ONDEFEND HOLDINGS, LLC

 ONDEFEND HOLDINGS, LLC contact information is shown below
Owner:ONDEFEND HOLDINGS, LLC
Owner Address:4215 Southpoint Blvd., Ste. 260 Jacksonville FL 32216
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byONDEFEND HOLDINGS, LLC

Brand:

BLINDSPOT

Description:

Downloadable mobile applications for conducting and coordinating computer network security tests, investigations, breach simulations, and remediation; Downloadable computer software for conducting and coordinating computer network security tests and investigations, breach simulations, and remediation; Downloadable computer security software for tracking and recording employee access to computer networks for information technology security purposes in the fields of personnel management and defense personnel management; Downloadable computer security software for securing online computer networks and electronic mail in the fields of data security, email security, and computer security; Downloadable computer software for personnel management, namely, managing incident reports about information technology security risks, proactively identifying employees in need of early intervention to reduce the risk of computer network security breaches, and tracking and maintaining data about computer network security risks to ensure organizational integrity; Downloadable mobile applications for tracking and recording employee access to computer networks for information technology security purposes in the fields of personnel management and defense personnel management; Downloadable mobile applications for securing online computer networks and electronic mail in the fields of data security, email security, and computer security; Downloadable mobile applications for personnel management, namely, managing incident reports about information technology security risks, proactively identifying employees in need of early intervention to reduce the risk of computer network security breaches, and tracking and maintaining data about computer network security risks to ensure organizational integrity;BLIND SPOT;Software as a service (SAAS) services, namely, hosting software for use by others for conducting and coordinating computer network security tests, investigations, breach simulations, and remediation; Software as a service (SAAS) services, namely, hosting security software for use by others for tracking and recording employee access to computer networks for information technology security purposes in the fields of personnel management and defense personnel management; Software as a service (SAAS) services, namely, hosting security software for use by others for securing online computer networks and electronic mail in the fields of data security, email security, and computer security; Software as a service (SAAS) services, namely, hosting personnel management software for use by others for managing internal incident reports about information technology security risks, tracking employees in need of early intervention to reduce the risk of computer network security breaches, and tracking and maintaining data about computer network security risks to ensure organizational integrity; Performance management consulting services in the field of selection, implementation, and use of computer security software by others in the field of online security, namely, computer security consultancy services; Computer security consultation and development of computer software in the fields of web application security, computer network security, internet website vulnerability management, partner integration security, information security assessment, security audit, and security incident response; Computer network protection and security consultation and management services, namely, computer software design, computer software development and computer system analysis related to web application security; Computer network security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Design and development of security audit software;

Category: DOWNLOADABLE MOBILE APPLICATIONS CONDUCTING
Brand:

CONFIRM4ME

Description:

Downloadable computer software for communication authentication in the fields of data security, email security, and computer security; downloadable mobile applications for communication authentication in the fields of data security, email security, and computer security;CONFIRM FOUR ME;Software as a service (SAAS), namely, hosting software for use by others for communication authentication in the fields of data security, email security, and computer security; Software as a service (SAAS), namely, hosting software for use by others for use in verifying the credibility of an email address; Consulting services in the field of selection, implementation, and use of software for others in the fields of data security, email security, and computer security; Providing on-line non-downloadable software for communication authentication;

Category: DOWNLOADABLE COMPUTER SOFTWARE COMMUNICATION
Brand:

CYBERSURE

Description:

CYBER SURE;Software as a service (SAAS) services featuring non-downloadable software for assessing, managing, tracking, and monitoring information security risks, business risks, governance, regulatory and compliance requirements, and related business processes;

Category: CYBER SURE
Brand:

ONDEFEND

Description:

ON DEFEND;Computer consultation in the field of computer security; Computer consultation in the field of computer and internet security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of computer virus and scanning software; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to hard drives, networks, websites; Computer security services, namely, restricting unauthorized network access by users without credentials;

Category: ON DEFEND