THREAT

Brand Owner (click to sort) Address Description
THREAT ANGLER Threat Angler 204 4th Ave N #423 Indian Rocks Beach FL 33785 THREAT;Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity;
THREAT CENTRAL MICRO FOCUS 2202 SOUTH 950 EAST PROVO UT 84606 THREAT;Providing temporary use of non-downloadable computer programs and computer software to automate formatted reporting of real-time security indicators for use in risk assessment and information security;
THREAT FOLDING ProtectWise, Inc. 1601 Wewatta Street, #700 Denver CO 80202 THREAT;Computer software algorithm for use in connection with cloud computing application available on a subscription basis which processes Internet security threats and provides predictive analysis of future security threats;
THREAT HUNTER Thomason Technologies Suite A 333 Morris Witt Bldg 1538 San Antonio TX 78226 THREAT;Software as a Service (SAAS) services featuring software for monitoring computer system for security purposes;
THREAT MARKET Security Scorecard Inc. 186 32nd Street Brooklyn NY 11232 THREAT;Platform as a service (PAAS) featuring computer software platforms which provides real-time information security intelligence in the fields of computer, data, internet website, and network security; Platform as a service (PAAS) featuring computer software platforms for protecting and securing computer networks and applications; Platform as a service (PAAS) featuring computer software platforms providing real-time security audits of an online application, network, and host; Computer security consultancy; Computer consultation in the field of computer security; Development of customized software for others for use in risk assessment and information security; Computer consultation in the field of computer security, namely, providing technical recommendations and advice in the fields of Internet website, network, and computer data security; Maintenance of computer software relating to computer security and prevention of computer risks; Testing of security systems; Design and development of electronic data security systems;
THREAT SKETCH Threat Sketch Suite 501, 500 West 5th Street Winston-Salem NC 27101 THREAT;Computer security consultancy in the field of computer security; Computer security consultancy;
THREAT STACK F5, INC. 801 5th Ave Seattle WA 981041663 THREAT;Computer software design and development, computer programming and maintenance of computer software for use in electronic file transfer and storage, computer network and endpoint security and for the prevention of data theft; providing temporary use of on-line non-downloadable computer software for use in electronic file transfer and storage, computer network and endpoint security and for the prevention of data theft;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method of active detection of at least one threat to the homeland security. Each such threat is either hidden inside at least one cargo container before transit, or is placed inside at least one cargo container while in transit; each such threat while interacting with its surrounding generates a unique threat signature. The method comprises the following steps: (A) substantially continuously probing each cargo container; (B) detecting at least one threat signature; (C) processing each detected threat signature to determine a likelihood of at least one threat to become a threat to the homeland security; (D) identifying at least one container that includes such threat to the homeland security; and (E) eliminating such threat to the homeland security.