SECLAB FR

 SECLAB FR contact information is shown below
Owner:SECLAB FR
Owner Address:40 rue Theroigne de Mericourt Montpellier 34000 France
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned bySECLAB FR

Brand:

DENELIS

Description:

Scientific, checking and supervision apparatus and instruments for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer networks security, namely, computer software, sensing and signaling devices, encoding and decoding apparatus for controlling network attacks; apparatus for recording, transmission or reproduction of sound or images; blank magnetic recording media; blank optical or sound recording disks; computers; data processing equipment, namely, computers, computer peripherals, electronic modules, telecommunication apparatus comprising communication hub, communication software, digital transmitter, optical data link, optical receiver and transceiver; computer hardware for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; software programs, particularly software for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; tablet computers; smartphones; electronic book readers; computer software, namely, for computer security and protection of computer network; encoded integrated circuit cards in the nature of smart cards containing programming used for controlling computer network attacks;Telecommunications, namely, providing electronic telecommunication connections, providing data transmission and reception services via telecommunication means, providing telecommunications routing and junction gateway services in the field of computer networks security; communications via computer terminals; communications by fiber optic networks, by computer networks, and by global computer networks; provision of telecommunication connections between computer networks; rental of telecommunication apparatus; providing transmission of information between computer networks by cable, wireless and electronic communication networks;Scientific and technical research in the field of network attacks and computer network security; design and development of computers and computer programs; research and development of new products for others; conducting technical project studies, namely, conducting technology feasibility studies in the fields of computer security and protection of computer networks; computer software design, installation of computer software, updating of computer software, rental of computer software, maintenance of computer software, namely, computer software for computer security and protection of computer networks; computer programming; computer system analysis; conversion of computer programs and data, not physical conversion; rental of computer hardware, computers, computer peripheral devices, electrical terminal boxes, data storage apparatus and software for computer networks; consultancy relating to computer, software and computer hardware and device design and development; cloud computing, namely, clouding hosting provider services; information technology consultancy, particularly in the field of computer security and computer networks; authentication of works of art; electronic data storage; scanning, namely, digitization of documents; software as a service (SaaS) for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security;

Category: SCIENTIFIC
Brand:

SECLAB

Description:

The mark consists of the term SECLAB to the left of a stylized butterfly design.;Scientific, checking and supervision apparatus and instruments for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer networks security, namely computer software, sensing and signaling devices, encoding and decoding apparatus for controlling network attacks; apparatus for recording, transmission or reproduction of sound or images; blank magnetic recording media, blank optical or sound recording disks; computers, data processing equipment, namely, computers, computer peripherals, electronic modules, telecommunication apparatus comprising communication hub, communication software, digital transmitter, optical data link, optical receiver and transceiver, and computer hardware for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; electronic tablets, smartphones, e-book readers; software programs, particularly software for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; computer peripheral devices; blank memory cards; integrated circuit cards;Telecommunications, namely, providing electronic telecommunication connections, providing data transmission and reception services via telecommunication means, providing telecommunications routing and junction gateway services in the field of computer networks security; communications via computer terminals, fiber-optic networks, computer networks, and hardware and devices for computer security networks; provision of telecommunication connections between computer networks; rental of telecommunication apparatus; Providing transmission of information between computer networks by cable, wireless and electronic communication networks; lending and rental of telecommunication apparatus;Color is not claimed as a feature of the mark.;Scientific and technical research in the field of network attacks and computer network security; design and development of computers and software; research and development of new products for others; computer and technical project studies particularly in the field of computer security and computer networks; design, installation, development, enhancement, updating, rental and maintenance of software particularly of software for computer security and for protecting computer networks; computer programming; computer system analysis; design of computer systems; conversion of computer programs and data other than physical conversion; conversion of data or documents from physical to electronic media, as well as between electronic media; lending and rental of hardware namely computers, computer peripherals, electronic modules, storage apparatus and devices computer hardware for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; consultancy relating to computer, software and computer hardware and device design and development; digitization of documents; software as a service (SaaS) for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; cloud computing namely, clouding hosting provider services; information technology consultancy, particularly in the field of computer security and computer networks; authentication of works of art; electronic data storage;

Category: