Brands and Their Owners
Cysiv LLC contact information is shown below | |
Owner: | CYSIV LLC |
---|---|
Owner Address: | 225 E. John Carpenter Freeway, Ste. 1500 Irving TX 75062 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
CYSIV |
---|---|
Description: | computer security software; computer utility software; computer software for use in collecting, filtering, normalizing, enriching, processing, and analyzing system, application and security event data from computers and computer networks; computer software for use in transmitting and receiving system, application and security event data from computers and computer networks for detecting, monitoring, reporting, analyzing and eliminating cyber security incidents, malware, unauthorized software and network attacks and breaches; computer software for monitoring, analyzing and reporting on event data from computers and computer networks for analysis and action by security administrators or security software; computer software for use in providing a secure connection for security log and event data between computers, mobile devices, computer networks and hosted security software; computer software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming event transmission;Software as a service (SAAS) services, namely, hosting computer security software; Software as a service (SAAS) services, namely, hosting computer software for use in securing, protecting and monitoring computers, computer networks and data; Software as a service, namely, hosting software for use by others in the field of computer network security; Providing on-line non-downloadable security software; Providing on-line non-downloadable software for use in data integration, correlation, querying, analysis, pattern identification, big data analytics, machine learning, user behavior analytics, modeling and visualization for the detection of cyber security threats and incident, espionage and network attacks; Application service provider, namely, hosting, managing, developing, analyzing, operating and maintaining applications, in the fields of computer, data and network security; Information technology professional and managed security services for securing and protecting computers, computer networks and data; Computer security consultancy; Internet security consultancy; Data and computer network security consultancy; Consulting services for others in the fields of computer, data and network security; Technical consultation in the field of computer software installation, operation and maintenance; Computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security and security operations; Developing and deploying customized software in the field of computer, data and network security for others; Computer programming services for others in the fields computer, data and network security; Installation, maintenance, and updating of computer software for others; Updating of computer software for others relating to computer security and prevention of computer and network risks; Notification and delivery of software updates; development, design, implementation, testing, operation, analysis, and consulting services in the fields of computer, data and network security; Computer services, namely, on-site and remote management of information technology (IT) systems of others; Maintenance of computer software relating to computer security and prevention of computer risks; Computer security threat analysis for protecting data; Providing information in the field of computer network, data and network security; Computer network protection and security services; Computer security consultancy in the field of risk assessment and information security; computer consultation in the field of managing security software; computer security consultancy in the field of cyber threat analysis, threat intelligence, security operations and incident response; Technical support, namely, monitoring, analyzing and reporting technological functions of computer network systems and software; Technical support services, namely, computer network security incident response and remediation services; Technical support services, namely, remote administration and management of in-house and hosted software applications; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of cloud computing IT and application systems; Technical support services, namely, troubleshooting of computer software problems; Cyber risk management as a service (MAAS) services and managed security service provider services (MSSP), namely, securing, protecting and monitoring computers, computer networks and data for others; |
Category: | COMPUTER SECURITY SOFTWARE |