Brands and Their Owners
Blue Ridge Networks, Inc. contact information is shown below | |
Owner: | BLUE RIDGE NETWORKS, INC. |
---|---|
Owner Address: | 14120 Parke Long Court #103 Chantilly VA 20151 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
BLUE RIDGE |
---|---|
Description: | Equipment that provides user authentication, network security, and information and data security in the fields of computer or telecommunications for others, namely, computer hardware; Computer software for user authentication, network security, and information and data security; Computer firmware for user authentication, network security, and information and data security; Computer hardware that provides user authentication, network security, and information and data security; Virtual private network hardware and operating software; Computer hardware, namely, cryptographic servers and proprietary privacy data software for remote and mobile users to have secure access to private networks;Managed services in the field of computer or telecommunications network security system for others, namely, computer consultation in the field of computer security, computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; and Computer consultation services in the field of design and implementation of computer hardware and software as part of a network security system for others; |
Category: | EQUIPMENT THAT PROVIDES USER AUTHENTICATION |
Brand: |
BLUE RIDGE NETWORKS |
---|---|
Description: | Software development company that provides cryptographic servers hardware and proprietary data privacy software for virtual private networks, remote and mobile workers to have secure access to their corporate network applications;NETWORKS; |
Category: | SOFTWARE DEVELOPMENT COMPANY THAT PROVIDES |
Brand: |
BLUE RIDGE NETWORKS |
---|---|
Description: | computer hardware, namely cryptographic servers and proprietary privacy data software for remote and mobile users to have secure access to private networks;NETWORKS; |
Category: | COMPUTER HARDWARE |
Brand: |
BORDERGUARD |
---|---|
Description: | VIRTUAL PRIVATE NETWORK (VPN) HARDWARE AND OPERATING SOFTWARE;BORDER GUARD; |
Category: | VIRTUAL PRIVATE NETWORK VPN HARDWARE |
Brand: |
BORDERGUARD |
---|---|
Description: | BORDER GUARD;COMPUTER CONSULTATION SERVICES IN THE FIELD OF DESIGN AND IMPLEMENTATION OF COMPUTER HARDWARE AND SOFTWARE AS PART OF A NETWORK SECURITY SYSTEM FOR OTHERS; |
Category: | BORDER GUARD |
Brand: |
BORDERGUARD |
---|---|
Description: | Equipment that provides user validation, network security, and information and data security in the fields of computer and telecommunications, namely, computer hardware; Computer firmware for user validation, network security, and information and data security; Virtual private network hardware and operating software; computer hardware and software sold as a unit for providing routing and switching in computer communication systems; Computer hardware that provides user validation, network security, and information and data security; and Computer hardware, namely, cryptographic servers and proprietary privacy data software for remote and mobile users to have secure access to private networks;BORDER GUARD; |
Category: | EQUIPMENT THAT PROVIDES USER VALIDATION |
Brand: |
EDGEGUARD |
---|---|
Description: | COMPUTER SOFTWARE AND HARDWARE SYSTEMS THAT PROVIDE USER AUTHENTICATION, NETWORK SECURITY, AND INFORMATION SECURITY;EDGE GUARD; |
Category: | COMPUTER SOFTWARE HARDWARE SYSTEMS |
Brand: |
HIPAAGUARD |
---|---|
Description: | High Security Network Services (VPN) tailored to the Healthcare Industry; |
Category: | HIGH SECURITY NETWORK SERVICES VPN |
Brand: |
PEAKACCESS |
---|---|
Description: | computer hardware and software for use in providing a secure access for telecommuting between remote sites and a central main computer;PEAK ACCESS; |
Category: | COMPUTER HARDWARE SOFTWARE |
Brand: |
REMOTELINK |
---|---|
Description: | VPN hardware that provides data and data transmission security, namely, user authentication, network security, and information and data security, for private networks or shared private or public networks; Computer hardware and computer firmware that provides data and data transmission security, namely, user authentication, network security, and information and data security, for private networks or shared private or public networks;REMOTE LINK; |
Category: | VPN HARDWARE THAT PROVIDES DATA |
Brand: |
REMOTELINK |
---|---|
Description: | VPN hardware that provides data and data transmission security, namely, user authentication, network security, and information and data security, for private networks or shared private or public networks; Computer hardware and computer firmware that provides data and data transmission security, namely, user authentication, network security, and information and data security, for private networks or shared private or public networks;REMOTE LINK; |
Category: | VPN HARDWARE THAT PROVIDES DATA |
Brand: |
SECURE. EASY. PROTECTED. ACCESS. |
---|---|
Description: | Managed services in the field of computer or telecommunications network security system for others, namely, computer consultation in the field of computer security, computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; and Computer consultation services in the field of design and implementation of computer hardware and software as part of a network security system for others; Hosted Services to prevent and eliminate malware, viruses, worms, trojans, spyware, intrusive software and code, and adware; managed services; to prevent and eliminate malware, viruses, worms, trojans, spyware, intrusive software and code; |
Category: | MANAGED SERVICES FIELD |
Brand: |
SECURE. EASY. PROTECTED. ACCESS. |
---|---|
Description: | Equipment that provides user authentication, network security, and information and data security in the fields of computer or telecommunications for others, namely, computer hardware; Computer software for user authentication, network security, and information and data security; Computer firmware for user authentication, network security, and information and data security; Computer hardware that provides user authentication, network security, and information and data security; Virtual private network hardware and operating software; Computer hardware, namely, cryptographic servers and proprietary privacy data software for remote and mobile users to have secure access to private networks; Software to prevent and eliminate malware, viruses, worms, trojans, spyware, intrusive software and code, and adware; |
Category: | EQUIPMENT THAT PROVIDES USER AUTHENTICATION |
Brand: |
TUNNEL-LOCK |
---|---|
Description: | TELECOMMUNICATION SERVICES NAMELY MANAGEMENT OF COMPUTER NETWORKS AND ACCESS TO COMPUTER NETWORKS; |
Category: | TELECOMMUNICATION SERVICES NAMELY MANAGEMENT |
Brand: |
TUNNEL-LOCK |
---|---|
Description: | COMPUTER HARDWARE AND SOFTWARE FOR USE IN PROVIDING MULTIPLE-USER ACCESS TO COMPUTER NETWORKS NAMELY THE INTERNET, PRIVATE NETWORKS AND VIRTUAL PRIVATE NETWORKS OR FOR THE TRANSFER AND DISSEMINATION OF A WIDE RANGE OF INFORMATION, AND MANAGING COMPUTER NETWORKS; COMPUTER HARDWARE AND SOFTWARE FOR USE IN IDENTIFICATION AND AUTHENTICATION OF USERS USING SECURITY DRIVES AND ALGORITHMS; |
Category: | COMPUTER HARDWARE SOFTWARE |
Brand: |
ZERO BREACH |
---|---|
Description: | Computer Software for scanning and penetration testing of computers and networks to assess information security vulnerability; for restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software to provide secure network operations, computer network security, and wireless network security; Computer Software for computer network security and software for control of access to and for analysis of security risks to computer systems, industrial control systems;Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software development in the field of software for secure network operations; Computer security consultancy in the field of computer network security, wireless network security; Development of security systems and contingency planning for information systems; Maintenance of computer software relating to computer security and prevention of computer risks; Providing temporary use of on-line non-downloadable software for control of access to and for analysis of security risks to computer systems, industrial control systems; Software as a service (SAAS) services featuring software for computer network security and software for control of access to and for analysis of security risks to computer systems, industrial control systems; Technical support, namely, monitoring technological functions of computer network systems; Updating of computer software relating to computer security and prevention of computer risks; Managed services and software as a service in the field of computer or telecommunications network security system for others, in the field of computer security, computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; |
Category: | COMPUTER SOFTWARE SCANNING |