KASEYA LIMITED

 KASEYA LIMITED contact information is shown below
Owner:KASEYA LIMITED
Owner Address:One Custom House Plaza, IFSC Dublin D01H5Y9 Ireland
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byKASEYA LIMITED

Brand:

BULLPHISH

Description:

Software as a service (SAAS) featuring software for providing and visualizing phishing campaigns and for providing security awareness training compaigns; software as a service (SAAS) featuring software for use in measuring security awareness, email security awareness, and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SAAS) featuring computer software and applications for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SAAS) featuring computer software and applications for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; software as a service (SAAS) featuring computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats;

Category: SOFTWARE AS SERVICE SAAS
Brand:

BULLPHISH ID

Description:

BULL PHISH IDENTIFICATION;ID;Software as a service (SAAS) featuring software for providing and visualizing phishing campaigns and for providing security awareness training compaigns; software as a service (SAAS) featuring software for use in measuring security awareness, email security awareness, and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SAAS) featuring computer software and applications for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SAAS) featuring computer software and applications for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; software as a service (SAAS) featuring computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats;

Category: BULL PHISH IDENTIFICATION
Brand:

DARK WEB ID

Description:

Computer services, namely, monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data indicating potential cyber security breaches to facilitate the detection and prevention of organizational data theft and fraud, and providing reports to such organizations related thereto;ID;

Category: COMPUTER SERVICES
Brand:

DARK WEB ID

Description:

Computer services, namely, monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cyber security breaches to facilitate the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto;Software as a service (SAAS) services featuring software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cyber security breaches to facilitate the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto;

Category: COMPUTER SERVICES
Brand:

K

Description:

The mark consists of a stylized letter K set against a irregularly shaped diamond background.;Downloadable enterprise software used to track and improve the performance and availability of business services from an information technology operations perspective; Computer software, namely, downloadable application software for use in accessing a platform featuring software for use in managing business processes; Downloadable computer software for enterprise application integration (EAI); Downloadable computer software for application and database integration; Downloadable computer software for management of computer-based information systems for businesses; Downloadable computer software for developing, deploying, operating, monitoring, configuring, customizing, implementing and managing of computer systems and applications; Downloadable computer software for workflow and business process automation; Downloadable computer software for information technology service automation; Downloadable computer software for identifying elements of information technology infrastructure; Downloadable computer software for generating performance analytics; Downloadable computer software for facilities management; Downloadable computer software for field service automation; Downloadable computer software for application integration; Downloadable computer software development tools; Downloadable computer software for ensuring the security of electronic mail; Downloadable anti-spyware software; Downloadable computer software for controlling and managing access server applications; Downloadable computer software for the creation of firewalls; Downloadable computer anti-virus software; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks;KASEYA;Software as a service (SAAS) services featuring enterprise software used to track, analyze and improve the performance and availability of applications, infrastructure and business services; infrastructure-as-service (IAAS) services featuring computer software platforms for creating, managing and deploying cloud computing infrastructure services; platform-as-a-service (PAAS) services featuring computer software platforms for use in developing, configuring, customizing and deploying software applications; software-as-a-service (SAAS) services featuring software for use in managing business processes; software as a service (SAAS) services featuring software for use in managing computer-based information systems; cloud computing services, namely, cloud computing featuring online non-downloadable software for use in developing, configuring, customizing and deploying software applications, managing business processes, and managing computer-based information systems; computer services, namely, cloud hosting provider services; providing temporary use of non-downloadable software to others for information technology service management (ITSM) and information technology operations management (ITOM); application service provider (ASP) services, namely, hosting computer software applications of others; Platform as a service (PAAS) featuring a non-downloadable computer software platform for use by others to develop, configure, customize, and deploy software applications; providing temporary use of non-downloadable software to others for developing, deploying, operating, monitoring, configuring, customizing, implementing, and managing computer systems and applications; providing temporary use of non-downloadable software for managing computer-based information systems for businesses; providing temporary use of non-downloadable software to others for information technology service automation; providing temporary use of non-downloadable software for workflow and business process automation; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, remote management of the information technology (IT) systems of others; IT integration services; Maintenance and updating of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Periodic upgrading of computer software for others; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Technical support, namely, monitoring technological functions of computer network systems; Updating of computer software relating to computer security and prevention of computer risks;

Category: