Sandbox Technologies, Inc.

 Sandbox Technologies, Inc. contact information is shown below
Owner:SANDBOX TECHNOLOGIES, INC.
Owner Address:Suite 605 4111 West Alameda Ave Burbank CA 91505
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned bySandbox Technologies, Inc.

Brand:

CMSP

Description:

Full service information technology services, namely, providing outsourced support services, in the field of information technology services; full service information technology services, namely, providing outsourced support services, in the field of information technology services on a per project basis; full service information technology services, namely, providing outsourced support services, in the field of information technology services on an ongoing basis; computer technology support services, namely, help desk services; computer and network security services, namely, implementation and management of security-related equipment, security-related software, and security-related computer systems designed for the purpose of restricting access to computer systems, computer networks, web sites, digital media, and facilities by unauthorized actors;

Category: FULL SERVICE INFORMATION TECHNOLOGY SERVICES
Brand:

CONCIERGE LEVEL

Description:

procurement services, namely, the procurement of computer hardware and software for others; moving and relocation services, namely, administrative planning and implementing of the move of IT infrastructure equipment of businesses; providing virtual online office support staff for others;IT consulting services; remote monitoring services, namely remote monitoring and management of computers and related peripheral and storage devices for purposes of identifying potential problems; computer and network security services, namely implementation and management of security-related equipment, software, and systems designed for the purpose of restricting access to and by computer networks to and of undesired computer networks to and of undesired websites, media, and individuals and facilities, review and remediation of security alerts generated by Security Event Information Management (SIEM) systems, conducting audits of information security systems, and performing penetration testing to identify potential information security vulnerabilities; off-site data backup services; remote computer backup services; computer co-location services, namely, providing facilities for the location of computer services with the equipment of others;

Category: PROCUREMENT SERVICES
Brand:

CONCIERGE MANAGED SERVICES

Description:

Information technology services, namely, providing full service outsourced information technology services; Information technology services, namely, providing full service outsourced information technology services on a per project basis; Information technology services, namely, providing full service outsourced information technology services on an ongoing basis; Computer technology support services, namely, help desk services; Computer and network security services, namely, implementation and management of security-related equipment, software, and systems;

Category: INFORMATION TECHNOLOGY SERVICES
Brand:

CONSTRUCTIT

Description:

CONSTRUCT IT;procurement services, namely, the procurement of computer hardware and software for others; moving and relocation services, namely, administrative planning and implementing of the move of IT infrastructure equipment of businesses; providing virtual online office support staff for others;IT consulting services; remote monitoring services, namely remote monitoring and management of computers and related peripheral and storage devices for purposes of identifying potential problems; computer and network security services, namely implementation and management of security-related equipment, software, and systems designed for the purpose of restricting access to and by computer networks to and of undesired computer networks to and of undesired websites, media, and individuals and facilities, review and remediation of security alerts generated by Security Event Information Management (SIEM) systems, conducting audits of information security systems, and performing penetration testing to identify potential information security vulnerabilities; off-site data backup services; remote computer backup services; computer co-location services, namely, providing facilities for the location of computer services with the equipment of others;

Category: CONSTRUCT IT
Brand:

EGP CLOUD

Description:

ENTERPRISE GROWTHPATH CLOUD;CLOUD;Information technology consulting services, namely, cloud strategy consulting and advisory services; Information technology consulting services, namely, evaluation of conventional information technology infrastructures; Information technology consulting services, namely, development of cloud implementation and migration strategies; Information technology consulting services, namely, implementation of cloud solutions; Information technology consulting services, namely, migration of existing information technology systems to cloud-based solutions; Technical support services, namely, providing infrastructure administration to aid in managing and securing cloud-based computing solutions for others; Information technology consulting services, namely, oversight of cloud-based solutions; Information technology consulting services in the nature of cloud computer security auditing services; Information technology consulting services, namely, penetration testing of cloud computers and remote networks to assess information security vulnerability;

Category: ENTERPRISE GROWTHPATH CLOUD
Brand:

EGP SECURE

Description:

Installation of computer hardware for the creation of firewalls;SECURE;Information technology consulting in the nature of computer security auditing services; computer security services in the nature of penetration testing of computers and networks to assess information security vulnerability; installation of computer software for the creation of firewalls; computer security services in the nature of identifying and preventing phishing attacks;

Category: INSTALLATION COMPUTER HARDWARE
Brand:

ENTERPRISE GROWTHPATH

Description:

IT training services;ENTERPRISE GROWTH PATH;procurement services, namely, the procurement of computer hardware and software for others; moving and relocation services, namely, administrative planning and implementing of the move of IT infrastructure equipment of businesses; providing virtual online office support staff for others;ENTERPRISE;IT consulting services; remote monitoring services, namely remote monitoring and management of computers and related peripheral and storage devices for purposes of identifying potential problems; computer and network security services, namely implementation and management of security-related equipment, software, and systems designed for the purpose of restricting access to and by computer networks to and of undesired computer networks to and of undesired websites, media, and individuals and facilities, review and remediation of security alerts generated by Security Event Information Management (SIEM) systems, conducting audits of information security systems, and performing penetration testing to identify potential information security vulnerabilities; off-site data backup services; remote computer backup services; computer co-location services, namely, providing facilities for the location of computer services with the equipment of others;

Category: IT TRAINING SERVICES
Brand:

SANDBOX TECHNOLOGIES

Description:

IT training services;procurement services, namely, the procurement of computer hardware and software for others; moving and relocation services, namely, administrative planning and implementing of the move of IT infrastructure equipment of businesses; providing virtual online office support staff for others;TECHNOLOGIES;IT consulting services; remote monitoring services, namely remote monitoring and management of computers and related peripheral and storage devices for purposes of identifying potential problems; computer and network security services, namely implementation and management of security-related equipment, software, and systems designed for the purpose of restricting access to and by computer networks to and of undesired computer networks to and of undesired websites, media, and individuals and facilities, review and remediation of security alerts generated by Security Event Information Management (SIEM) systems, conducting audits of information security systems, and performing penetration testing to identify potential information security vulnerabilities; off-site data backup services; remote computer backup services; computer co-location services, namely, providing facilities for the location of computer services with the equipment of others;

Category: IT TRAINING SERVICES