GRT

Welcome to the Brand page for “GRT”, which is offered here for Data processing equipment, computer hardware components, electronic encryption units, computer accessories, digital pens for electronic encryption units; computer software for it encryption programs and for data carriers with it encryption programs; prerecorded magnetic and optical data carriers featuring it encryption programs, cd-roms, in particular data carriers with it encryption programs; software and hardware for secure network connections in the form of architecture for the secure processing and transmission of highly sensitive data and access without risk to an unprotected it system, in particular the internet, from a protected it system;telecommunications services, electronic transmission of data in the nature of electronic signatures, electronic transmission of facsimile communications and data featuring encryption and decryption;development of software and creating of software, in particular software for electronic encryption services, software for recording electronic signatures; creation of data-processing programs; software consultancy; computer software consultancy; consultancy in the field of computer hardware; information technology services, information technology consulting;.

Its status is currently believed to be active. Its class is unavailable. “GRT” is believed to be currently owned by “secunet Security Networks AG”.


Owner:
SECUNET SECURITY NETWORKS AG
Owner Details
Description:
Data processing equipment, computer hardware components, electronic encryption units, computer accessories, digital pens for electronic encryption units; computer software for IT encryption programs and for data carriers with IT encryption programs; prerecorded magnetic and optical data carriers featuring IT encryption programs, CD-ROMs, in particular data carriers with IT encryption programs; software and hardware for secure network connections in the form of architecture for the secure processing and transmission of highly sensitive data and access without risk to an unprotected IT system, in particular the Internet, from a protected IT system;Telecommunications services, electronic transmission of data in the nature of electronic signatures, electronic transmission of facsimile communications and data featuring encryption and decryption;Development of software and creating of software, in particular software for electronic encryption services, software for recording electronic signatures; creation of data-processing programs; software consultancy; computer software consultancy; consultancy in the field of computer hardware; information technology services, information technology consulting;
Categories: DATA PROCESSING EQUIPMENT