Reliaquest, LLC

 Reliaquest, LLC contact information is shown below
Owner:RELIAQUEST, LLC
Owner Address:777 S. Harbour Island Blvd., Suite 500 Tampa FL 33602
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byReliaquest, LLC

Brand:

CHASING POSSIBLE

Description:

Computer security consultancy; statement of work driven computer software consulting services; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Managed computer security services delivered through security operations centers, namely, managing and optimizing computer security software, namely, security information and event management (SIEM), firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC), data loss prevention (DLP), application security, endpoint security, and forensics and incident response; Computer services, namely, managing and monitoring computer infrastructure for others; Computer software and hardware design in the nature of advanced content and correlation and advanced engineering to maintain the health of computer infrastructure; Monitoring of computer infrastructure for security purposes delivered through security operations centers;

Category: COMPUTER SECURITY CONSULTANCY
Brand:

EXPONENT

Description:

Educational services, namely, providing training in the form of seminars and workshops in the field of computer security; educational services, namely, providing training of security professionals for certification in the field of computer security;

Category: EDUCATIONAL SERVICES
Brand:

EXPONENT PRESENTED BY RELIAQUEST

Description:

Educational services, namely, providing training in the form of seminars and workshops in the field of computer security; educational services, namely, providing training of security professionals for certification in the field of computer security;The mark consists of the word EXPONENT in white with an arrowhead made of eight connected triangles above the T. The arrowhead is green on the upper left and gradually transitions to teal then to blue on the lower right. The phrase PRESENTED BY RELIAQUEST is in white below. The color black appearing in the mark represents background or transparent area and is not a part of the mark.;EXPONENT PRESENTED BY RELIA QUEST; EXPONENT PRESENTED BY RELIABLE QUEST;The color(s) white, green, black, teal, and blue is/are claimed as a feature of the mark.;PRESENTED BY;

Category: EDUCATIONAL SERVICES
Brand:

GREYFORM

Description:

GREY FORM;Platform as a service (PAAS) featuring software platforms for incorporating existing security technologies while providing visibility and access to all other data;

Category: GREY FORM
Brand:

GREYMATTER

Description:

GREY MATTER;Platform as a service (PAAS) featuring cyber security software platforms for organizational security surveillance that allow for the use of practical and accurate algorithms to automate the filtering process around event types that are less relevant and less actionable to security that are not necessary to process in traditional security technologies, namely, the security information and event management (SIEM) and to learn the difference between normal and abnormal user behavior, specific to the cyber security posture distinctive to the organization;

Category: GREY MATTER
Brand:

GREYMATTER

Description:

The mark consists of literal element GREYMATTER in black with an arrowhead made of eight connected triangles above the T. The arrowhead is green and gradually transitions to teal then to blue. The color white appearing in the mark represents background or transparent area and is not a part of the mark.;GREY MATTER;The color(s) green, black, teal and blue is/are claimed as a feature of the mark.;Platform as a service (PAAS) featuring cyber security software platforms for organizational security surveillance that allow for the use of practical and accurate algorithms to automate the filtering process around event types that are less relevant and less actionable to security that are not necessary to process in traditional security technologies, namely, the security information and event management (SIEM) and to learn the difference between normal and abnormal user behavior, specific to the cyber security posture distinctive to the organization;

Category: