Strix Security, Inc.

 Strix Security, Inc. contact information is shown below
Owner:STRIX SECURITY, INC.
Owner Address:14402 Haystack Court Centreville VA 20120
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byStrix Security, Inc.

Brand:

SECURING THE WORLD

Description:

Color is not claimed as a feature of the mark.;Monitoring of computer systems for security purposes ; Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity ; Consultation in the field of data theft and identity theft ; Consultation services concerning homeland safety and security issues ; Consulting services in the field of maintaining the security and integrity of databases ; Consulting services in the field of national security ; Consulting services in the field of homeland security ; Consulting services in the field of counter-terrorism ; Control of building environmental access and security systems ; Emergency response alarm monitoring services, namely, monitoring of alert devices by a remote monitoring center for the dispatch of emergency public health and security services and notification to third parties ; Fraud detection services in the field of digital equipment ; Forensic analysis of surveillance video for fraud and theft prevention purposes ; Interment services ; Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates ; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates ; Monitoring alarms ; Monitoring burglar and security alarms ; Monitoring e-mails from subscribers and notifying subscriber-selected emergency responders ; Monitoring e-mails from subscribers and notifying subscriber-selected responders in emergency situations where subscribers' health or welfare is at risk ; Monitoring fire alarms ; Monitoring Internet activity to prevent illegal file sharing and providing electronic reports to others regarding attempts at illegal file sharing in connection therewith ; Monitoring of digital sensors for security purposes ; Monitoring of credit reports, the Internet, and public records to facilitate the detection and prevention of identity theft and fraud ; Monitoring of security systems ; Security consultancy ; Security inspection services for others ; Security services, namely, providing security assessments of physical locations, information systems, and working environments ; Security services, namely, providing a website notifying individuals of a changed status or condition of a sensing device in a security system via electronic message alerts ; Surveillance services;Computer security consultancy ; Computer consultation in the field of computer security ; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability ; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities ; Computer security service, namely, hard drive erasure ; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials ; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices ; Accreditation services, namely, developing, evaluating, and testing standards for digital devices for the purpose of accreditation ; Accreditation services, namely, setting and providing standards for digital devices for the purpose of accreditation ; Accreditation services, namely, evaluating organizations to determine whether the organizations conform to an established standard ; Advice relating to the design of computer hardware ; Cloud computing featuring software for use in monitoring remote sensors and alarms ; Computer disaster recovery planning ; Computer forensic services ; Computer hardware and software design ; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts ; Computer network configuration services ; Computer network design for others ; Computer network design and computer software design for the use of logical and physical security ; Computer programming consultancy ; Computer services, namely, encrypted data recovery services ; Computer services, namely, remote management of the information technology (IT) systems of others ; Computer services, namely, on-site management of information technology (IT) systems ; Consulting services in the field of testing of electronic components and electronic systems ; Data encryption and decoding services ; Design and development of electronic data security systems ; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management ; Development of security systems and contingency planning for information systems ; Development of voluntary standards for information security ; Maintenance of computer software relating to computer security and prevention of computer risks ; Providing a website featuring technology enabling users to remotely view, monitor, program, operate and control large and small appliances, electrical systems and security systems in homes, offices and vehicles ; Rental of computers relating to computer security and prevention of computer risks ; Research in the field of intelligence and security technology ; Software development in the field of logical and physical security ; Technology consultation in the field of logical and physical security ; Testing of security systems ; Updating of computer software relating to computer security and prevention of computer risks;

Category: COLOR NOT CLAIMED AS
Brand:

STRIX SECURITY

Description:

Monitoring of computer systems for security purposes; Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consultation in the field of data theft and identity theft; Consultation services concerning homeland safety and security issues; Consulting services in the field of maintaining the security and integrity of databases; Consulting services in the field of national security; Consulting services in the field of homeland security; Consulting services in the field of counter-terrorism; Control of building environmental access and security systems; Emergency response alarm monitoring services, namely, monitoring of alert devices by a remote monitoring center for the dispatch of emergency public health and security services and notification to third parties; Fraud detection services in the field of digital equipment; Forensic analysis of surveillance video for fraud and theft prevention purposes; Interment services; Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Monitoring alarms; Monitoring burglar and security alarms; Monitoring e-mails from subscribers and notifying subscriber-selected emergency responders; Monitoring e-mails from subscribers and notifying subscriber-selected responders in emergency situations where subscribers' health or welfare is at risk; Monitoring fire alarms; Monitoring Internet activity to prevent illegal file sharing and providing electronic reports to others regarding attempts at illegal file sharing in connection therewith; Monitoring of digital sensors for security purposes; Monitoring of credit reports, the Internet, and public records to facilitate the detection and prevention of identity theft and fraud; Monitoring of security systems; Security consultancy; Security inspection services for others; Security services, namely, providing security assessments of physical locations, information systems, and working environments; Security services, namely, providing a website notifying individuals of a changed status or condition of a sensing device in a security system via electronic message alerts; Surveillance services;SECURITY;Computer security consultancy; Computer consultation in the field of computer security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security service, namely, hard drive erasure; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Accreditation services, namely, developing, evaluating, and testing standards for digital devices for the purpose of accreditation; Accreditation services, namely, setting and providing standards for digital devices for the purpose of accreditation; Accreditation services, namely, evaluating organizations to determine whether the organizations conform to an established standard; Advice relating to the design of computer hardware; Cloud computing featuring software for use in monitoring remote sensors and alarms; Computer disaster recovery planning; Computer forensic services; Computer hardware and software design; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts (quality control); Computer network configuration services; Computer network design for others; Computer network design and computer software design for the use of logical and physical security; Computer programming consultancy; Computer services, namely, encrypted data recovery services; Computer services, namely, remote management of the information technology (IT) systems of others; Computer services, namely, on-site management of information technology (IT) systems; Consulting services in the field of testing of electronic components and electronic systems; Data encryption and decoding services; Design and development of electronic data security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of voluntary standards for information security; Maintenance of computer software relating to computer security and prevention of computer risks; Providing a website featuring technology enabling users to remotely view, monitor, program, operate and control large and small appliances, electrical systems and security systems in homes, offices and vehicles; Rental of computers relating to computer security and prevention of computer risks; Research in the field of intelligence and security technology; Software development in the field of logical and physical security; Technology consultation in the field of logical and physical security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks;

Category: MONITORING COMPUTER SYSTEMS