Cryptsoft Pty Ltd

 Cryptsoft Pty Ltd contact information is shown below
Owner:CRYPTSOFT PTY LTD
Owner Address:P.O. Box 6389 Fairfield Gardens, QLD 4103 Australia
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byCryptsoft Pty Ltd

Brand:

CLOUDHSM

Description:

Computer software and hardware for providing secure communication on global computer communication networks and local area computer networks, namely, encryption hardware and software; cryptographic software and hardware for data and network security; computer programs and firmware for encryption key management, encryption and decryption; computer hardware and software for signing, authentication, or verification of digital signatures;CLOUD HSM;Non-downloadable software accessible or operated via global computer communication networks, that provide secure communication services on global computer communication networks and local area computer networks, namely, non-downloadable encryption software; software as a service (SAAS) services featuring cryptographic software services for data and network security; software as a service (SAAS) services featuring encryption key management, encryption and decryption; software as a service (SAAS) services for signing, authentication, or verification of digital signatures;

Category: COMPUTER SOFTWARE HARDWARE
Brand:

CRYPTSOFT

Description:

Computer software and computer software development kits to integrate cryptographic security features into software platforms and applications; computer software development kits based on information system standards and IT security standards; computer software for data recovery, data backup, data storage, data caching, data management, data storage management and data storage resource management; computer software for network data storage management and network data storage management control; computer software and computer hardware inclusive of related documentation sold as a unit with it; computer software for the encryption, access control, monitoring and protection of electronic messages and documents, and user manuals sold as a unit with it; random number generators for use in cryptographic security systems; computer software products, namely, computer software designed to issue and manage digital user identities and privileged information for electronic commerce and security; computer software programs designed to permit access to data by generating access codes and by verifying the access codes generated by non-predictable code calculators; computer hardware; computer hardware for data storage, management and retrieval; software and computer hardware products embedded in or certified to work with the IT vendors products; IT security products for use in the field of data security, namely, for encryption, for data communications and data security, securing e-mail and mobile devices, securing storage and transfer of data, providing user authentication and transaction security over a network, and issuing, monitoring and controlling smart cards and security tokens; computer software for diagnosing and testing computer systems;CRYPT SOFT;Authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of personal identification information; providing user authentication services in e-commerce transactions; consulting services in the field of maintaining the security and integrity of data and databases; regulatory compliance consulting; consultation in the field of data theft and identity theft;Consulting services in the field of IT and data security and cloud services; computer services, namely, integration of private and public cloud computing environments; technical consulting services in the fields of datacentre architecture, public and private cloud computing solutions, and evaluation and implementation of Internet technology and services; computer services, namely, encrypted data recovery services; data encryption and decoding services; design and development of electronic data security systems; IT security consultancy; computer services, namely, computer consultation, customization of computer hardware and software, computer hardware and software design and development, deployment and installation of computer software; providing online software development tools for encryption, indexing, backup, recovery, archival, preservation, online storage, remote access, collaboration, synchronization, syndication, aggregation, organization, editing, visualization and analysis of electronic data, media and email; Consulting services in the fields of compliance with information system standards and IT security standards; Consulting services for IT due diligence, including the review and analysis of software source code;

Category: COMPUTER SOFTWARE COMPUTER SOFTWARE
Brand:

CRYPTSOFT CLOUDHSM

Description:

Computer software and hardware for providing secure communication on global computer communication networks and local area computer networks, namely, encryption hardware and software; cryptographic software and hardware for data and network security; computer programs and firmware for encryption key management, encryption and decryption; computer hardware and software for signing, authentication, or verification of digital signatures;CRYPT SOFT CLOUD HSM;Non-downloadable software accessible or operated via global computer communication networks, that provide secure communication services on global computer communication networks and local area computer networks, namely, non-downloadable encryption software; software as a service (SAAS) services featuring cryptographic software services for data and network security; software as a service (SAAS) services featuring encryption key management, encryption and decryption; software as a service (SAAS) services for signing, authentication, or verification of digital signatures;

Category: COMPUTER SOFTWARE HARDWARE
Brand:

FOUNDATION SECURITY TECHNOLOGIES TRUSTED² EMBEDDED | INTEROPERABLE

Description:

The mark consists of the stylized words FOUNDATION SECURITY TECHNOLOGIES in blue on one line, and the words TRUSTED2 EMBEDDED INTEROPERABLE in black on a second line below the first line. The 2 is raised as a superscript. A black first vertical bar separates the words TRUSTED2 and EMBEDDED, and a second black vertical bar separates the words EMBEDDED and INTEROPERABLE.;Downloadable computer software and downloadable computer software development kits for integrating cryptographic security features into software platforms and applications; downloadable computer software development kits based on information system standards and IT security standards; downloadable computer software for data recovery, data backup, data storage, data caching, data management, data storage management and data storage resource management; downloadable computer software for network data storage management and network data storage management control; downloadable computer software for the encryption, access control, monitoring and protection of electronic messages and documents, and user manuals sold as a unit with it; downloadable computer software in the nature of random number generators for use in cryptographic security systems; computer software products, namely, downloadable computer software designed to issue and manage digital user identities and privileged information for electronic commerce and security; downloadable computer software programs designed to permit access to data by generating access codes and by verifying the access codes generated by non-predictable code calculators; computer hardware; computer hardware for data storage, management and retrieval; downloadable computer software for integrating cryptographic security features certified to work with third-party products; downloadable computer software for encryption, data communications and data security, securing e-mail and mobile devices, securing storage and transfer of data, providing user authentication and transaction security over a network, and issuing, monitoring and controlling smart cards and security tokens; downloadable computer software for diagnosing and testing computer systems; Downloadable computer software in the field of cryptographic security, data security, identity theft, IT security, data recovery, data backup, data storage, data caching, data management, data storage management, data storage resource management, network data storage management, network data storage management control, computer system testing and diagnostic, and printed instruction manuals therefor sold as a unit;FOUNDATION SECURITY TECHNOLOGIES TRUSTED TWO EMBEDDED | INTEROPERABLE;The color(s) blue, and black is/are claimed as a feature of the mark.;Authentication, issuance and validation of digital certificates; verification of personal identity via authentication of personal identification information; consulting services in the field of maintaining the security and integrity of data and databases; regulatory compliance consulting in the field of computer and cryptographic security;SECURITY TECHNOLOGIES, EMBEDDED, OR INTEROPERABLE;Consulting services in the field of data security; computer services, namely, encrypted data recovery services; data encryption and decoding services; design and development of electronic data security systems; IT security consultancy; providing temporary use of online non-downloadable software development tools for encryption, indexing, backup, recovery, archival, preservation, online storage, remote access, collaboration, synchronization, syndication, aggregation, organization, editing, visualization and analysis of electronic data, media and email; consulting services in the fields of compliance with information system standards and IT security standards; consulting services for IT due diligence, including the review and analysis of software source code; computer technology services in the nature of identification verification services, namely, providing authentication of digital personal identification information; providing user authentication services using software technology for e-commerce transactions; computer security consultation in the field of data theft and identity theft;

Category: