Brands and Their Owners
ACALVIO TECHNOLOGIES, INC. contact information is shown below | |
Owner: | ACALVIO TECHNOLOGIES, INC. |
---|---|
Owner Address: | 2520 Mission College Blvd., Suite 110 Santa Clara CA 95054 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
ACALVIO |
---|---|
Description: | software as a service (SAAS) services featuring cloud-based enterprise security solutions for use in cybersecurity intelligence and protection, namely, software for the detection and mitigation of computer viruses, malware, network anomalies and security breaches; |
Category: | SOFTWARE AS SERVICE SAAS |
Brand: |
ACTIVE THREAT DECEPTION |
---|---|
Description: | Enterprise computer hardware and software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;ACTIVE THREAT; |
Category: | ENTERPRISE COMPUTER HARDWARE SOFTWARE |
Brand: |
ACTIVE THREAT DECEPTION |
---|---|
Description: | ACTIVE THREAT;Software as a service (SAAS) services featuring enterprise software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems; software as a service (SAAS) services featuring software to detect and mitigate security risks and threats on enterprise service providers, and governmental networks; |
Category: | ACTIVE THREAT |
Brand: |
ADVERSARY BEHAVIOR ANALYTICS |
---|---|
Description: | Software as a service (SAAS) services featuring security software for tracking and predicting security breaches within enterprise networks; |
Category: | SOFTWARE AS SERVICE SAAS |
Brand: |
DECEPTION FARMS |
---|---|
Description: | DECEPTION;Software as a service (SAAS) services featuring security software for delivering enterprise security solutions for advanced threat defense of malicious lateral movement or insider threats by dynamically creating and deploying decoy systems; |
Category: | DECEPTION |
Brand: |
DECEPTION MESH |
---|---|
Description: | Software as a service (SAAS) services featuring security software for delivering enterprise security solutions for advanced threat defense of malicious lateral movement or insider threats by dynamically creating and deploying decoy systems; |
Category: | SOFTWARE AS SERVICE SAAS |
Brand: |
DEVOPS FOR DECEPTION |
---|---|
Description: | Software as a service (SAAS) services featuring cloud-based enterprise security solutions in the nature of security software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems, decoy network operating systems, and security sensors; |
Category: | SOFTWARE AS SERVICE SAAS |
Brand: |
FLUID DECEPTION |
---|---|
Description: | DECEPTION;software as a service (SAAS) services featuring cloud-based enterprise security solutions in the nature of security software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems; |
Category: | DECEPTION |
Brand: |
SHADOW AGENT |
---|---|
Description: | AGENT;Software as a service (SAAS) services featuring enterprise software for mitigating advanced network attacks by dynamically creating and deploying decoy systems, decoy network systems, and data; |
Category: | AGENT |
Brand: |
SHADOW AGENT |
---|---|
Description: | Enterprise computer software solutions deployed on host systems for mitigating advanced network attacks by dynamically creating and deploying decoy systems, decoy network operating systems, and data;AGENT; |
Category: | ENTERPRISE COMPUTER SOFTWARE SOLUTIONS DEPLOYED |
Brand: |
SHADOW HOST |
---|---|
Description: | Virtualized enterprise computer software for detecting and mitigating advanced network attacks that is deployed and configured as a decoy computer system;HOST; |
Category: | VIRTUALIZED ENTERPRISE COMPUTER SOFTWARE |
Brand: |
SHADOW HOST |
---|---|
Description: | HOST;Software as a service (SAAS) services featuring enterprise software for detecting and mitigating advanced network attacks that is deployed and configured as a decoy computer system; |
Category: | HOST |
Brand: |
SHADOW LABS |
---|---|
Description: | LABS;Computer services, namely, monitoring, testing, evaluating, analyzing, and reporting information and data generated by decoy systems and decoy network operating systems to ensure proper functioning; computer services, namely, monitoring, testing, evaluating, analyzing, and reporting information and data generated by computer software in the fields of computer and network security to ensure proper functioning and for quality control purposes; computer software and network security analysis services in the nature of analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of network security; |
Category: | LABS |
Brand: |
SHADOW NETWORKS |
---|---|
Description: | NETWORKS;Software as a service (SAAS) services featuring enterprise software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems; |
Category: | NETWORKS |
Brand: |
SHADOW NETWORKS |
---|---|
Description: | Enterprise computer hardware and software solutions for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;NETWORKS; |
Category: | ENTERPRISE COMPUTER HARDWARE SOFTWARE |
Brand: |
SHADOWBOX |
---|---|
Description: | Enterprise computer appliances, namely, computer hardware and peripheral devices with one or more central processing units that contain software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems; |
Category: | ENTERPRISE COMPUTER APPLIANCES |
Brand: |
SHADOWNET |
---|---|
Description: | Enterprise computer hardware and software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;SHADOW NET;Software as a service (SAAS) services featuring enterprise software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems; |
Category: | ENTERPRISE COMPUTER HARDWARE SOFTWARE |
Brand: |
SHADOWPLEX |
---|---|
Description: | On-premises installed software delivering enterprise security solutions for advanced threat defense of malicious lateral movement or insider threats by dynamically creating and deploying decoy systems such as clients, servers, applications, utilities, and file systems;Software as a service (SAAS) services featuring security software for delivering enterprise security solutions for advanced threat defense of malicious lateral movement or insider threats by dynamically creating and deploying decoy systems such as clients, servers, applications, utilities, and file systems; |
Category: | ON PREMISES INSTALLED SOFTWARE DELIVERING ENTERPRISE |