SECURITY OPERATIONS CENTER AS

Brand Owner (click to sort) Address Description
XDR CORP. Cigent Technology, Inc. Suite 150 2211 Widman Way Fort Myers FL 33901 security operations center as a service software platform; software managed computer security services; computer security services, namely, restricting unauthorized access to data via hard drives, networks, or other data storage technology; cloud-monitored cybersecurity platform services including managed SIEM, data defense, self-defending storage, whitelisting, vulnerability detection, and network detection and response;
XENEX CloudAccess, Inc. 12121 WILSHIRE BLVD, STE 1111 Los Angeles CA 90025 Security operations center as a service for computer systems, namely, monitoring of cyber security systems incidents, and responding to cyber security systems threats by tracking, analyzing, and managing data; security operations center as a service for computer systems, namely, providing vulnerability scanning, external and internal automated log reviews, IT asset discovery and management, IT asset availability, network intrusion detection, host intrusion detection, protocol analysis, and hack diversionary processes; security operations center as a service for computer systems, namely, providing log management for forensic analysis, namely, retention and analysis of logs for legal, security, and operations analysis; security operations center as a service for computer systems, namely, managing and optimizing computer security software for security information and event management (SIEM);
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A security system and method for monitoring a security status of fixed and mobile assets. The security system comprises an agent connected with the asset. The agent monitors a security of the asset and transmits the data to a master control unit. The master control unit retransmits the security status to a global operations center for processing the security status to detect a security threat. In response to a security threat, the global operations center generates an output. Periodic reports are generated and transmitted to the customer, and the customer is billed at intervals. For mobile assets, the security system also tracks a location of the asset as the asset is transported between a shipper's loading dock and a designated distribution center, including an origination port and a destination port. For fixed agents, the security system includes an interface for interfacing an existing security device to the master control unit and for controlling the existing security system.