MORPHICK, INC.

 MORPHICK, INC. contact information is shown below
Owner:MORPHICK, INC.
Owner Address:4600 Montgomery Road Cincinnati OH 45212
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byMORPHICK, INC.

Brand:

ANALYTICAL PIVOTING

Description:

ANALYTICAL;Cyber threat and cyber-attack detection and identification services, namely, threat detection concerning viruses, worms, Trojans, spyware, adware, malware, and unauthorized data, programs, and presence on computers and software systems;

Category: ANALYTICAL
Brand:

ATTACKERS ARE PEOPLE

Description:

Computer security consultancy in the field of cybersecurity, namely, technical consultancy related to computer security, development, maintenance and monitoring of security software; computer security consultancy in the field of cybersecurity, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security services, namely, controlling and restricting access to computer networks and protected information; computer security consultancy in the field of cybersecurity, namely, collecting and aggregating data and intelligence;

Category: COMPUTER SECURITY CONSULTANCY
Brand:

MORPHICK

Description:

Computer security consultancy in the field of cybersecurity, namely, technical consultancy related to computer security, development, maintenance and monitoring of security software; computer security consultancy in the field of cybersecurity, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security services, namely, controlling and restricting access to computer networks and protected information; computer security consultancy in the field of cybersecurity, namely, collecting and aggregating data and intelligence;

Category: COMPUTER SECURITY CONSULTANCY
Brand:

WIN EVERY ATTACK

Description:

Information technology (IT) security appliances, namely, hardware for use in protecting and maintaining information technology security and in responding to and preventing breaches of information technology security;

Category: INFORMATION TECHNOLOGY IT SECURITY APPLIANCES
Brand:

WIN EVERY ATTACK

Description:

Monitoring of computer systems for security purposes; Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts; Providing methods and procedures for the management of computer and network threats, namely, surveillance and monitoring of security problems and vulnerabilities in computer hardware, networks, and software;Information technology (IT) security services, namely, computer consultation in the field of computer and network security and in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Information technology (IT) security services, namely, computer services that provide online scanning, detecting, quarantining, and eliminating of viruses, worms, Trojans, spyware, adware, malware, and unauthorized data and programs on computers, networks, and electronic devices; Information technology (IT) security services, namely, computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; Information technology (IT) security services, namely, technical support services in the field of computer network security, namely, troubleshooting of computer hardware and software problems, and identifying technical solutions for computer network security problems; Computer services, namely, management of the information technology (IT) systems of others; Computer services, namely, management of information technology (IT) security for others, namely, managing the computer networks of others to provide protection from computer network intrusions, to detect computer network intrusions, to alert the customer as to computer network intrusions, to respond to computer network intrusions, to eliminate computer network intrusions, and to prevent computer network intrusions, all in connection with computer network security systems; Software as a service (SAAS) services featuring software for use in protecting and maintaining information technology security and in responding to and preventing breaches of information technology security;

Category: MONITORING COMPUTER SYSTEMS
Brand:

WIN EVERY ATTACK

Description:

Information technology (IT) security software, namely, computer software for use in protecting and maintaining information technology security and in responding to and preventing breaches of information technology security;

Category: INFORMATION TECHNOLOGY IT SECURITY SOFTWARE