Brands and Their Owners
FireEye, Inc. contact information is shown below | |
Owner: | FIREEYE, INC. |
---|---|
Owner Address: | 601 McCarthy Boulevard Milpitas CA 95035 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
AGENT ANYWHERE |
---|---|
Description: | Computer hardware and software system for centralized identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of computer and computer network data, metadata, files, information and security breach incidents, for use in incident detection, security and system intrusion assessment, investigation of damage to or use of computer data and files, diagnostics, forensic data investigation, electronic evidence discovery and business loss valuation; computer hardware and software for creating searchable databases of information and data and managing storage devices in a networked environment;AGENT;information technology consulting services in the field of critical incident response to information, computer and internet security breaches; |
Category: | COMPUTER HARDWARE SOFTWARE SYSTEM |
Brand: |
BOTWALL |
---|---|
Description: | computer hardware; computer software for network security; |
Category: | COMPUTER HARDWARE |
Brand: |
CLOUDVISORY |
---|---|
Description: | Downloadable enterprise software for monitoring the security of cloud environments;CLOUD ADVISORY;Software as a service (SAAS) services featuring software for monitoring the security of cloud environments; |
Category: | DOWNLOADABLE ENTERPRISE SOFTWARE MONITORING |
Brand: |
FIND EVIL. SOLVE CRIME. |
---|---|
Description: | Providing continuing education courses pertaining to information, computer and internet security; providing continuing education in the field of computer forensics;Computer software, namely, software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security;Litigation support services; counseling in the field of compliance with legal, regulatory and self-regulatory standards in the field of computer and information security; consulting services in the field of critical incident response to information, computer, and internet security breaches, namely, consultation regarding the monitoring of computer systems for security purposes, maintaining the security and integrity of databases, providing security assessments of information systems and working environments, and providing security assessments for businesses and governmental agencies;Computer consultation in the field of computer security; research in the field of forensic intelligence and information, computer and internet security; computer software development; development of software for secure network operations; development, updating and maintenance of software and databases; technical support, namely, monitoring of network systems; design and development of networks; electronic legal discovery counseling; computer services, namely, providing forensic services to recover lost and deleted data; consulting services in the field of planning for critical incident response to information, computer and internet security breaches; |
Category: | PROVIDING CONTINUING EDUCATION COURSES PERTAINING |
Brand: |
FIREEYE |
---|---|
Description: | Computer software and hardware for digital security; computer security products, namely, computer peripherals; computer hardware and software, namely, network security appliances, email security appliances, digital data and media security appliances, security software applications, and management stations related to the foregoing; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware providing secure networks, virtual computer systems and virtual computer environments; computer hardware; computer peripherals;FIRE EYE;Technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; updating and maintaining computer software for others; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer consultation and research in the field of computer hardware, computer software and network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; information technology security services in the nature of providing network access to cyber-threat intelligence, to cyber-attack verification, and to security analysis of network traffic, emails, files, media computer software, and mobile applications; application service provider (ASP) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (ASP) featuring software that provides secure virtual computer systems and virtual computing environments; |
Category: | COMPUTER SOFTWARE HARDWARE |
Brand: |
FIREEYE |
---|---|
Description: | Training with respect to detection of malware, unauthorized activities and intrusions, and remediation of security problems and vulnerabilities in computers, computer systems, networks, hardware, software applications, digital devices, digital data and mobile devices; information technology training services; providing information related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices and generally in the field of information technology security and vulnerability;FIRE EYE; |
Category: | TRAINING WITH RESPECT DETECTION |
Brand: |
FRESH PRINTS OF MAL-WARE |
---|---|
Description: | Providing online, non-downloadable seminars, namely, webinars, in the field of information security, data protection, and threat response;Downloadable webinars in the fields of information security, data protection, and threat response;FRESH PRINTS OF MALICIOUS-WARE; |
Category: | PROVIDING ONLINE |
Brand: |
KNOW YOU'RE SECURE |
---|---|
Description: | Providing training in the field of computer forensics;Computer software, namely, software for gathering, storage, manipulation, management and encryption of data retrieved from computers, and for management of security breach incidents and responses, for use in the fields of computer security, forensics, diagnostics, incident response, and internet security;KNOW YOU ARE SECURE;Consulting services in the field of maintaining the security and integrity of databases; Monitoring of computer systems for security purposes; Compiling crime occurrence data;Computer consultation in the field of computer security; Technical support, namely, monitoring of network systems; Computer services, namely, providing forensic services to recover lost and deleted data; |
Category: | PROVIDING TRAINING FIELD |
Brand: |
M-UNITION |
---|---|
Description: | Online blog in the field of information security, data protection, and threat response;MANDIANT-AMMUNITION; |
Category: | ONLINE BLOG FIELD |
Brand: |
MIRCON |
---|---|
Description: | Educational services, namely, conducting conferences in the field of information security, data protection, and threat response, and distribution of educational materials in connection therewith;MANDIANT INCIDENT RESPONSE CONFERENCE; |
Category: | EDUCATIONAL SERVICES |
Brand: |
MVXVISOR |
---|---|
Description: | Computer software and hardware for digital security; computer security products, namely, computer peripherals; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware providing secure networks, virtual computer systems and virtual computer environments; computer hardware; computer peripherals;MVX VISOR; |
Category: | COMPUTER SOFTWARE HARDWARE |
Brand: |
STRIKEFINDER |
---|---|
Description: | Computer software, namely, software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security;STRIKE FINDER; |
Category: | COMPUTER SOFTWARE |
Brand: |
TOOLS OF ENGAGEMENT |
---|---|
Description: | Providing non-downloadable online webinars in the field of information security, data protection, and threat response; |
Category: | PROVIDING NON DOWNLOADABLE ONLINE WEBINARS |
Brand: |
ULTRAVISOR |
---|---|
Description: | Computer software and hardware for digital security; computer security products, namely, computer peripherals; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware providing secure networks, virtual computer systems and virtual computer environments; computer hardware; computer peripherals;ULTRA VISOR; |
Category: | COMPUTER SOFTWARE HARDWARE |