabilities in programming code; |
PROMISCAN | AZBIL CORPORATION | 19F Tokyo Building, 2-7-3 Marunouchi Chiyoda-ku, Tokyo 100-6419 Japan | Downloadable computer software for detecting network sniffing on packets sent via a computer network; downloadable computer software for centralized monitoring of networks and detecting network node sniffing; downloadable computer software for scanning, detecting, and logging network interface changes caused by computers and network users employing malicious and promiscuous applications;PROMINENT SCAN; |
PROTECTION THAT EMPOWERS | Spirion | 200 Central Ave., Suite 1900 St. Petersburg FL 33701 | Downloadable computer software for detecting, classifying, monitoring, and remediating sensitive data; |
QUICKADAS | OPUS IVS, INC. | 7322 Newman Blvd. Building #3 Dexter MI 48130 | Downloadable computer software for detecting faulty electronic system sensors and modules and directing the user to calibrations and targets to restore motor vehicle driver assistance systems and confirming successful repairs;QUICK ADAS; |
RIDECHECK | UBER TECHNOLOGIES, INC. | 1515 3rd Street San Francisco CA 94158 | Downloadable computer software for detecting trip delays, vehicle location, and trip anomalies; downloadable computer software for safety and incident detection; downloadable computer software for requesting and managing emergency assistance; downloadable computer software for providing access to global communication networks, the internet, and wireless networks that enables customers to communicate with others; downloadable emergency notification system software; downloadable emergency notification system software for providing alerts, push-notifications, and other remote notifications to users and emergency response entities; downloadable emergency notification system software for accessing a communication network and allowing audio and data communication between users and emergency and support responders; downloadable computer software for accessing GPS and motion sensor data for safety and emergency response purposes;Telecommunication services, namely, providing electronic message alerts via the internet; telecommunication services, namely, providing electronic message alerts via the internet notifying individuals of the detection of anomalies in vehicle and trip activity; telecommunications services, namely, routing calls, SMS messages, text messages, and push-notifications to customers; telecommunications services, namely, routing calls, SMS messages, text messages, and push-notifications to local third-party motorized vehicle operators, couriers, messengers, and passengers using mobile phones; telecommunication services, namely, providing electronic message alerts via the internet notifying individuals of a changed status or condition in vehicle trip activity; personal and social services rendered by others to meet the needs of individuals, namely, emergency response services in the nature of providing private and secure real time electronic communication over a computer network between users of software and emergency support responders; personal services rendered by others to meet the needs of individuals, namely, emergency response telecommunications services in the nature of providing text message, push electronic message notification, and email notification alerts via the internet and telecommunications networks to users and non-medical emergency support responders;RIDE CHECK;Personal services rendered by others to meet the needs of individuals, namely, emergency response services in the nature of medical and security alarm monitoring services for providing notifications to users and non-medical emergency support responders; monitoring trip activity and vehicle location for personal safety and emergency response purposes; providing a website featuring information about options to maintain personal safety in the event of a detected trip irregularity; emergency response monitoring assistance services, namely, monitoring of mobile devices by a remote monitoring center for assisting in the dispatch of emergency public health and security services and notification to third parties; monitoring of mobile devices by a remote monitoring center to provide urgent personal security and safety support services to others; travel assistance services, namely, providing information about emergency response services for people in transit; providing a website with information about personal safety and emergency response services;Electronic monitoring and reporting of data related to trip delays, vehicle location, and trip anomalies, using computers or sensors; |
SENSITIVE DATA MANAGER | SPIRION | Suite 1900 200 Central Avenue St. Petersburg FL 33701 | Downloadable computer software for detecting, classifying, monitoring and remediating sensitive data in connection with data security and data privacy; downloadable computer search engine software; downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; |
SICPA HORIZON | SICPA HOLDING SA | Avenue de Florissant 41 Prilly CH-1008 Switzerland | Downloadable computer software for detecting counterfeits and verifying the authenticity of goods, documents, product packaging, digitally produced images and labels; downloadable computer software for organizing and presenting data relating to branded goods, product packaging, product labels, verifying the control chain, identifying and using markers;Providing access to online databases in the field of the authentication and inventory management of goods, such as goods in the pharmaceutical, health, alcohol, consumer goods, industrial, agrochemical, luxury goods and tobacco sectors; internet service provider services, namely, transmitting data and information via the Internet concerning global computer network data in the field of monitoring and inventory management of goods, such as goods in the pharmaceutical, health, alcohol, consumer goods, industrial, agrochemical, luxury goods and tobacco sectors;Business risk assessment services, namely, risk analysis with respect to product supply chains, namely, distribution and supply chains of raw materials and finished products, to combat counterfeiting, misappropriation and alteration of goods; business management consultancy; business data analysis, namely, commercial analysis of revenue lost due to counterfeiting, misappropriation and alteration of goods; data automation and collection services, namely, using proprietary software to assess, analyze and collect data; private investigation services, namely, compiling proof of control chains for the purpose of fighting counterfeiting, misappropriation and alteration of goods;Private investigations and related advice linked to counterfeiting, misappropriation of goods, brand degradation and liability claims; legal advisory services, namely, legal advisory services in the fields of authentication and tracking of goods and documents, and brand control and protection, against counterfeiting, alteration and misappropriation of goods and for ensuring the integrity of authentic goods and documents;Quality control services for certification purposes relating to the authentication of goods in the pharmaceutical, health, alcohol, consumer goods, industrial, agrochemical, luxury goods and tobacco sectors; designing, implementation, and management of software and technology solutions for use in control chain and authentication programs and excise debt collection services; |
SIF DETECT | FiVerity, Inc. | 3 Allied Dr., Suite #303 Dedham MA 02026 | Downloadable computer software for detecting financial crimes and fraud;SYNTHETIC IDENTITY FRAUD DETECT;Software as a service (SAAS) services featuring software for detecting financial crimes and fraud; |
STARGATE | io9 | 8540 Avenida de las Ondas La Jolla CA 92037 | Downloadable computer software for detecting and treating cancer using artificial intelligence (AI);Medical services for the treatment and detection of cancer; Medical analysis services using artificial intelligence (AI) for the diagnosis of cancer; Providing a website via a global computer network featuring information in the fields of health, cancer, cancer treatment, recovery and survival, and artificial intelligence;Software as a service (saas) services featuring software for detecting and treating cancer using artificial intelligence (AI); |
SYNTHID | Coalesce, Inc. | 3 Allied Drive, Suite 300 Dedham MA 02026 | Downloadable computer software for detecting financial crimes and fraud;SYNTH ID;Software as a service (SAAS) services featuring software for detecting financial crimes and fraud; |
TIPS | Rozin Security Consulting | 2751 Hennepin Avenue, PMB 413 Minneapolis MN 55408 | Downloadable computer software for detecting and preventing security threats; Downloadable computer software application for detecting and preventing security threats;THREAT INFORMATION PROTECTION SYSTEM;Providing temporary use of online non-downloadable computer software for detecting and preventing security threats; |
TREADVISION | VOLTA CHARGING | 155 De Haro Street San Francisco CA 94103 | Downloadable computer software for detecting a motor vehicle tire, detecting motor vehicle tire wear, analyzing motor vehicle tire tread depth and analyzing motor vehicle tire safety; Downloadable computer software for advertising motor vehicle service center services; Downloadable computer software for connecting motor vehicle drivers in need of motor vehicle services with providers of such services;Providing information relating to the repair or maintenance of automobiles;TREAD VISION;Software as a service (SAAS) services featuring software for detecting a motor vehicle tire, detecting motor vehicle tire wear, analyzing motor vehicle tire tread depth and analyzing motor vehicle tire safety; Software as a service (SAAS) services featuring software for advertising motor vehicle service center services; Software as a service (SAAS) services featuring software for connecting motor vehicle drivers in need of motor vehicle services with providers of such services; |
TRUFFEL | Niantic, Inc. | 1 Ferry Building, Suite 200 San Francisco CA 94111 | Downloadable computer software for detecting a user's location and displaying relevant local information of general interest; Downloadable computer software enabling users to search, view, share, review, upload, compile, and post information about locations, events, points of interest, routes, geographic features, geospatial data, and 3D mapping activities; Downloadable software for establishing geolocation information and geospatial data; Downloadable software for taking photographs, recording audio and videos, and posting photographs, audio, and videos with geolocation information on an interactive digital map; Downloadable software for listening to audio recordings and viewing social feeds, photographs, and videos with geolocation information on an interactive digital map; Downloadable augmented reality software for integrating electronic data with real world environments for the purposes of entertainment and education; Downloadable software for integrating electronic data with real world environments for the purpose of locating points of interest, events, routes, and locations; Downloadable augmented reality software for integrating electronic data with real world environments for the purpose of viewing photographs and videos taken at specific locations; Downloadable augmented reality software for integrating electronic data with real world environments for the purposes of accessing and viewing location-based photographs, videos, audio, text, and social feeds;Electronic and digital transmission of messages, sound, video, photographs, and information; electronic transmission of geospatial data from mobile devices; electronic data transmission; transmission of location-based messaging;Online social networking services; online social networking services accessible by means of downloadable mobile applications and online non-downloadable software;Providing online non-downloadable software for detecting a user's location and displaying relevant local information of general interest; Providing online non-downloadable software enabling users to search, view, share, review, upload, compile, and post information about locations, events, points of interest, routes, geographic features, geospatial data, and 3D mapping activities; Providing online non-downloadable software for establishing geolocation information and geospatial data; Providing online non-downloadable software for taking photographs, recording audio and videos, and posting photographs, audio, and videos with geolocation information on an interactive digital map; Providing online non-downloadable software for listening to audio recordings and viewing social feeds, photographs, and videos with geolocation information on an interactive digital map; Providing online non-downloadable augmented reality software for integrating electronic data with real world environments for the purposes of entertainment and education; Providing online non-downloadable software for integrating electronic data with real world environments for the purpose of locating points of interest, events, routes, and locations; Providing online non-downloadable augmented reality software for integrating electronic data with real world environments for the purpose of viewing photographs and videos taken at specific locations; Providing online non-downloadable augmented reality software for integrating electronic data with real world environments for the purposes of accessing and viewing location-based photographs, videos, audio, text, and social feeds; Providing online non-downloadable software for social networking; Providing virtual environments in which users can interact for recreational, leisure or entertainment purposes; |
VERITI | Veriti Security Inc. | 251 Little Falls Drive Wilmington DE 19808 | Downloadable computer software for detecting and preventing security threats; Downloadable computer software application for detecting and preventing security threats; Downloadable computer software to provide pre-breach insights and proactive remediation of security gaps; Downloadable computer software for identifying security gaps and misconfigurations of application and network, responding to and remediating security events; Downloadable computer software which helps gain ROI by adjusting security controls and remediate cybersecurity events via machine learning and prediction models; Downloadable computer software for assisting organizations in gaining a security posture assessment, validation, maintenance and improvement;Providing on-line non downloadable software to provide pre-breach insights and proactive remediation of security gaps; Software as a service (SaaS) services featuring software for analyzing and managing organization's online threat landscape, telemetries and security logs; Software as a service (SAAS) services featuring software for identifying security gaps and misconfigurations of application and network, responding to and remediating security events; software as a service (SaaS) services featuring software which helps gain ROI by adjusting security controls and remediate cybersecurity events via machine learning and prediction models; Development of customized software for others for use in risk assessment, information security, and business analysis; Providing on-line non- downloadable computer software for assisting organizations in gaining a security posture assessment, validation, maintenance and improvement; maintenance of computer software relating to computer security and prevention of computer risks; |
WEBARX | Webarx OÜ | Akadeemia tn 1 Pärnu 80011 Estonia | Downloadable computer software for detecting and protecting computer networks and software applications from hacking attacks; downloadable computer software that controls input and output to computer files by tracking log in access; downloadable computer software for assessing weaknesses and vulnerabilities in the software code and configuration of computer systems, software applications, computer networks and computer applications; downloadable computer software for monitoring user behaviors on computer network system for malicious activities; downloadable computer software for storing, managing and analyzing log files from servers, network devices and software applications; downloadable computer software for detecting and preventing threats of hacking of information systems, computer networks and software applications; downloadable computer software for managing, analyzing, and monitoring information technology (IT) infrastructure and security; downloadable computer software for managing, analyzing, and monitoring computer-based information systems and networks; computer hardware, namely, firewalls and networks security devices; downloadable computer software for computer network security; downloadable anti-piracy software; downloadable anti-spyware software; downloadable computer software for the creation of firewalls;WEB ARX;Software as a service (SAAS) services featuring software in the fields of computer and network security; Software as a service (SAAS) services featuring computer and network security software, specifically, software for simulating computer, network, and premises security threats, data breaches, and other network and computer attacks, for the purpose of assessing security maturity and incident readiness; Software as a service (SAAS) services featuring computer and network security software, specifically, software for providing threat and vulnerability analysis, security posture and risk analysis and assessment, social engineering and security readiness training, security maturity and incident readiness training, risk triage and response training, perimeter enumeration and discovery services, data breach analysis and forensic incident response and remediation services, and scanning and penetration testing of computers and networks to assess information security vulnerability; |
Where the owner name is not linked, that owner no longer owns the brand |