ARCTIC WOLF NETWORKS, INC.

 ARCTIC WOLF NETWORKS, INC. contact information is shown below
Owner:ARCTIC WOLF NETWORKS, INC.
Owner Address:8939 Columbine Rd., Suite 150 Eden Prairie MN 55347
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byARCTIC WOLF NETWORKS, INC.

Brand:

ARCTIC WOLF

Description:

Computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; security operations services in the nature of computer services, namely, detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; monitoring of computer systems for detecting unauthorized access or data breach; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the security policies, protocols and technology of others to assure compliance with cybersecurity industry standards;

Category: COMPUTER NETWORK TECHNOLOGY SECURITY SERVICES
Brand:

ARCTIC WOLF PREDATOR PLATFORM

Description:

PLATFORM;Platform as a service (PAAS) featuring computer software platforms to ingest data, enrich, and analyze data in order to detect and prioritize cybersecurity threats; Platform as a service (PAAS) featuring computer software platforms to assess and manage the cyber risk and vulnerability of a computer network; computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; computer network technology security consulting services;

Category: PLATFORM
Brand:

ARCTIC WOLF SECURITY OPERATIONS CLOUD

Description:

computer network technology services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the cybersecurity policies, protocols and technology of others to assure compliance with cybersecurity industry standards;

Category: COMPUTER NETWORK TECHNOLOGY SERVICES
Brand:

CONCIERGE SECURITY

Description:

SECURITY;IT consulting services; computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; security operations services in the nature of computer services, namely, detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; monitoring of computer systems for detecting unauthorized access or data breach; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the security policies, protocols and technology of others to assure compliance with cybersecurity industry standards;

Category: SECURITY
Brand:

END CYBER RISK

Description:

computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; security operations services in the nature of computer services, namely, detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; monitoring of computer systems for detecting unauthorized access or data breach; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the security policies, protocols and technology of others to assure compliance with cybersecurity industry standards;

Category: COMPUTER NETWORK TECHNOLOGY SECURITY SERVICES
Brand:

ID360

Description:

Computer software development;

Category: COMPUTER SOFTWARE DEVELOPMENT
Brand:

MANAGED SECURITY AWARENESS

Description:

Training services in the field of security awareness;

Category: TRAINING SERVICES FIELD
Brand:

ROOTSECURE

Description:

In the statement, Line 1, Root Cellar Technologies Corporation should be deleted, and RootSecure Corporation should be inserted.;ROOT SECURE;Software as a service (SAAS) services featuring software used to assess and manage the cyber risk and vulnerability of a computer technology network; computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; computer network technology security consulting services;

Category: STATEMENT
Brand:

SECURITY JOURNEY

Description:

SECURITY;computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; security operations services in the nature of computer services, namely, detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; monitoring of computer systems for detecting unauthorized access or data breach; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the security policies, protocols and technology of others to assure compliance with cybersecurity industry standards;

Category: SECURITY
Brand:

SECURITY OPERATIONS CLOUD

Description:

computer network technology services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the cybersecurity policies, protocols and technology of others to assure compliance with cybersecurity industry standards;

Category: COMPUTER NETWORK TECHNOLOGY SERVICES
Brand:

SECURITY OPERATIONS CLOUD

Description:

The mark consists of an outline of a howling wolf head inside a triangle shape; all centered above the term Security Operations Cloud.;Color is not claimed as a feature of the mark.;computer network technology services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the cybersecurity policies, protocols and technology of others to assure compliance with cybersecurity industry standards;

Category: