Brands and Their Owners
SECURIFY, INC. contact information is shown below | |
Owner: | SECURIFY, INC. |
---|---|
Owner Address: | Suite 200 20425 Stevens Creek Boulevard Cupertino CA 95014 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
SECURIFY |
---|---|
Description: | SECURITY SERVICES, NAMELY, COMPUTER SECURITY CONSULTING, AUDITING OF HARDWARE AND SOFTWARE FOR FRAUD PREVENTION, COMPUTER CRIMES, AND POTENTIAL SECURITY RISKS IN THE NATURE OF BREACHES OF ENCRYPTION, CERTIFICATION, AUTHORIZATION, AUTHENTICATION, DATA SECRECY AND DATE INTEGRITY PROGRAMS ON LOCAL COMPUTER NETWORKS; GLOBAL COMPUTER NETWORK SECURITY SERVICES, NAMELY, AUDITING, MONITORING, AND MAINTENANCE OF ENCRYPTION, CERTIFICATION, AUTHORIZATION, AUTHENTICATION, DATA SECRECY AND DATA INTEGRITY PROGRAMS FOR TRANSMISSION AND EXCHANGE OF DATA ON A GLOBAL COMPUTER NETWORK; AND DESIGN OF COMPUTER SOFTWARE FOR OTHERS; |
Category: | SECURITY SERVICES |
Brand: |
SECURIFY |
---|---|
Description: | Computer software used to detect and respond to threats to computer network security; computer software used to manage, maintain and monitor computer network security, computer network management and computer network maintenance; computer software used to develop and analyze policies used for computer network security, management and maintenance and user manuals provided in connection therewith; |
Category: | COMPUTER SOFTWARE USED DETECT |
Brand: |
SECURIFY SECURVANTAGE STUDIO |
---|---|
Description: | computer software products used to detect and respond to threats to computer network security; computer sofware products used to manage, maintain and monitor computer network security, computer network management and computer network maintenance; computer software products used to develop and analyze policies used for computer network security, management and maintenance and user manuals provided in connection therewith;maintenance of computer hardware and software for computer network management and security, computer network policies, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local computer networks;consulting and support services in the fields of computer network management, computer network monitoring, computer network maintenance, and in the field of policies used for computer network security, management and maintenance; consulting, development and support services in the fields of computer software used to detect and respond to threats to computer network security, computer sofware products used to manage, maintain and monitor computer network security, computer network management and computer network maintenance, computer software products used to develop and analyze policies used for computer network security, management and maintenance and policies used for computer network security, maintenance and management; security services, namely, computer security consulting, testing and monitoring of hardware and software in the fields of computer network management, development, security and maintenance, policies for computer network security, management and maintenance, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local and global computer networks; and design of computer software for others; |
Category: | COMPUTER SOFTWARE PRODUCTS USED |
Brand: |
SECURITY CHAIN MANAGEMENT |
---|---|
Description: | Maintenance of computer hardware for fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity programs on local computer network;MANAGEMENT;Security services, namely, computer security consulting, testing and monitoring of hardware and software for fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity programs on local computer networks; global computer network security services, namely, testing monitoring and maintenance of encryption, certification, authorization, authentication, data secrecy and data integrity programs for transmission and exchange of data on a global computer network; and design of computer software for others; |
Category: | MAINTENANCE COMPUTER HARDWARE |
Brand: |
SECURVANTAGE |
---|---|
Description: | Computer software used to detect and respond to threats to computer network security; computer software used to manage, maintain and monitor computer network security, computer network management and computer network maintenance; computer software used to develop and analyze policies used for computer network security, management and maintenance and user manuals provided in connection therewith;Maintenance of computer software for computer network management and security, computer network policies, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local computer networks; technical support services, namely, troubleshooting of computer hardware and software problems services in the fields of computer network management, computer network monitoring, computer network maintenance, and in the field of policies used for computer network security, management and maintenance and in the fields of computer software used to detect and respond to threats to computer network security, computer software products used to manage, maintain and monitor computer network security, computer network management and computer network maintenance, computer software products used to develop and analyze policies used for computer network security, management and maintenance and policies used for computer network security, maintenance and management; consulting services in the fields of computer network management, computer network monitoring, computer network maintenance, and in the field of policies used for computer network security, management and maintenance; consulting and development services in the fields of computer software used to detect and respond to threats to computer network security, computer software products used to manage, maintain and monitor computer network security, computer network management and computer network maintenance, computer software products used to develop and analyze policies used for computer network security, management and maintenance and policies used for computer network security, maintenance and management; security services, namely, computer security consulting, testing and monitoring of hardware and software in the fields of computer network management, development, security and maintenance, policies for computer network security, management and maintenance, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local and global computer networks; and design of computer software for others; |
Category: | COMPUTER SOFTWARE USED DETECT |
Brand: |
SECURVANTAGE STUDIO |
---|---|
Description: | Computer software used to detect and respond to threats to computer network security; computer software used to manage, maintain and monitor computer network security, computer network management and computer network maintenance; computer software used to develop and analyze policies used for computer network security, management and maintenance and user manuals provided in connection therewith;Maintenance of computer hardware for computer network management and security, computer network policies, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local computer networks;Security services, namely, computer security consulting, and monitoring of hardware and software in the fields of computer network management, development, security and maintenance, policies for computer network security, management and maintenance, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local and global computer networks;Maintenance of computer software for computer network management and security, computer network policies, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local computer networks; technical support services, namely, troubleshooting of computer hardware and software problems services in the fields of computer network management, computer network monitoring, computer network maintenance, and in the field of policies used for computer network security, management and maintenance and in the fields of computer software used to detect and respond to threats to computer network security, computer software products used to manage, maintain and monitor computer network security, computer software products used to manage, maintain and monitor computer network security, computer network management and computer network maintenance, computer software products used to develop and analyze policies used for computer network security, management and maintenance and policies for computer network security, maintenance and management; consulting services in the fields of computer network management, computer network monitoring, computer network maintenance, and in the field of policies used for computer network security, management and maintenance; consulting and development services in the fields of computer software used to detect and respond to threats to computer network security, computer software products used to manage, maintain and monitor computer network security, computer network management and computer network maintenance, computer software products used to develop and analyze policies used for computer network security, management and maintenance and policies used for computer network security, maintenance and management; and design of computer software for others; |
Category: | COMPUTER SOFTWARE USED DETECT |