Assured Enterprises, Inc.

 Assured Enterprises, Inc. contact information is shown below
Owner:ASSURED ENTERPRISES, INC.
Owner Address:8300 Boone Boulevard Vienna VA 22182
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byAssured Enterprises, Inc.

Brand:

AEI TRIPLEHELIX

Description:

Computer software for use in the insurance industry, namely, software for use by insurers and potential policyholders in determining a potential policyholder's security risk on a global computer network and/or the Internet; Downloadable reports featuring information regarding a potential policyholder's and/or insured's security risk on a global computer network and/or the Internet; Downloadable reports featuring information regarding one's security risk on a global computer network and/or the Internet;Insurance services, namely, providing independent scoring services relating to a potential policyholder's security risk on a global computer network and/or the Internet for insurance evaluation purposes; Insurance information and consultancy in the field of cyber risk insurance; Insurance risk assessment, namely, providing numerical ratings of insurability risks for insurance evaluation purposes; Insurance information and consultancy, namely, providing information technology (IT) network security information to insurance professionals or insureds for use in determining and evaluating a potential policyholder's cyber security risk;AEI TRIPLE HELIX;Business risk management; Business risk assessment services, namely, analyzing and evaluating one's security risk on a global computer network and/or the Internet; Business risk management consultation, namely, assessing, correcting, defending and managing one's security risk on a global computer network and/or the Internet;Computer security consultation in the field of assessing, correcting, defending and managing one's security risk on a global computer network and/or the Internet; Information technology consulting in the field of security solutions on a global computer network and/or the Internet; Providing temporary use of non-downloadable computer software for use in analyzing and determining a potential policyholder's security risk on a global computer network and/or the Internet; Computer security consultancy in the nature of providing information technology IT network security information for use in determining and evaluating a potential policyholder's cyber security risk for use by insurers and potential policyholders;

Category: COMPUTER SOFTWARE USE
Brand:

AEISCORE

Description:

Computer software for use in the insurance industry, namely, software for use by insurers and potential policyholders in determining a potential policyholder's security risk on a global computer network and/or the Internet; Downloadable reports featuring information regarding a potential policyholder's and/or insured's security risk on a global computer network and/or the Internet; Downloadable reports featuring information regarding one's security risk on a global computer network and/or the Internet;Printed reports featuring information regarding a potential policyholder's and/or insured's security risk on a global computer network and/or the Internet; Printed reports featuring information regarding one's security risk on a global computer network and/or the Internet;Insurance services, namely, providing independent scoring services relating to a potential policyholder's security risk on a global computer network and/or the Internet for insurance evaluation purposes; Insurance information and consultancy in the field of cyber risk insurance; Insurance risk assessment, namely, providing numerical ratings of insurability risks for insurance evaluation purposes; Insurance information and consultancy, namely, providing information technology (IT) network security information to insurance professionals or insureds for use in determining and evaluating a potential policyholder's cyber security risk;AEI SCORE;Business risk management; Business risk assessment services, namely, analyzing and evaluating one's security risk on a global computer network and/or the Internet; Business risk management consultation, namely, assessing, correcting, defending and managing one's security risk on a global computer network and/or the Internet;Computer security consultation in the field of assessing, correcting, defending and managing one's security risk on a global computer network and/or the Internet; Information technology consulting in the field of security solutions on a global computer network and/or the Internet; Providing temporary use of non-downloadable computer software for use in analyzing and determining a potential policyholder's security risk on a global computer network and/or the Internet; Computer security consultancy in the nature of providing information technology IT network security information for use in determining and evaluating a potential policyholder's cyber security risk for use by insurers and potential policyholders;

Category: COMPUTER SOFTWARE USE
Brand:

ASSUREDSCANDKV

Description:

Computer software for the detection of known software vulnerabilities residing/hidden within an IT Infrastructure, software or software applications; Computer software for identifying remedial action needed to eliminate detected vulnerabilities in software residing on an IT environment; Computer software for use in computer, data, and mobile device security, namely, software for scanning and detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities, and prioritizing the order in which the vulnerabilities ought to be eliminated; Computer software for use in cloud security, namely, software for scanning and detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities, and prioritizing the order in which the vulnerabilities ought to be eliminated; Cybersecurity software, namely, software for detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities and prioritizing the order in which the vulnerabilities ought to be eliminated; Computer programs for detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities, and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities, and prioritizing the order in which the vulnerabilities ought to be eliminated; Downloadable reports featuring information regarding cybersecurity; Downloadable reports featuring information regarding computer, data, and mobile device security; Downloadable reports featuring information regarding cloud security; Downloadable reports concerning the detection of software vulnerabilities in an IT environment, information regarding the vulnerabilities and their criticality, the remedial action necessary to eliminate such vulnerabilities, recommendations regarding the order in which to eliminate the vulnerabilities and information regarding potential cyberattacks;ASSURED SCAN DKV;

Category: COMPUTER SOFTWARE DETECTION
Brand:

ASSUREDSCORE

Description:

Computer software for use in the insurance industry, namely, software for use by insurers and potential policyholders in determining a potential policyholder's security risk on a global computer network and/or the Internet; Downloadable reports featuring information regarding a potential policyholder's and/or insured's security risk on a global computer network and/or the Internet; Downloadable reports featuring information regarding one's security risk on a global computer network and/or the Internet;Printed reports featuring information regarding a potential policyholder's and/or insured's security risk on a global computer network and/or the Internet; Printed reports featuring information regarding one's security risk on a global computer network and/or the Internet;ASSURED SCORE;Insurance services, namely, providing independent scoring services relating to a potential policyholder's security risk on a global computer network and/or the Internet for insurance evaluation purposes; Insurance information and consultancy in the field of cyber risk insurance; Insurance risk assessment, namely, providing numerical ratings of insurability risks for insurance evaluation purposes; Insurance information and consultancy, namely, providing information technology (IT) network security information to insurance professionals or insureds for use in determining and evaluating a potential policyholder's cyber security risk;Business risk management; Business risk assessment services, namely, analyzing and evaluating one's security risk on a global computer network and/or the Internet; Business risk management consultation, namely, assessing, correcting, defending and managing one's security risk on a global computer network and/or the Internet;Computer security consultation in the field of assessing, correcting, defending and managing one's security risk on a global computer network and/or the Internet; Information technology consulting in the field of security solutions on a global computer network and/or the Internet; Providing temporary use of non-downloadable computer software for use in analyzing and determining a potential policyholder's security risk on a global computer network and/or the Internet; Computer security consultancy in the nature of providing information technology IT network security information for use in determining and evaluating a potential policyholder's cyber security risk for use by insurers and potential policyholders;

Category: COMPUTER SOFTWARE USE
Brand:

ASSUREDSEVEN+

Description:

Computer hardware; Computer software for protecting IT systems and enterprises from external and internal cybersecurity attacks; Computer software and hardware for encryption; Computer software and hardware for the encryption of data and digital files, including audio, video, text, binary, executables, images, graphics and multimedia files; Computer software used to affiliate a computer software application with a computer operating system in an effort to prevent viruses, worms, trojans, spyware, adware, and malware from impersonating the valid computer software application by registering the legitimate application with the operating system to ensure only legitimate use; Computer software and firmware for use in hardening computer software applications by watermarking the applications to the operating system with a unique wrapper that is validated by the operating system prior to the running of the applications; Computer software and hardware for the detection, protection and prevention of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, computer networks and electronic devices; Computer software and hardware for monitoring computers, computer networks and electronic devices for security purposes; Computer software and hardware for protecting and securing the integrity of data by retaining a duplicate copy of the software on the hard drive and at reboot, comparing and eliminating any changes made to the software or new files introduced; Computer chips; Electronic integrated circuit computer chips; Electronic integrated circuit computer chips for authentication and identity management information security using out-of-band network devices; Encoded electronic chip cards for encrypting computer, data, network and electronic devices; Encoded electronic chip cards for security, authentication, tracking and information assurance by identifying particular users of computer software applications; Computer software and hardware for security, authentication, tracking and information assurance used to authenticate the identity of users of devices and applications and to prevent backdoor access to applications; Computer software and hardware for use in computer, data, network and electronic device security used to identify and authenticate the source of data in an IT system and enterprise and to validate that the source, user, device and application are authorized to conduct the attempted activity; Computer software and hardware for managing, monitoring and controlling device, software, and user access to information systems data; Computer software and hardware for authenticating user identification or digital certificates of sites, systems, devices, software and data; Computer software and hardware for the defining and managing the roles of users and their access to information technology systems data by systems, devices, software users and data; Computer software and hardware for monitoring of cybersecurity status and alarms; Computer software and hardware for monitoring systems for security, authentication, tracking and information assurance; Computer software and hardware for monitoring and reconfiguring computer, data, network and electronic device security systems and authorizations;ASSURED SEVEN+;Monitoring of computer systems for security purposes;Consulting services in the fields of implementation and use of computer hardware and software; Technical support services for others, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Computer monitoring services, namely, tracking hardware performance and processes, and sending out historical reports and alerts; Computer security consultancy; Computer consultation; Computer security consultancy, namely, computer consultation in the fields of computer, data, network and electronic device security; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems and computer networks for others; Computer security consultancy, namely, consulting in the field of user access to data; Computer security consultancy in the field of computer systems, namely, security of data flows; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, computer networks and electronic devices; Technical support services for others, namely, monitoring of network system software, server software and web and database applications for security breaches and vulnerabilities, and repair, remediation and management of same; Computer security consultancy, namely, consulting services in the field of maintaining the security and integrity of IT systems and enterprises;

Category: COMPUTER HARDWARE
Brand:

BLUEHERRING

Description:

Computer software used to ensure the secure and authentic transmission, storage, processing, and communication of information, documents and data at the point of sale, and via a global computer network, wide-area computer networks, and/or peer-to-peer computer networks; Computer software used to monitor, track, detect, and prevent fraud when transmitting, storing, processing, and communicating information, documents and data at the point of sale, and via a global computer network, wide-area computer networks, and/or peer-to-peer computer networks;BLUE HERRING;Computer services, namely monitoring of computer systems for security purposes;Installation, maintenance and repair of computer software for use by others for use to ensure the secure and authentic transmission, storage, processing, and communication of information, documents and data at the point of sale, and via a global computer network, wide-area computer networks, and/or peer-to-peer computer networks; Software as a service (SAAS) services, namely, featuring software for use by others for use to ensure the secure and authentic transmission, storage, processing, and communication of information, documents and data at the point of sale, and via a global computer network, wide-area computer networks, and/or peer-to-peer computer networks;

Category: COMPUTER SOFTWARE USED ENSURE
Brand:

CYBERSCORE

Description:

Computer software for use in the insurance industry, namely, software for use by insurers and potential policyholders in determining a potential policyholder's security risk on a global computer network and/or the Internet; Downloadable reports featuring information regarding a potential policyholder's and/or insured's security risk on a global computer network and/or the Internet;CYBER SCORE;

Category: COMPUTER SOFTWARE USE
Brand:

CYBERSCORE

Description:

Printed reports featuring information regarding a potential policyholder's and/or insured's security risk on a global computer network and/or the Internet;Insurance administration risk analysis services, namely, evaluating a potential policyholder's security risk on a global computer network and/or the Internet through use of algorithms and/or data correlation; Insurance administration risk analysis services, namely, providing modeling, scoring and analysis information for purposes of determining and evaluating a potential policyholder's security risk on a global computer network and/or the Internet; Insurance administration services, namely, providing independent scoring services relating to a potential policyholder's security risk on a global computer network and/or the Internet; Insurance administration services, namely, providing information regarding a potential policyholder's security risk on a global computer network and/or the Internet, for use by insurers and the potential policyholders;CYBER SCORE;Computer security consultation in the field of assessing, correcting, defending and managing one's security risk on a global computer network and/or the Internet; Information technology consulting in the field of security solutions on a global computer network and/or the Internet; Providing temporary use of non-downloadable computer software for use in analyzing and determining a potential policyholder's security risk on a global computer network and/or the Internet; Computer security risk analysis services, namely, evaluating a potential policyholder's security risk on a global computer network and/or the Internet through use of algorithms and/or data correlation for insurance purposes; Computer security risk analysis services, namely, providing modeling, scoring and analysis information for purposes of determining and evaluating a potential policyholder's security risk on a global computer network and/or the Internet for insurance purposes; Providing computer security independent scoring services relating to a potential policyholder's security risk on a global computer network and/or the Internet for insurance purposes; Providing computer security information regarding a potential policyholder's security risk on a global computer network and/or the Internet, for use by insurers and the potential policyholders;

Category: PRINTED REPORTS FEATURING INFORMATION REGARDING
Brand:

DECENT

Description:

Computer hardware; Computer software for the management of cryptographic keys for data encryption and decryption using blockchain and threshold secret sharing technologies; Computer software for encrypting and decrypting data in order to provide electronic device security using cryptographic key management; Computer software architecture for encrypting and decrypting data using cryptographic key management; Computer software and hardware for data encryption and decryption; Computer chips; Electronic integrated circuit chips; Computer programs for data encryption and decryption and for use in electronic device security using cryptographic key management;Data encryption and decoding services; Consulting services in the fields of encryption and decryption; Consulting services in the field of computer, data, network and electronic device security; Computer security consultancy; Computer security services, namely providing data encryption and decoding services; Design and development of software, hardware and computer programs;

Category: COMPUTER HARDWARE
Brand:

SAFEAPPLY

Description:

Computer software for use in facilitating online banking and financing transactions, namely, mortgage applications, mortgage procurement, mortgage lending and mortgage refinancing; computer software used to ensure the secure and authentic transmission, storage, processing, and communication of information, documents and data in connection with online banking and financing transactions, namely, mortgage applications, mortgage procurement, mortgage lending and mortgage refinancing; computer software used to monitor, track, detect, and prevent fraud when transmitting, storing, processing, and communicating information, documents and data in connection with online banking and financing transactions, namely, mortgage applications, mortgage procurement, mortgage lending and mortgage refinancing;SAFE APPLY;Computer services, namely, monitoring of computer systems for security purposes;Installation, maintenance, and repair of computer software; Technical support services, namely, troubleshooting of computer software problems; Computer services, namely, monitoring of computer systems by remote access to ensure proper functioning and performance; Computer monitoring service which tracks application software performance, performs periodic maintenance and provides reports and alerts concerning such performance; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers;

Category: COMPUTER SOFTWARE USE
Brand:

TRIPLEHELIX

Description:

Computer software for use in the insurance industry, namely, software for use by insurers and potential policyholders in determining a potential policyholder's cyber risk; downloadable reports featuring information regarding a potential policyholder's and/or insured's cyber risk;TRIPLE HELIX;Insurance risk analysis services, namely, evaluating a potential policyholder's cyber risk through use of algorithms and/or data correlation; insurance risk analysis services, namely, providing modeling, scoring and analysis information for purposes of determining and evaluating a potential policyholder's cyber risk; Insurance services, namely, providing independent scoring services relating to a potential policyholder's cyber risk; insurance information and consultancy in the field of cyber risk insurance; providing information regarding a potential policyholder's cyber risk, for use by insurers and the potential policyholders;Computer security consultation in the field of assessing, correcting, defending and managing cyber security; information technology consulting in the field of cyber security solutions; providing temporary use of non-downloadable computer software for use in analyzing and determining a potential policyholder's cyber risk;

Category: COMPUTER SOFTWARE USE