Brands and Their Owners
Cigent Technology, Inc. contact information is shown below | |
Owner: | CIGENT TECHNOLOGY, INC. |
---|---|
Owner Address: | Suite 150 2211 Widman Way Fort Myers FL 33901 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
BLUESHIFT CYBER |
---|---|
Description: | BLUE SHIFT CYBER;CYBER;Security operations center as a service software platform featuring computer software platforms for automated and human-implemented cybersecurity threat detection and response; software managed computer security services in the nature of providing authentication, security event logging, and vulnerability protection through restricting access to and by computer networks to and of undesired websites, media, individuals, and facilities; computer security services, namely, restricting unauthorized access to data via hard drives, networks, or other data storage technology; cloud-monitored cybersecurity platform services, namely, platform as a service (PAAS) featuring computer software platforms for use in managing security information and event management (SIEM), data defense, self-defending storage, whitelisting, vulnerability detection, and network detection and response; |
Category: | BLUE SHIFT CYBER |
Brand: |
BLUESHIFT CYBERSECURITY |
---|---|
Description: | BLUE SHIFT CYBER SECURITY;CYBERSECURITY;Security operations center as a service software platform featuring computer software platforms for automated and human-implemented cybersecurity threat detection and response; software managed computer security services in the nature of providing authentication, security event logging, and vulnerability protection through restricting access to and by computer networks to and of undesired websites, media, individuals, and facilities; computer security services, namely, restricting unauthorized access to data via hard drives, networks, or other data storage technology; cloud-monitored cybersecurity platform services, namely, platform as a service (PAAS) featuring computer software platforms for use in managing security information and event management (SIEM), data defense, self-defending storage, whitelisting, vulnerability detection, and network detection and response; |
Category: | BLUE SHIFT CYBER SECURITY |
Brand: |
BLUESHIFT XDR |
---|---|
Description: | XDR;Security operations center as a service software platform featuring computer software platforms for automated and human-implemented cybersecurity threat detection and response; software managed computer security services in the nature of providing authentication, security event logging, and vulnerability protection through restricting access to and by computer networks to and of undesired websites, media, individuals, and facilities; computer security services, namely, restricting unauthorized access to data via hard drives, networks, or other data storage technology; cloud-monitored cybersecurity platform services, namely, platform as a service (PAAS) featuring computer software platforms for use in managing security information and event management (SIEM), data defense, self-defending storage, whitelisting, vulnerability detection, and network detection and response; |
Category: | XDR |
Brand: |
CIGENT |
---|---|
Description: | software for securing network operations; downloadable software for securing network operations; computer hardware devices including software for securing network operations; software for securing data; downloadable software for securing data; computer hardware devices including software for securing data; |
Category: | SOFTWARE SECURING NETWORK OPERATIONS |
Brand: |
CIGENT SECURE SSD |
---|---|
Description: | computer storage devices, namely internal computer hard drives and external computer hard drives; computer storage devices, namely, internal blank flash drives and external blank flash drives, that prevent unauthorized access to stored data;SECURE SSD; |
Category: | COMPUTER STORAGE DEVICES |
Brand: |
IMPOSSIBLY SECURE |
---|---|
Description: | software for securing network operations; downloadable software for securing network operations; computer hardware devices including software for securing network operations; software for securing data; downloadable software for securing data; computer hardware devices including software for securing data;Software as a service (SAAS) services featuring software for securing network operations and data; |
Category: | SOFTWARE SECURING NETWORK OPERATIONS |
Brand: |
SECURE MICRO SD |
---|---|
Description: | Secure Digital (SD) memory cards; |
Category: | SECURE DIGITAL SD MEMORY CARDS |
Brand: |
SECURE SD |
---|---|
Description: | Secure digital (SD) memory cards; |
Category: | SECURE DIGITAL SD MEMORY CARDS |
Brand: |
SECURE SSD |
---|---|
Description: | computer storage devices, namely internal computer hard drives and external computer hard drives; computer storage devices, namely internal blank flash drives and external blank flash drives, that prevent unauthorized access to stored data; |
Category: | COMPUTER STORAGE DEVICES |
Brand: |
TRUE ERASE |
---|---|
Description: | Recorded computer firmware for solid state drive (SSD) firmware for confirming data deletion and identifying or verifying each block's erased or unerased state after a wipe attempt; |
Category: | RECORDED COMPUTER FIRMWARE SOLID |
Brand: |
XDR CORP. |
---|---|
Description: | security operations center as a service software platform; software managed computer security services; computer security services, namely, restricting unauthorized access to data via hard drives, networks, or other data storage technology; cloud-monitored cybersecurity platform services including managed SIEM, data defense, self-defending storage, whitelisting, vulnerability detection, and network detection and response; |
Category: | SECURITY OPERATIONS CENTER AS |