Brands and Their Owners
Red 5 Holdings, Inc. contact information is shown below | |
Owner: | RED 5 HOLDINGS, INC. |
---|---|
Owner Address: | 1420 Beverly Road, Suite 270 McLean VA 22101 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
5 |
---|---|
Description: | educational services, namely, conducting classes, seminars, conferences, and workshops in the field of security, and distributing course materials in connection therewith; educational services, namely, conducting online classes, seminars, conferences, and workshops in the field of security, and distributing course materials in connection therewith;The mark consists of a shield with the number five in the center and a sword going over the top of the number five and then under the upper curve of the number five and then over the bottom curve of the number five.;FIVE;Color is not claimed as a feature of the mark.;arranging for others the repair and replacement of home security systems; business assistance, advisory and consulting services in the field of the Foreign Corrupt Practices Act (FCPA) industry, only for business and commercial purposes; business risk assessment services;security guard services; security guarding for facilities; security services, namely, armed escorts and security personnel for protecting personal property of various individuals and businesses; security services, namely, providing executive protection; security threat analysis for protecting personal property; consultancy services in the field of home security; personal security consultation; physical security consultancy; providing security surveillance of premises for others; providing information in the field of personal physical security; physical security audits being a security threat analysis for protecting personal property and public safety; corporate security services namely, physical security audits, threat assessments, information technology security audits, executive protection programs, technical countermeasure security programs and security contingency planning all in the nature of being a security threat analysis for protecting personal property and public safety; Security due diligence services for individuals or businesses in the nature of detailed security briefings, vetting of local personnel, and providing information on sustainable security measures; threat assessments of Physical security; consulting services in the field of security threat assessment, and threat management for protecting public safety and personal property; remote monitoring of security alarm services for protecting personal property in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing; providing information in the field of emergency response preparedness, personal safety, physical security, and threat assessment of physical security and personal safety; security guard services, namely, intrusion detection services, intrusion prevention services, vulnerability assessment services all for preventing the intrusion of burglars and protecting physical security and personal safety; security services for individuals and business persons traveling internationally and domestically, namely, providing foreign country security briefings, embassy information and security reports for security purposes;computer security consultancy; computer security consultancy in the field of cyber and physical protection; computer security threat analysis for protecting data; data security consultancy; design and development of electronic data security systems; design and development of home security systems; development of security systems and contingency planning for information systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; engineering and system analysis in the field of home security systems; testing of security systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer network and data security services, namely, computer network vulnerability assessment; providing temporary use of non-downloadable computer software for internet security, security vulnerability assessment, and managed security solutions; computer systems and network management for others in the fields of Internet security, security vulnerability assessment, and managed security solutions in the nature of management of wireless computer networks for others; remote monitoring of computer systems and networks for others to ensure internet security and protection from vulnerability from viruses, malware and hackers; providing temporary use of on-line non-downloadable computer software for security awareness training, simulation of security attacks, and vulnerability assessments; conducting security audits of computer network systems in the nature of monitoring technological functions of computer network systems; providing cybersecurity consulting and threat assessment in the nature of computer security threat analysis for protecting data; computer security consultancy services, namely, providing assessment of crisis action planning comprised of cyber security audits to assess computer security vulnerability, vulnerability and threat detection analysis, monitoring of computer systems and computer networks for computer security purposes, computer network traffic monitoring and analysis, computer network identity monitoring and management, computer network access and authentication monitoring and management, and continuity of operations response, namely, conducting recovery operations for the recovery of computers; computer security consulting services in the field of computer security threat assessment for protecting data; |
Category: | EDUCATIONAL SERVICES |
Brand: |
PRIVACY AS A SERVICE |
---|---|
Description: | Building security systems comprising software and hardware for providing picture, video, alarm status, building plans, and other information to a remote station; Electronic video surveillance products, namely, electronic components of security systems; Software for ensuring the security of electronic mail;Arranging for others the repair and replacement of residential appliances, home security systems and consumer goods;Security guard services; Security guarding for facilities; Security services, namely, armed escorts and security personnel for various individuals and businesses; Security services, namely, providing executive protection; Security threat analysis for protecting personal property; Consultancy services in the field of home security; Personal security consultation; Physical security consultancy; Providing security surveillance of premises for others; Providing information in the field of personal physical security;Computer security consultancy; Computer security consultancy in the field of cyber and physical protection; Computer security threat analysis for protecting data; Data security consultancy; Design and development of electronic data security systems; Design and development of home security systems; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Engineering and system analysis in the field of home security systems; Testing of security systems; |
Category: | BUILDING SECURITY SYSTEMS COMPRISING SOFTWARE |
Brand: |
PRIVACY CONCIERGE |
---|---|
Description: | PRIVACY;computer security consultancy; computer security consultancy in the field of cyber and physical protection; computer security threat analysis for protecting data; data security consultancy; development of security systems and contingency planning for information systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; engineering and system analysis in the field of home security systems; testing of security systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer network and data security services, namely, computer network vulnerability assessment; providing temporary use of non-downloadable computer software for internet security, security vulnerability assessment, and managed security solutions; computer systems and network management for others in the fields of Internet security, security vulnerability assessment, and managed security solutions in the nature of management of wireless computer networks for others; remote monitoring of computer systems and networks for others to ensure internet security and protection from vulnerability from viruses, malware and hackers; providing temporary use of on-line non-downloadable computer software for security awareness training, simulation of security attacks, and vulnerability assessments; conducting security audits of computer network systems in the nature of monitoring technological functions of computer network systems; providing cybersecurity consulting and threat assessment in the nature of computer security threat analysis for protecting data; computer security consultancy services, namely, providing assessment of crisis action planning comprised of cyber security audits to assess computer security vulnerability, vulnerability and threat detection analysis, monitoring of computer systems and computer networks for computer security purposes, computer network traffic monitoring and analysis, computer network identity monitoring and management, computer network access and authentication monitoring and management, and continuity of operations response, namely, conducting recovery operations for the recovery of computers; computer security consulting services in the field of computer security threat assessment for protecting data; |
Category: | PRIVACY |
Brand: |
REDFIVE |
---|---|
Description: | educational services, namely, conducting classes, seminars, conferences, and workshops in the field of security, and distributing course materials in connection therewith; educational services, namely, conducting online classes, seminars, conferences, and workshops in the field of security, and distributing course materials in connection therewith;RED FIVE;arranging for others the repair and replacement of home security systems; business assistance, advisory and consulting services in the field of the Foreign Corrupt Practices Act (FCPA) industry, only for business and commercial purposes; business risk assessment services;security guard services; security guarding for facilities; security services, namely, armed escorts and security personnel for protecting personal property of various individuals and businesses; security services, namely, providing executive protection; security threat analysis for protecting personal property; consultancy services in the field of home security; personal security consultation; physical security consultancy; providing security surveillance of premises for others; providing information in the field of personal physical security; physical security audits being a security threat analysis for protecting personal property and public safety; corporate security services namely, physical security audits, threat assessments, information technology security audits, executive protection programs, technical countermeasure security programs and security contingency planning all in the nature of being a security threat analysis for protecting personal property and public safety; Security due diligence services for individuals or businesses in the nature of detailed security briefings, vetting of local personnel, and providing information on sustainable security measures; threat assessments of Physical security; consulting services in the field of security threat assessment, and threat management for protecting public safety and personal property; remote monitoring of security alarm services for protecting personal property in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing; providing information in the field of emergency response preparedness, personal safety, physical security, and threat assessment of physical security and personal safety; security guard services, namely, intrusion detection services, intrusion prevention services, vulnerability assessment services all for preventing the intrusion of burglars and protecting physical security and personal safety; security services for individuals and business persons traveling internationally and domestically, namely, providing foreign country security briefings, embassy information and security reports for security purposes;computer security consultancy; computer security consultancy in the field of cyber and physical protection; computer security threat analysis for protecting data; data security consultancy; design and development of electronic data security systems; design and development of home security systems; development of security systems and contingency planning for information systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; engineering and system analysis in the field of home security systems; testing of security systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer network and data security services, namely, computer network vulnerability assessment; providing temporary use of non-downloadable computer software for internet security, security vulnerability assessment, and managed security solutions; computer systems and network management for others in the fields of Internet security, security vulnerability assessment, and managed security solutions in the nature of management of wireless computer networks for others; remote monitoring of computer systems and networks for others to ensure internet security and protection from vulnerability from viruses, malware and hackers; providing temporary use of on-line non-downloadable computer software for security awareness training, simulation of security attacks, and vulnerability assessments; conducting security audits of computer network systems in the nature of monitoring technological functions of computer network systems; providing cybersecurity consulting and threat assessment in the nature of computer security threat analysis for protecting data; computer security consultancy services, namely, providing assessment of crisis action planning comprised of cyber security audits to assess computer security vulnerability, vulnerability and threat detection analysis, monitoring of computer systems and computer networks for computer security purposes, computer network traffic monitoring and analysis, computer network identity monitoring and management, computer network access and authentication monitoring and management, and continuity of operations response, namely, conducting recovery operations for the recovery of computers; computer security consulting services in the field of computer security threat assessment for protecting data; |
Category: | EDUCATIONAL SERVICES |