Brands and Their Owners
ARCTIC WOLF NETWORKS, INC. contact information is shown below | |
Owner: | ARCTIC WOLF NETWORKS, INC. |
---|---|
Owner Address: | 8939 Columbine Rd., Suite 150 Eden Prairie MN 55347 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
ARCTIC WOLF |
---|---|
Description: | Computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; security operations services in the nature of computer services, namely, detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; monitoring of computer systems for detecting unauthorized access or data breach; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the security policies, protocols and technology of others to assure compliance with cybersecurity industry standards; |
Category: | COMPUTER NETWORK TECHNOLOGY SECURITY SERVICES |
Brand: |
ARCTIC WOLF PREDATOR PLATFORM |
---|---|
Description: | PLATFORM;Platform as a service (PAAS) featuring computer software platforms to ingest data, enrich, and analyze data in order to detect and prioritize cybersecurity threats; Platform as a service (PAAS) featuring computer software platforms to assess and manage the cyber risk and vulnerability of a computer network; computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; computer network technology security consulting services; |
Category: | PLATFORM |
Brand: |
ARCTIC WOLF SECURITY OPERATIONS CLOUD |
---|---|
Description: | computer network technology services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the cybersecurity policies, protocols and technology of others to assure compliance with cybersecurity industry standards; |
Category: | COMPUTER NETWORK TECHNOLOGY SERVICES |
Brand: |
CONCIERGE SECURITY |
---|---|
Description: | SECURITY;IT consulting services; computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; security operations services in the nature of computer services, namely, detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; monitoring of computer systems for detecting unauthorized access or data breach; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the security policies, protocols and technology of others to assure compliance with cybersecurity industry standards; |
Category: | SECURITY |
Brand: |
END CYBER RISK |
---|---|
Description: | computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; security operations services in the nature of computer services, namely, detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; monitoring of computer systems for detecting unauthorized access or data breach; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the security policies, protocols and technology of others to assure compliance with cybersecurity industry standards; |
Category: | COMPUTER NETWORK TECHNOLOGY SECURITY SERVICES |
Brand: |
ID360 |
---|---|
Description: | Computer software development; |
Category: | COMPUTER SOFTWARE DEVELOPMENT |
Brand: |
MANAGED SECURITY AWARENESS |
---|---|
Description: | Training services in the field of security awareness; |
Category: | TRAINING SERVICES FIELD |
Brand: |
ROOTSECURE |
---|---|
Description: | In the statement, Line 1, Root Cellar Technologies Corporation should be deleted, and RootSecure Corporation should be inserted.;ROOT SECURE;Software as a service (SAAS) services featuring software used to assess and manage the cyber risk and vulnerability of a computer technology network; computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; computer network technology security consulting services; |
Category: | STATEMENT |
Brand: |
SECURITY JOURNEY |
---|---|
Description: | SECURITY;computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; security operations services in the nature of computer services, namely, detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; monitoring of computer systems for detecting unauthorized access or data breach; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the security policies, protocols and technology of others to assure compliance with cybersecurity industry standards; |
Category: | SECURITY |
Brand: |
SECURITY OPERATIONS CLOUD |
---|---|
Description: | computer network technology services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the cybersecurity policies, protocols and technology of others to assure compliance with cybersecurity industry standards; |
Category: | COMPUTER NETWORK TECHNOLOGY SERVICES |
Brand: |
SECURITY OPERATIONS CLOUD |
---|---|
Description: | The mark consists of an outline of a howling wolf head inside a triangle shape; all centered above the term Security Operations Cloud.;Color is not claimed as a feature of the mark.;computer network technology services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the cybersecurity policies, protocols and technology of others to assure compliance with cybersecurity industry standards; |
Category: |