Brands and Their Owners
MORPHICK, INC. contact information is shown below | |
Owner: | MORPHICK, INC. |
---|---|
Owner Address: | 4600 Montgomery Road Cincinnati OH 45212 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
ANALYTICAL PIVOTING |
---|---|
Description: | ANALYTICAL;Cyber threat and cyber-attack detection and identification services, namely, threat detection concerning viruses, worms, Trojans, spyware, adware, malware, and unauthorized data, programs, and presence on computers and software systems; |
Category: | ANALYTICAL |
Brand: |
ATTACKERS ARE PEOPLE |
---|---|
Description: | Computer security consultancy in the field of cybersecurity, namely, technical consultancy related to computer security, development, maintenance and monitoring of security software; computer security consultancy in the field of cybersecurity, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security services, namely, controlling and restricting access to computer networks and protected information; computer security consultancy in the field of cybersecurity, namely, collecting and aggregating data and intelligence; |
Category: | COMPUTER SECURITY CONSULTANCY |
Brand: |
MORPHICK |
---|---|
Description: | Computer security consultancy in the field of cybersecurity, namely, technical consultancy related to computer security, development, maintenance and monitoring of security software; computer security consultancy in the field of cybersecurity, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security services, namely, controlling and restricting access to computer networks and protected information; computer security consultancy in the field of cybersecurity, namely, collecting and aggregating data and intelligence; |
Category: | COMPUTER SECURITY CONSULTANCY |
Brand: |
WIN EVERY ATTACK |
---|---|
Description: | Information technology (IT) security appliances, namely, hardware for use in protecting and maintaining information technology security and in responding to and preventing breaches of information technology security; |
Category: | INFORMATION TECHNOLOGY IT SECURITY APPLIANCES |
Brand: |
WIN EVERY ATTACK |
---|---|
Description: | Monitoring of computer systems for security purposes; Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts; Providing methods and procedures for the management of computer and network threats, namely, surveillance and monitoring of security problems and vulnerabilities in computer hardware, networks, and software;Information technology (IT) security services, namely, computer consultation in the field of computer and network security and in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Information technology (IT) security services, namely, computer services that provide online scanning, detecting, quarantining, and eliminating of viruses, worms, Trojans, spyware, adware, malware, and unauthorized data and programs on computers, networks, and electronic devices; Information technology (IT) security services, namely, computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; Information technology (IT) security services, namely, technical support services in the field of computer network security, namely, troubleshooting of computer hardware and software problems, and identifying technical solutions for computer network security problems; Computer services, namely, management of the information technology (IT) systems of others; Computer services, namely, management of information technology (IT) security for others, namely, managing the computer networks of others to provide protection from computer network intrusions, to detect computer network intrusions, to alert the customer as to computer network intrusions, to respond to computer network intrusions, to eliminate computer network intrusions, and to prevent computer network intrusions, all in connection with computer network security systems; Software as a service (SAAS) services featuring software for use in protecting and maintaining information technology security and in responding to and preventing breaches of information technology security; |
Category: | MONITORING COMPUTER SYSTEMS |
Brand: |
WIN EVERY ATTACK |
---|---|
Description: | Information technology (IT) security software, namely, computer software for use in protecting and maintaining information technology security and in responding to and preventing breaches of information technology security; |
Category: | INFORMATION TECHNOLOGY IT SECURITY SOFTWARE |