Brands and Their Owners
LEIDOS INNOVATIONS TECHNOLOGY, INC. contact information is shown below | |
Owner: | LEIDOS INNOVATIONS TECHNOLOGY, INC. |
---|---|
Owner Address: | 700 North Frederick Avenue Gaithersburg MD 20879 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
AFR |
---|---|
Description: | Downloadable software for use in operation of unmanned aircraft, such as flying taxis, and autonomous vehicles in urban environments including assistance with safety requirements, operations and procedures for take-off and landing, flight paths, locations and landing, navigation, coordination and inspection;Consultation related to the use and operation of unmanned aircraft (flying taxis) and autonomous vehicles in urban environments, specifically, consultation in the field of unmanned aircraft and autonomous vehicle operations and procedures for take-off and landing, flight paths, locations and landing, navigation, flight coordination and transportation infrastructure;Consultation related to the use and operation of unmanned aircraft (flying taxis) and autonomous vehicles in urban environments, specifically, consultation in the field of unmanned aircraft and autonomous vehicle safety requirements and safety inspections;Technological design services related to the use and operation of unmanned aircraft (flying taxis) and autonomous vehicles in urban environments, specifically, design and development of software; software as a service (SaaS) services featuring software for use in operation of unmanned aircraft, such as flying taxis, and autonomous vehicles in urban environments including assistance with safety requirements, operations and procedures for take-off and landing, flight paths, locations and landing, navigation, coordination and inspection; software design and development for others in the field of operation of unmanned aircraft, such as flying taxis, and autonomous vehicles in urban environments including assistance with safety requirements, operations and procedures for take-off and landing, flight paths, locations and landing, navigation, coordination and inspection; |
Category: | DOWNLOADABLE SOFTWARE USE |
Brand: |
ARENA ATM |
---|---|
Description: | big data cyber security and intelligence downloadable web based computer software application for email focused intrusion detection and enabling the capture, search and review of file-centric cyber threats on a computer network;ARENA ADVANCED THREAT MONITORING; |
Category: | BIG DATA CYBER SECURITY |
Brand: |
ARENA ITI |
---|---|
Description: | big data cyber security and intelligence downloadable web based computer software application for use in automatically ingesting, enriching, mapping and modeling data from disparate enterprise IT and industrial networks, cyber assets, and human resource data that provide flexible orchestration, security analytics, knowledge management and analyst workflows to detect, analyze and respond to insider threats;ARENA INSIDER THREAT IDENTIFICATION; |
Category: | BIG DATA CYBER SECURITY |
Brand: |
ATHENA GUARDIAN |
---|---|
Description: | Computer network servers featuring software for monitoring and managing cyber security;Providing cyber security platforms, solutions, frameworks, consulting and support services for government contracts, bids and RFPs, namely, providing temporary use of online non-downloadable software for monitoring and managing cyber security and software consultancy related thereto; computer software design; developing customized computer software for others; SAAS in the field of cyber security, namely, software as a service services featuring software for monitoring and managing cyber security; providing temporary use of online non-downloadable cyber security software for monitoring and managing cyber security; Computer security services, namely, protecting data and information; computer security threat analysis for protecting data; data security consultancy; technology consultation and research in the field of cyber security, data and information security, and network security; computer network security services, namely, restricting access to and by computer networks to and of undesired web sites, media, devices, individuals and facilities; computer network security services, namely, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon, providing network vulnerability testing and risk assessment services, network penetration and penetration mitigation services, and network monitoring and management, and detection and reporting of malicious network activity; computer network security services, namely, locating and mitigating network security breaches; providing computer cyber security consultancy services; computer services, namely, onsite and online scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer networks and endpoints; design and development of electronic data security systems; computer security consultancy, namely, contingency planning for information systems and computer network security; testing of computer software and computer networks relating to computer security and prevention of computer risks; |
Category: | COMPUTER NETWORK SERVERS FEATURING SOFTWARE |
Brand: |
AUTOMATED FLIGHT RULES |
---|---|
Description: | Consultation and technological design services related to the use and operation of unmanned aircraft (flying taxis) and autonomous vehicles in urban environments including solutions related to safety requirements, operations and procedures for take off and landing, flight paths, locations and landing, navigation, coordination, inspection, infrastructure, rules and criteria and documentation related to impacts and registries; downloadable and non-downloadable (SAAS) software, software design and development related to the foregoing; |
Category: | CONSULTATION TECHNOLOGICAL DESIGN SERVICES |
Brand: |
BRICKYARD |
---|---|
Description: | Open-source supply chain management and fulfillment system for image analysis, namely, downloadable software for planning, tracking, enabling, and monitoring an enterprise's analytical processes and imagery assets;Open-source supply chain management and fulfillment system for image analysis services, namely, providing temporary use of non-downloadable software for planning, tracking, enabling, and monitoring an enterprise's analytical processes and imagery assets; |
Category: | OPEN SOURCE SUPPLY CHAIN MANAGEMENT |
Brand: |
CAADS COLLABORATIVE ADVANCED ANALYTICS AND DATA SHARING |
---|---|
Description: | COLLABORATIVE ADVANCED ANALYTICS AND DATA SHARING;Software as a service (SAAS) services featuring software for use in database management, consisting of data storage, data visualization, use in electronic storage of data, use in building data analytic models, use in ensuring data quality; providing on-line non-downloadable software for use in database management, consisting of data storage, data visualization, use in electronic storage of data, use in building data analytic models, use in ensuring data quality; |
Category: | COLLABORATIVE ADVANCED ANALYTICS DATA |
Brand: |
CAF |
---|---|
Description: | Downloadable software for expediting access to images, generating automated observations, providing internal Structured Observation Management capture, training algorithms, and for data integration processing;Providing temporary use of non-downloadable software for expediting access to images, generating automated observations, providing internal Structured Observation Management capture, training algorithms, and for data integration processing; Software as a service (SAAS) services featuring software for expediting access to images, generating automated observations, providing internal Structured Observation Management capture, training algorithms, and for data integration processing; |
Category: | DOWNLOADABLE SOFTWARE EXPEDITING ACCESS |
Brand: |
CLOUDBANK |
---|---|
Description: | CLOUD BANK;Consulting services in the field of cloud computing, namely, full spectrum of cloud-based services, cloud strategy, migration readiness assessment and planning, application migration, and a complete managed service offering for ongoing management of cloud infrastructure; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; updating, monitoring and maintaining cloud-based computer software through automation of online updates, enhancements, change requests, patch management, security, and remote computer backup services; full-lifecycle cloud computing consulting services to run and support cloud infrastructure; design and development of computer software for cloud storage of data and remote and on-site management of the IT infrastructures of others; and software as a service (SAAS) services featuring software for providing end-to-end secure segmentation of customer computer environments within the cloud, including virtualization, server, network and storage environments; |
Category: | CLOUD BANK |
Brand: |
CLOUDBANK |
---|---|
Description: | Consulting services in the field of cloud computing, namely, full spectrum of cloud-based services, cloud strategy, migration readiness assessment and planning, application migration, and a complete managed service offering for ongoing management of cloud infrastructure; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; updating, monitoring and maintaining cloud-based computer software through automation of online updates, enhancements, change requests, patch management, security, and remote computer backup services; full-lifecycle cloud computing consulting services to run and support cloud infrastructure; design and development of computer software for cloud storage of data and remote and on-site management of the IT infrastructures of others; and software as a service (SAAS) services featuring software for providing end-to-end secure segmentation of customer computer environments within the cloud, including virtualization, server, network and storage environments; |
Category: | CONSULTING SERVICES FIELD |
Brand: |
CYBER EDGE ACADEMY |
---|---|
Description: | arranging and conducting of training courses in the fields of IT, cybersecurity and technical skills; educational services, namely, conducting programs in the field of IT, cybersecurity and technical skills; arranging and conducting hackathons for purposes of training;CYBER AND ACADEMY; |
Category: | ARRANGING CONDUCTING TRAINING |
Brand: |
CYBER EDGE ACADEMY |
---|---|
Description: | arranging and conducting of training courses in the fields of IT, cybersecurity and technical skills; educational services, namely, conducting programs in the field of IT, cybersecurity and technical skills; arranging and conducting hackathons for purposes of training;The mark consists of The mark consists of a shield design containing the wording Cyber EDGE ACADEMY, with each word centered on top of the next, and a chevron and graduation cap separating EDGE and ACADEMY..;CYBER AND ACADEMY; |
Category: | ARRANGING CONDUCTING TRAINING |
Brand: |
CYBER EDGE ACADEMY ENGAGE, DEVELOP, GROW, EXPERIENCE |
---|---|
Description: | arranging and conducting of training courses in the fields of IT, cybersecurity and technical skills; educational services, namely, conducting programs in the field of IT, cybersecurity and technical skills; arranging and conducting hackathons for purposes of training;The mark consists of a circle design containing the wording Cyber EDGE ACADEMY, with each word centered on top of the next, and a chevron and graduation cap separating EDGE and ACADEMY. Along the outside of the circle is another circular border with the wording ENGAGE, DEVELOP, GROW, and EXPERIENCE appearing on each horizontal and vertical section, all separated by a series of arrows.;CYBER AND ACADEMY; |
Category: | ARRANGING CONDUCTING TRAINING |
Brand: |
CYBERDNA |
---|---|
Description: | Arranging and conducting of training courses in the fields of IT, cybersecurity and technical skills; educational services, namely, conducting programs in the field of IT, cybersecurity and technical skills; arranging and conducting hackathons for purposes of training; custom development of training courses for individuals and specific tasks for others in the field of cyber security; |
Category: | ARRANGING CONDUCTING TRAINING |
Brand: |
CYBEREDGE |
---|---|
Description: | arranging and conducting of training courses in the fields of IT, cybersecurity and technical skills; educational services, namely, conducting programs in the field of IT, cybersecurity and technical skills; arranging and conducting hackathons for purposes of training;The mark consists of the stylized term CYBEREDGE.;CYBER EDGE; |
Category: | ARRANGING CONDUCTING TRAINING |
Brand: |
CYBEREDGE |
---|---|
Description: | arranging and conducting of training courses in the fields of IT, cybersecurity and technical skills; educational services, namely, conducting programs in the field of IT, cybersecurity and technical skills; arranging and conducting hackathons for purposes of training;CYBER EDGE; |
Category: | ARRANGING CONDUCTING TRAINING |
Brand: |
DEV-SOC-OPS |
---|---|
Description: | Educational services, namely, providing training of cyber security and privacy professionals in the fields of computer security and vulnerability assessment; training of cyber security professionals with respect to detection of malware, unauthorized activities and intrusions, and remediation of security problems and vulnerabilities in computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices;Computer security services, namely, protecting data and information by restricting unauthorized access to networks, computer hardware, peripherals, devices, software, media, and applications; computer security threat analysis for protecting data; data security consultancy; technology consultation and research in the field of cyber security, data and information security, and network security; computer security services in the nature of security information event management (SIEM) for use in electronic collection and analysis of real-time network information to manage and respond to security vulnerabilities and external threats; computer network security services, namely, restricting access to and by computer networks to and of undesired web sites, media, devices, individuals and facilities, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon, providing network vulnerability testing and risk assessment services, network penetration and penetration mitigation services, and network monitoring and management, detection and reporting of malicious network activity; computer network security services, namely, locating and mitigating network security breaches; providing computer cyber security consultancy services; computer services, namely, onsite and online scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer networks and endpoints; design and development of security systems; computer security consultancy, namely, contingency planning for information systems and computer network security; testing of computer software and computer networks relating to computer security and prevention of computer risks; |
Category: | EDUCATIONAL SERVICES |
Brand: |
E |
---|---|
Description: | The mark consists of a stylized version of the letter E.;computer software for use in creating enterprise communities for users to participate in discussions, get feedback from their peers, form virtual communities, and engage in social networking;Color is not claimed as a feature of the mark.;social networking services for use in an enterprise computing environment;computer consultation services; computer systems integration; computer systems design and integration, computer and communications systems management, namely, the configuring and management of computing and communications resources and information systems; computer services, namely, creating an online enterprise community for users to participate in discussions, get feedback from their peers, form virtual communities, and engage in social networking; |
Category: |