Mor, Shahar

 Mor, Shahar contact information is shown below
Owner:MOR, SHAHAR
Owner Address:28 Arik Einstein St. Herzliya 4659083 Israel
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byMor, Shahar

Brand:

CURIOSITY

Description:

USB (universal serial bus) hardware; Mini peripheral component interconnect express (PCIE) Hardware; Mini Peripheral Component Interconnect (PCI) Hardware; Mini peripheral component interconnect express (PCIE) M.2 hardware; Ethernet devices in the nature of adapters; Computer, embedded systems comprised of embedded computer hardware and mobile hotspot device hardware for cyber security; VPN (virtual private network) hardware; computer peripherals; computer hardware and downloadable and recorded software for embedded systems for use in artificial intelligence, data encryption, detection, mitigation and prevention of computer software and hardware hacking and internet viruses, malware, network anomalies and security breaches; VPN (virtual private network) downloadable and recorded operating software; downloadable and recorded computer software and computer hardware for detecting and preventing cyber-attacks; downloadable and recorded computer software for identifying and preventing cyber-attacks in computers, computer systems, embedded systems, networks, hardware, software applications, digital devices, and mobile devices; computer hardware; downloadable and recorded computer software for detecting and preventing cyber risks; Computer hardware for protecting cryptocurrency activities; downloadable and recorded computer software for protecting cryptocurrency activities; Downloadable computer software for encryption; Electronic encryption units; Software-defined radio (SDR); Radio based hardware being radio receivers and transmitters; GPS (Global Positioning System) tracking devices; hardware cryptographic accelerators; Computer hardware and physical pressure, temperature, light, speed and humidity sensors; microphones; light diodes; digital directional compass; gyroscopes; pressure sensors; humidity sensors; temperature sensors; accelerometers; Computer hardware and physical pressure, temperature, light, speed and humidity ensors for security applications; pressure, temperature, light, speed and humidity sensors; Computer hardware for protecting drones; Computer hardware for protecting boarders; Computer hardware for protecting airplanes and airlines systems; Computer hardware for protecting health care; Computer hardware for protecting banks; Electronic health ID cards for use in connection with payment for services; Electronic Passports; Computer hardware and downloadable and recorded software for providing access to password-less applications; Computer hardware and downloadable and recorded software for providing access to zero trust technology; HSM (Hardware security module); computer hardware and downloadable and recorded software protection for IOT; Computer hardware and downloadable and recorded software for fingerprint recognition;

Category: USB UNIVERSAL SERIAL BUS HARDWARE
Brand:

FRANCISCO VENTURES

Description:

Computer, embedded systems comprised of embedded computer hardware and mobile device hardware for cyber security; downloadable and recorded computer software for cyber security for detection, mitigation and prevention of computer and internet viruses, malware, network anomalies and security breaches; downloadable software in the nature of a mobile application for cyber security for detection and mitigation of computer and internet viruses, malware, network anomalies and security breaches; VPN (virtual private network) hardware; computer peripherals; Hardware and downloadable and recorded software for Embedded systems for use in artificial intelligence, Data encryption, detection, mitigation and prevention of computer and internet viruses, malware, network anomalies and security breaches; downloadable and recorded computer software and computer hardware for detecting and preventing cyber-attacks; downloadable and recorded computer software for identifying and preventing cyber-attacks in computers, computer systems, embedded systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable and recorded computer software and hardware providing artificial intelligence, Data encryption, vulnerabilities protection and detection, malware and virus protection and security breaches for secure networks, virtual computer systems, virtual private networks and virtual computer environments; computer hardware; downloadable and recorded computer software for detecting and preventing cyber risks; Computers and downloadable and recorded computer software for artificial intelligence, data analytics, deep learning, machine learning, data integration for use in modeling human behavior; Computers and downloadable and recorded computer software for artificial intelligence, Data encryption, data analytics, deep learning, machine learning, data integration for use in Hardware protection; Hardware and downloadable and recorded software using artificial intelligence for use in deep learning, machine learning, data analytics, data integration; Computer hardware for protecting cryptocurrency activities; downloadable and recorded computer software for protecting cryptocurrency activities; Downloadable computer software for encryption; Electronic encryption units; Software-defined radio (SDR); Radio based hardware being radio receivers and transmitters;VENTURES;Technology consulting and technical computer services in the fields of cyber security; Consulting in the field of information technology and computer security; Consulting in the field of embedded systems security; Research and development technologies for cyber security; Designing, developing, customizing being programming, configuring, maintaining, analyzing, integrating and remote management of cyber-security systems of others; Software consulting and technology services related to cyber-attacks and threats against computers, computer systems, embedded systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; software innovation consulting services in the field of cyber security; Technology consulting and technological services related to designing, developing, configuring, maintaining, analyzing, integrating, and remote management of cyber-security systems for others; maintenance of computer software relating to computer security and prevention of computer risks; application service provider (ASP) featuring software for use cyber security for detection, mitigation and preventing of computer and internet viruses, malware, network anomalies and security breaches; application service provider (ASP) featuring software that provides secure virtual private networks, virtual computer systems and virtual computing environments; Computer security threat analysis and artificial intelligence for protecting data; Computer security threat analysis, namely, cybersecurity services in the nature of restricting unauthorized access to computer harddrives and computer networks, Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Technological consulting in the field of protecting cryptocurrency; Data encryption services for providing security and anonymity; Data encryption services; network communications encryption services; hardware and software data encryption services;

Category: COMPUTER