Brands and Their Owners
Mondoo, Inc. contact information is shown below | |
Owner: | MONDOO, INC. |
---|---|
Owner Address: | 602 Preston Village Way Cary NC 27519 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
CNQUERY |
---|---|
Description: | downloadable computer software for providing asset inventory and security tools for use in servers, containers, and other IT environments, running on CLI and Graphical UIs to discover and process security and IT inventory queries in these environments; downloadable computer software for use in IT operations, IT inventory, risk management and incident response for devops, operations, cybersecurity and cybersecurity awareness and training, identifying IT software and components and provide insights like configuration, running state, resource relationships, to help users to evaluate, prioritize, and process the contents of their IT environment, potential risks and improvements to their systems; downloadable computer software for cloud operation, cloud inventory and cloud security for use in cloud deployments to help identify its IT configuration and components, potential risks and improvements across all levels of users' cloud deployments;providing temporary use of non-downloadable computer software for providing asset inventory and security tools for use in servers, containers, and other IT environments, running on CLI and Graphical UIs, to discover and process security and IT inventory queries in these environments; providing temporary use of non- downloadable computer software for use in IT operations, IT administration, and IT inventory for operations, devops, and cybersecurity awareness and training, identifying IT software and components and provide insights like configuration, running state, resource relationships, to help users to evaluate, prioritize, and process the contents of their IT environments, findings and potential improvements for their systems; providing temporary use of non- downloadable computer software for use in risk management, incident response and cybersecurity for devops, cybersecurity and cybersecurity awareness and training, to help discover, evaluate, prioritize contents of IT environments, potential risks and potential improvements, across their systems IT fleet and included assets, namely, cloud systems, services, VMs, servers, containers, serverless functions, and APIs; providing temporary use of non-downloadable computer software for cloud operation, cloud inventory and cloud security for use in cloud deployments to help identify its IT configuration and components, potential risks and improvements across all levels of users' cloud deployments; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE PROVIDING |
Brand: |
CNSPEC |
---|---|
Description: | downloadable computer software for providing security and compliance management tools for use in servers, containers, and other IT environments, running on CLI and Graphical UIs to discover, prioritize, and process security, compliance, and policy violations in these environments; downloadable computer software for use in information technology system vulnerability and risk management for cybersecurity and cybersecurity awareness and training, identifying vulnerable IT software and components and provide insights like vulnerabilities, advisories, exploits, to help users to evaluate, prioritize, and process potential risks and findings and improve their systems; downloadable computer software for cloud security and internet security for use in cloud deployments like to help identify security risks, compliance issues, and other types of policy violations across all levels of users' cloud deployments;CN SPEC;providing temporary use of non-downloadable computer software for providing security and compliance management tools for use in servers, containers, and other IT environments, running on CLI and Graphical UIs, to discover, prioritize, and process security, compliance, and policy violations in these environments; providing temporary use of non- downloadable computer software for use in information technology system vulnerability and risk management for identifying vulnerable IT software and components and provide insights like vulnerabilities, advisories, exploits, to help users to evaluate, prioritize, and process potential risks and findings and improve their systems; providing temporary use of non-downloadable computer software for cybersecurity and cybersecurity awareness and training to discover, prioritize, process, and resolve cybersecurity and other policy violations across IT fleet and included assets, namely, cloud systems, services, VMs, servers, containers, serverless functions, and APIs; providing temporary use of no downloadable computer software for cloud security and internet security use in cloud deployments to help identify security risks, compliance issues, and other types of policy violations across all levels of users' cloud deployments; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE PROVIDING |
Brand: |
MONDOO |
---|---|
Description: | downloadable computer software for providing security and compliance management tools for use in servers, containers, and other IT environments, running on CLI and Graphical UIs to discover, prioritize, and process security, compliance, and policy violations in these environments; downloadable computer software for use in information technology system vulnerability and risk management for cybersecurity and cybersecurity awareness and training, identifying vulnerable IT software and components and provide insights like vulnerabilities, advisories, exploits, to help users to evaluate, prioritize, and process potential risks and findings and improve their systems; downloadable computer software for cloud security and internet security for use in cloud deployments like to help identify security risks, compliance issues, and other types of policy violations across all levels of users' cloud deployments;providing temporary use of non-downloadable computer software for providing security and compliance management tools for use in servers, containers, and other IT environments, running on CLI and Graphical UIs, to discover, prioritize, and process security, compliance, and policy violations in these environments; providing temporary use of non- downloadable computer software for use in information technology system vulnerability and risk management for identifying vulnerable IT software and components and provide insights like vulnerabilities, advisories, exploits, to help users to evaluate, prioritize, and process potential risks and findings and improve their systems; providing temporary use of non-downloadable computer software for cybersecurity and cybersecurity awareness and training to discover, prioritize, process, and resolve cybersecurity and other policy violations across IT fleet and included assets, namely, cloud systems, services, VMs, servers, containers, serverless functions, and APIs; providing temporary use of no downloadable computer software for cloud security and internet security use in cloud deployments to help identify security risks, compliance issues, and other types of policy violations across all levels of users' cloud deployments; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE PROVIDING |