DATA DRIVEN DEFENSE

Welcome to the Brand page for “DATA DRIVEN DEFENSE”, which is offered here for Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; computer software, downloadable computer software, mobile device software for assessing the status of enterprise data, infrastructure, and network traffic, and for identifying and assessing threats to the enterprise data, infrastructure, and network traffic, all for use in cybersecurity consulting, assessments, and training; computer software, downloadable computer software, mobile device software for simulating threats, and possible responses to those threats, to the security of enterprise data, infrastructure and networks, for use in cybersecurity consulting, assessments, and training;.

Its status is currently believed to be active. Its class is unavailable. “DATA DRIVEN DEFENSE” is believed to be currently owned by “IronNet Cybersecurity, Inc.”


Owner:
IRONNET CYBERSECURITY, INC.
Owner Details
Description:
Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; computer software, downloadable computer software, mobile device software for assessing the status of enterprise data, infrastructure, and network traffic, and for identifying and assessing threats to the enterprise data, infrastructure, and network traffic, all for use in cybersecurity consulting, assessments, and training; computer software, downloadable computer software, mobile device software for simulating threats, and possible responses to those threats, to the security of enterprise data, infrastructure and networks, for use in cybersecurity consulting, assessments, and training;
Categories: COMPUTER SOFTWARE