Brands and Their Owners
SMFS, Inc. contact information is shown below | |
Owner: | SMFS, INC. |
---|---|
Owner Address: | 1010 Corporate Drive, Suite 350 Stafford VA 22554 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
CYBER MATURITY BUILDER |
---|---|
Description: | Downloadable computer software that enables users to train, and receive training, in the field of cybersecurity; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE THAT ENABLES |
Brand: |
CYPHY |
---|---|
Description: | Computer security consultancy, namely, risk, vulnerability, and threat management and assessment in the field of vulnerability to breaches of critical infrastructure, industrial control systems, the internet of things, medical IT devices, and connected mobility systems; |
Category: | COMPUTER SECURITY CONSULTANCY |
Brand: |
GRIMM |
---|---|
Description: | Technical consulting in the field of cybersecurity risk management training; providing training in the field of cybersecurity;Technology consultation in the field of cybersecurity; computer security consultancy; computer security consultancy, namely, risk, vulnerability, and threat management and assessment in the field of vulnerability to breaches of critical infrastructure, industrial control systems, the internet of things, medical IT devices, and connected mobility systems; computer programming consultancy in the field of cybersecurity; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security threat analysis for protecting data; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; |
Category: | TECHNICAL CONSULTING FIELD |
Brand: |
GRIMM |
---|---|
Description: | Technical consulting in the field of cybersecurity risk management training; providing training in the field of cybersecurity;The mark consists of the stylized wording GRIMM in which the R contains a skull and the I is a scythe.;Technology consultation in the field of cybersecurity; computer security consultancy; computer security consultancy, namely, risk, vulnerability, and threat management and assessment in the field of vulnerability to breaches of critical infrastructure, industrial control systems, the internet of things, medical IT devices, and connected mobility systems; computer programming consultancy in the field of cybersecurity; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security threat analysis for protecting data; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; |
Category: | TECHNICAL CONSULTING FIELD |