Brands and Their Owners
Aries Security, LLC contact information is shown below | |
Owner: | ARIES SECURITY, LLC |
---|---|
Owner Address: | 1226 N. King Street Wilmington DE 19801 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
ARIES SECURITY |
---|---|
Description: | Workshops and seminars in the field of internet security, network security and computer security; educational services, namely, providing courses, workshops, seminars, classes, training programs, teleclasses, teleworkshops, seminars, conferences, webinars, on-line classes, on-line workshops, on-line seminars, on-line training programs, on-line seminars, on-line non-downloadable educational videos in the field of internet security, network security and computer security; teaching and training in internet security, network security and computer security; organizing live exhibitions and conferences in the field of internet security, network security and computer security for educational purposes;The mark consists of the words ARIES SECURITY, in front of the words is a symbol of a ram's horn encircled within a circle.;Computer hardware and computer software for training and skills assessment in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection;Color is not claimed as a feature of the mark.;Providing marketing consulting in the field of internet security, network security and computer security; organizing live exhibitions and conferences in the field of internet security, network security and computer security for commercial purposes;SECURITY;Computer security consultancy in the field of scanning and penetration testing of computer hardware, software and networks to assess information security vulnerability; Computer security consultancy in the field of internet security, network security and computer security; development of software and hardware for secure network operations; technological services, namely, technological research and design in the field of internet security, network security and computer security; |
Category: | WORKSHOPS SEMINARS |
Brand: |
ARIES SECURITY |
---|---|
Description: | Workshops and seminars in the field of internet security, network security and computer security; educational services, namely, providing courses, workshops, seminars, classes, training programs, teleclasses, teleworkshops, seminars, conferences, webinars, on-line classes, on-line workshops, on-line seminars, on-line training programs, on-line seminars, on-line non-downloadable educational videos in the field of internet security, network security and computer security; teaching and training in internet security, network security and computer security; organizing live exhibitions and conferences in the field of internet security, network security and computer security for educational purposes;Computer hardware and computer software for training and skills assessment in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection;Providing marketing consulting in the field of internet security, network security and computer security; organizing live exhibitions and conferences in the field of internet security, network security and computer security for commercial purposes;SECURITY;Computer security consultancy in the field of scanning and penetration testing of computer hardware, software and networks to assess information security vulnerability; Computer security consultancy in the field of internet security, network security and computer security; development of software and hardware for secure network operations; technological services, namely, technological research and design in the field of internet security, network security and computer security; |
Category: | WORKSHOPS SEMINARS |
Brand: |
CAPTURE THE PACKET |
---|---|
Description: | computer application software for use in providing computer security education and awareness;PACKET; |
Category: | COMPUTER APPLICATION SOFTWARE USE |
Brand: |
CAPTURE THE PACKET |
---|---|
Description: | Training in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection; Conducting training events in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection; Evaluation to determine technical skills and qualifications in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection;Computer hardware and computer software for training and skills assessment in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection;Software as a service (SAAS) services featuring software for training and skills assessment in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection; |
Category: | TRAINING FIELDS |
Brand: |
CTP |
---|---|
Description: | Training services in the field of of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection; Conducting training events, namely, classes, seminars, conferences and workshops in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection;CAPTURE THE PACKET;Software as a service (SAAS) services featuring software for training and skills assessment in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection; Evaluation to determine technical skills and qualifications in the fields of computer and cyber security and forensics, network analysis and troubleshooting, Voice over IP (VoIP) traffic analysis and troubleshooting, LAN and WAN traffic analysis and troubleshooting, data leak discovery, advanced persistent threat detection, insider threat detection, and advanced covert channel and steganography detection; |
Category: | TRAINING SERVICES FIELD |
Brand: |
CYBER GAUNTLET |
---|---|
Description: | Training in the field of cyber readiness; educational services, namely, classes, seminars, training events, and workshops in the field of cyber readiness;CYBER; |
Category: | TRAINING FIELD |
Brand: |
CYBER PT |
---|---|
Description: | Training services in the field of cyber security; educational services, namely, classes, seminars, online classes and educational assessment in the field of cyber security;CYBER; |
Category: | TRAINING SERVICES FIELD |
Brand: |
WALL OF SHEEP |
---|---|
Description: | Application service provider (ASP) featuring computer application software for use in providing computer security education and awareness training; |
Category: | APPLICATION SERVICE PROVIDER ASP FEATURING |