Brands and Their Owners
Brand | Owner (click to sort) | Address | Description |
---|---|---|---|
1STEALTH | INVISINET TECHNOLOGIES | 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 | Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile devices, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;ONE STREALTH;Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; |
4STEALTH | INVISINET TECHNOLOGIES | 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 | Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile devices, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;FOUR STEALTH; FOR STEALTH;Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; |
BLUE ARMOR | INVISINET TECHNOLOGIES | 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 | Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile device, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways; |
BLUE ARMOR | Blue Armor Technologies | Suite 224 4420 Cypress Creek Parkway Houston TX 77068 | Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile device, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways; |
CLOAKNET | INVISINET TECHNOLOGIES | 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 | Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile devices, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;CLOAK NET;Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; |
HOUDININET | INVISINET TECHNOLOGIES | 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 | Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile devices, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; |
INVISINET | INVISINET TECHNOLOGIES | 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 | Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile devices, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; |
NETCLOAK | INVISINET TECHNOLOGIES | 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 | Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile devices, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;NET CLOAK;Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; |
VALENCOR | Valencor | 5553 Beverleys Mill Rd Broad Run VA 20137 | Software for cybersecurity, network architecture and data architectures; software and hardware for data replication and data integration; software for cybersecurity, data integration, data replication and data architectures; software and hardware for electronic data security systems; Downloadable software for distributed, cloud-agnostic, multi-publisher data for Network-Centric Security (NCS) mission systems, namely, software to extract, transform, encrypt, wrapper, securely deliver, replicate, deconflict, or update data changes between Data-Centric Security (DCS) micro-segments; Downloadable software for distributed, cloud-agnostic, multi-publisher data for Data-Centric Security (DCS) micro-segments, namely, software for micro-segments operating at differing security levels in a Zero Trust Architecture (ZTA) or equivalent environment/data fabric; Downloadable software that tracks application performance, performs periodic maintenance and provides reports and alerts concerning such performance; Downloadable software that extracts, transforms, encrypts, wrappers, securely delivers, replicates, deconflicts, or updates data changes between Data-Centric Security (DCS) micro-segments; Downloadable software for multi-publisher, bi-directional, filtered data replication between micro-segments; Software for distributed, cloud-agnostic, multi-publisher data for Network-Centric Security (NCS) mission systems, namely, software to extract, transform, encrypt, wrapper, securely deliver, replicate, deconflict, or update data changes between Data-Centric Security (DCS) micro-segments; Software for distributed, cloud-agnostic, multi-publisher data for Data-Centric Security (DCS) micro-segments, namely, software for micro-segments operating at differing security levels in a Zero Trust Architecture (ZTA) or equivalent environment/data fabric; Software that tracks application performance, performs periodic maintenance and provides reports and alerts concerning such performance; Software that extracts, transforms, encrypts, wrappers, securely delivers, replicates, deconflicts, or updates data changes between Data-Centric Security (DCS) micro-segments; Software for multi-publisher, bi-directional, filtered data replication between micro-segments; |
Where the owner name is not linked, that owner no longer owns the brand |