Brands and Their Owners
Critical Informatics, Inc. contact information is shown below | |
Owner: | CRITICAL INFORMATICS, INC. |
---|---|
Owner Address: | 100 S. King Street, Suite 280 Seattle WA 98104 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
CI SECURITY |
---|---|
Description: | CRITICAL INFORMATICS SECURITY;SECURITY;Technology consultation in the field of information systems threat analysis and network security; |
Category: | CRITICAL INFORMATICS SECURITY |
Brand: |
CI SECURITY |
---|---|
Description: | CRITICAL INFORMATICS SECURITY;SECURITY;Technology consultation in the field of information systems threat analysis and network security; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services namely remote and on-site management of information technology (IT) systems of others comprised of computer software systems used in provision of information technology security services for others; Monitoring of computer systems for detecting unauthorized access or data breach; providing computer virus protection services; providing computer services, namely, online scanning and detecting of viruses, spyware, adware, malware, ransomware, and other malicious code and programs on computers and electronic devices; computer security services, namely, restricting unauthorized network access by users without credentials to hard drives, computer networks and websites; Information technology security network infrastructure consulting services, namely, providing security strategies to assist businesses in protecting their intellectual property, data and network infrastructure against cyber security attack, and conducting security, vulnerability and penetration assessments; information technology computer security consultancy in the field of incident response, risk assessments, cyber security compliance, regulation compliance, and other practices of consultancy in relation to cyber security; Computer security threat analysis for protecting data from cyber threats and incidents; Managed information technology security services, namely, computer security threat analysis for protecting data; Monitoring of computer systems for detecting unauthorized access or data breach, namely, monitoring third-party information systems, operational technology (OT) and internet of things (IoT) networks for security detection and response purposes; Computer security threat analysis for protecting data, namely, assisting third-party enterprise network owners and operators to guard, monitor, detect, secure and respond to cyberattack and malware network and digital infrastructure intrusion incidents, both actual and attempted; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security consultancy and monitoring of computer systems for detecting unauthorized access or data breach, namely, Information, OT and IoT networks security incident and response services, consisting of monitoring third-party information systems and IoT and OT networks for security and incident response purposes, including detection and response plan development, delivery and implementation services; |
Category: | CRITICAL INFORMATICS SECURITY |
Brand: |
CI SECURITY |
---|---|
Description: | CRITICAL INFORMATICS SECURITY;Monitoring third-party information systems, operational technology (OT) and internet of things (IoT) networks for security detection and response purposes; Assisting third-party enterprise network owners and operators to guard, monitor, detect, secure and respond to cyberattack and malware network and digital infrastructure intrusion incidents, both actual and attempted; Information, OT and IoT networks security incident and response services, consisting of monitoring third-party information systems and IoT and OT networks for security and incident response purposes, including detection and response plan development, delivery and implementation services; |
Category: | CRITICAL INFORMATICS SECURITY |
Brand: |
CRITICAL INSIGHT |
---|---|
Description: | Technology consultation in the field of information systems threat analysis and network security; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, remote and on-site management of information technology (IT) systems of others comprised of computer software systems used in provision of information technology security services for others; Monitoring of computer systems for detecting unauthorized access or data breach; providing computer virus protection services; providing computer services, namely, online scanning and detecting of viruses, spyware, adware, malware, ransomware, and other malicious code and programs on computers and electronic devices; computer security services, namely, restricting unauthorized network access by users without credentials to hard drives, computer networks and websites; Information technology security network infrastructure consulting services, namely, providing security strategies to assist businesses in protecting their intellectual property, data and network infrastructure against cyber security attack, and conducting security, vulnerability and penetration assessments; information technology computer security consultancy in the field of incident response, risk assessments, cyber security compliance, regulation compliance, and other practices of consultancy in relation to cyber security; Computer security threat analysis for protecting data from cyber threats and incidents; Managed information technology security services, namely, computer security threat analysis for protecting data; Monitoring of computer systems for detecting unauthorized access or data breach, namely, monitoring third-party information systems, operational technology (OT) and internet of things (IoT) networks for security detection and response purposes; Computer security threat analysis for protecting data, namely, assisting third-party enterprise network owners and operators to guard, monitor, detect, secure and respond to cyberattack and malware network and digital infrastructure intrusion incidents, both actual and attempted; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security consultancy and monitoring of computer systems for detecting unauthorized access or data breach, namely, Information, OT and IoT networks security incident and response services, consisting of monitoring third-party information systems and IoT and OT networks for security and incident response purposes, including detection and response plan development, delivery and implementation services; |
Category: | TECHNOLOGY CONSULTATION FIELD |
Brand: |
CRITICAL INSIGHT |
---|---|
Description: | Monitoring third-party information systems, operational technology (OT) and internet of things (IoT) networks for security detection and response purposes; Assisting third-party enterprise network owners and operators to guard, monitor, detect, secure and respond to cyberattack and malware network and digital infrastructure intrusion incidents, both actual and attempted; Information, OT and IoT networks security incident and response services, consisting of monitoring third-party information systems and IoT and OT networks for security and incident response purposes, including detection and response plan development, delivery and implementation services; |
Category: | MONITORING THIRD PARTY INFORMATION SYSTEMS |