DIGITAL HANDS, LLC

 DIGITAL HANDS, LLC contact information is shown below
Owner:DIGITAL HANDS, LLC
Owner Address:Suite 700 4211 W. Boy Scout Blvd. Tampa FL 33607
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byDIGITAL HANDS, LLC

Brand:

CYGUARD

Description:

CY GUARD;Technical support and comprehensive managed security services, namely, the 24/7 monitoring, for protection and defense against cyber threats, malicious code, and malfunctioning hardware and software, of network systems, servers, web and database users and applications, and endpoint devices, monitoring, detection, and incident response for security breaches, and receiving, analyzing and providing notification of related events and alerts; technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; computer security services, namely, enforcing, restricting, and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; anything as a service (XAAS) services, namely, software as a service (SAAS) featuring software and technical support, in the nature of providing visibility and analytics and troubleshooting of computer hardware and software problems, that assists others with the protection and defense against and response to cyber threats, malicious code, and malfunctioning hardware and software; infrastructure as a service (IAAS), namely, providing virtual computer systems and virtual computer environments through cloud computing that helps others protect and defend against and respond to cyber threats, malicious code, and malfunctioning hardware and software; platform as a service (PAAS) featuring computer software platforms and technical support, in the nature of providing visibility and analytics and troubleshooting of computer hardware and software problems, that assists others with the protection and defense against and response to cyber threats, malicious code, and malfunctioning hardware and software; storage as a service, namely, leasing and technical support of storage, hardware, software and networking in the nature of storing, managing, analyzing, and providing redundancy of forensic evidence and computer data storage infrastructure; desktop as a service (DAAS), namely, featuring desktop software and technical support in the nature of providing helpdesk troubleshooting and detection analysis and remediation of desktop security events and end user support for storing, securing, updating, upgrading, and backing up data; network as a service (NAAS) featuring software used to provide virtual private networks; disaster recovery as a service (DRAAS) being the duplication of data and software on, and hosting of, physical or virtual servers to provide failover in the event of a catastrophe; other IT solutions as a service in the nature of Encryption as a Service (EAAS) being data encryption services, and IT Integration Services provided through cloud infrastructure or over the internet, for monitoring, maintenance, and ensuring the security of computer networks, servers, web and database users and applications, and infrastructure devices, for ensuring uptime and functionality of computer networks and protection of data, and compliance with industry standards; testing, analysis and evaluation of network security and data protection systems to assure compliance with industry standards; data encryption services; computer virus protection services; technical support, namely, providing backup computer programs and facilities; development of software for secure network operations;

Category: CY GUARD
Brand:

CYGUARD MAESTRO

Description:

Managed security services; cybersecurity services; providing managed security services, namely, security orchestration, security automation, and security incident response services and platforms, and threat intelligence services and platforms; providing Information Technology (IT) and Internet of Things (IOT) managed services, namely, remote management of the IT and IOT systems of others; Software-as-a-service (SAAS) services, namely, software that integrates all security technology into one definition to allow automation and orchestration of security data in one source; software-as-a-service (SAAS) services, namely, security orchestration, automation and response (SOAR) software solutions that combine incident response, orchestration and automation, and threat intelligence (TI) management capabilities in a single platform; software-as-a-service (SAAS) services, namely, SOAR software to document and implement playbooks, workflows and processes, support security incident management, and apply machine-based assistance to human security analysts and operators; software-as-a- service (SAAS) services, namely, SOAR software that integrates workflows with other technologies to achieve desired outcomes, namely, incident triage, incident response, TI curation and management, and compliance monitoring and management;

Category: MANAGED SECURITY SERVICES
Brand:

DIGITAL HANDS

Description:

Maintenance and repair of computer hardware;

Category: MAINTENANCE REPAIR COMPUTER
Brand:

DIGITAL HANDS

Description:

The mark consists of a stylized hand design, made up of three concentric curved lines, with the inner line forming a u shape, the middle line forming a j shape and the outer line forming a flattened j shape, shown above the words digital hands.;In the statement, page 2, line 6 through 10 is deleted, and The mark consists of a stylized hand design, made up of three concentric curved lines, with the inner line forming a u shape, the middle line forming a j shape and the outer line forming a flattened j shape, shown above the words digital hands. is inserted. The drawing is amended to appear as follows: PUBLISH NEW CUT;Regulatory compliance consulting in the field of computer security;DIGITAL;Technical support and comprehensive managed security services, namely, the 24/7 monitoring, for protection and defense against cyber threats, malicious code, and malfunctioning hardware and software, of network systems, servers, web and database users and applications, and endpoint devices, monitoring, detection, and incident response for security breaches, and receiving, analyzing and providing notification of related events and alerts; technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; computer security services, namely, enforcing, restricting, and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; anything as a service (XAAS) services, namely, software as a service (SAAS) featuring software that assists in the protection and defense against and response to cyber threats, malicious code, and malfunctioning hardware and software; providing technical support, in the nature of providing visibility and analytics for software, troubleshooting of computer software problems and diagnosing computer hardware problems; infrastructure as a service (IAAS), namely, providing virtual computer systems and virtual computer environments through cloud computing that helps others protect and defend against and respond to cyber threats, malicious code, and malfunctioning hardware and software; platform as a service (PAAS) featuring computer software platforms that assist with protection and defense against and response to cyber threats, malicious code, and malfunctioning hardware and software; technical support, in the nature of providing visibility and analytics and troubleshooting of computer software problems; storage as a service, namely, leasing data storage equipment, computer hardware, software and networking equipment; providing technical support of storage equipment, computer hardware, software and networking equipment, by storing, managing, analyzing, and providing redundancy of forensic evidence data and by providing redundancy for computer data storage infrastructure equipment; desktop as a service (DAAS), namely, featuring desktop software for detection analysis and remediation of desktop security events and end user support for storing, securing, updating, upgrading, and backing up data; technical support in the nature of detection analysis and remediation of desktop security events and end user support for storing, securing, updating, upgrading, and backing up data; network as a service (NAAS) featuring software used to provide virtual private networks; disaster recovery as a service (DRAAS) being the media duplication of data and duplication of software on, and hosting of, physical or virtual servers to provide failover in the event of a catastrophe; other IT solutions as a service in the nature of Encryption as a Service (EAAS) being data encryption services, and IT Integration Services provided through cloud infrastructure or over the internet, for monitoring, maintenance, and ensuring the security of computer networks, servers, web and database users and applications, and infrastructure devices, for ensuring uptime and functionality of computer networks and protection of data, and compliance with industry standards; testing, analysis and evaluation of network security and data protection systems to assure compliance with industry standards; data encryption services; computer virus protection services; technical support, namely, providing backup computer programs and facilities; development of software for secure network operations;

Category: