FindOwnerSearch
Brands and Their Owners
TXONE NETWORKS INC. contact information is shown below | |
Owner: | TXONE NETWORKS INC. |
---|---|
Owner Address: | 5 F., No. 6, Lixing 6th Rd., East Dist., Hsinchu City 300096 Taiwan |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
EDGEFIRE |
---|---|
Description: | computer hardware; downloadable computer security software; computer hardware, namely, firewalls; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, reporting on, patching and repairing security breaches in data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for monitoring data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for segmenting and protecting data, computers, computer and communication networks and network endpoints;EDGE FIRE; |
Category: | COMPUTER HARDWARE |
Brand: |
EDGEIPS |
---|---|
Description: | computer hardware; downloadable computer security software; computer hardware, namely, firewalls; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, reporting on, patching and repairing security breaches in data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for monitoring data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for segmenting and protecting data, computers, computer and communication networks and network endpoints; |
Category: | COMPUTER HARDWARE |
Brand: |
STELLARENFORCE |
---|---|
Description: | Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things (IOT) security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable computer software for whitelisting, approving and trusting other software, hardware and peripherals; downloadable computer software for blocking and blacklisting other software, hardware and peripherals; downloadable computer software for scanning, monitoring, verifying and permitting or blocking other computer software, hardware and peripherals; downloadable computer software for monitoring, segmenting and locking down data, computers, computer hardware, and network endpoints;STELLAR ENFORCE; |
Category: | DOWNLOADABLE COMPUTER SECURITY SOFTWARE |
Brand: |
STELLARONE |
---|---|
Description: | Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things (IOT) security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable anti-virus software; downloadable anti-malware software; downloadable computer software for Industrial Control Systems (ICS) application inventory monitoring and management; downloadable computer software for scanning for, detecting, identifying, and blocking malware, security threats and security breaches; downloadable computer software for patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software for providing virus and malware pattern updates; downloadable computer software for whitelisting, approving and trusting other software, hardware and peripherals; downloadable computer software for blocking and blacklisting other software, hardware and peripherals; downloadable computer software for scanning, monitoring, verifying and permitting or blocking other computer software, hardware and peripherals; downloadable computer software for monitoring, segmenting and locking down data, computers, computer hardware, and network endpoints;STELLAR ONE; |
Category: | DOWNLOADABLE COMPUTER SECURITY SOFTWARE |
Brand: |
STELLARPROTECT |
---|---|
Description: | Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things (IOT) security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable anti-virus software; downloadable anti-malware software; downloadable computer software for Industrial Control Systems (ICS) application inventory monitoring and management; downloadable computer software for scanning for, detecting, identifying, and blocking malware, security threats and security breaches; downloadable computer software for patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software for providing virus and malware pattern updates;STELLAR PROTECT; |
Category: | DOWNLOADABLE COMPUTER SECURITY SOFTWARE |
Brand: |
TXONE |
---|---|
Description: | TX ONE;Software as a service (SAAS) services featuring computer security software; providing online non-downloadable computer security software; software as a service (SAAS) services featuring computer firewall software; providing online non-downloadable computer firewall software; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer and network security policy management and enforcement; providing online non-downloadable software for computer and network security policy management and enforcement; software as a service (SAAS) services featuring computer software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for monitoring, segmenting and locking down data and computers; providing online non-downloadable software for monitoring, segmenting and locking down data and computers; software as a service (SAAS) services featuring computer software for securing industrial machinery, industrial control systems and manufacturing; providing online non-downloadable software for securing industrial machinery, industrial control systems and manufacturing; software as a service (SAAS) services featuring IOT security software; providing online non-downloadable IOT security software; software as a service (SAAS) services featuring security software for Industrial Control Systems (ICS); providing online non-downloadable security software for Industrial Control Systems (ICS); software as a service (SAAS) services featuring computer software for network and device security; providing online non-downloadable software for network and device security; software as a service (SAAS) services featuring virtual server software; providing online non-downloadable virtual server software; software as a service (SAAS) services featuring computer utility software; providing online non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for application whitelisting and blacklisting; providing online non-downloadable software for application whitelisting and blacklisting; software as a service (SAAS) services featuring computer software for providing virus and malware pattern updates; providing online non-downloadable software for providing virus and malware pattern updates; software as a service (SAAS) services featuring computer software for computer network management and configuration; providing online non-downloadable software for computer network management and configuration; software as a service (SAAS) services featuring computer software for managing computer hardware, switches and routers; providing online non-downloadable software for managing computer hardware, switches and routers; software as a service (SAAS) services featuring web consoles; providing online non-downloadable software, namely, web consoles; design and development of computer hardware and software; computer software consulting services; computer network consulting services; computer hardware consulting services; information technology consulting services; consulting services in the field of cloud computing; consulting in the field of cloud computing networks and applications; consulting services in the fields of computer software and software as a service; consulting services in the fields of computers, computer hardware, computer networks and network security; consulting services in the fields of industrial control systems and manufacturing computer hardware and software security, IOT security hardware and software; consultation in deploying and managing computer security hardware, software and network components; computer network and software consultation services for securing industrial machinery; custom configuration of computer software, computer hardware and computer networks; developing and deploying customized computer hardware and software in the fields of computer software, data and network security; technical support services, namely, troubleshooting and remediation of computer software, SAAS, computer hardware and network problems; technical support services, namely, computer network security incident response and remediation services; technical support services in the fields of computers, computer hardware, computer networks, network security and network architecture; technical support services in the fields of industrial control systems and manufacturing security, IOT security hardware and software; technical support services, namely, administration, management and updating of computers, computer hardware, computer software and computer networks; technical support services, namely, conducting onsite visits and review existing network environment, and consulting on computer network security and assisting with installation of computer hardware and software and network components; providing virtual computer systems and virtual computer environments through cloud computing; providing virtual security appliances, namely, virtual hardware and software for securing and protecting computers, computer hardware, industrial machinery and computer networks; |
Category: | TX ONE |
Brand: |
TXONE |
---|---|
Description: | Computer hardware; computer networking hardware; computer hardware, namely, firewalls; downloadable computer security software; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software and hardware for monitoring, segmenting and locking down data and computers; downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; IOT security software; downloadable security software for Industrial Control Systems (ICS); web consoles; downloadable computer software for network and device security; downloadable virtual server software; downloadable computer utility software; downloadable computer software for application whitelisting and blacklisting; downloadable computer software for providing virus and malware pattern updates; downloadable computer software for computer network management and configuration; downloadable computer software for managing computer hardware, switches and routers; USB flash drives; portable computer security hardware; portable computer hardware, peripherals and USB drives containing computer security software, computer antivirus, anti-spam, anti-malware and anti-ransomware software; portable computer hardware, peripherals and USB drives containing computer software for use in scanning for, identifying, reporting and removing malware, viruses; computer peripherals; computer peripheral devices; computer network switches;TX ONE; |
Category: | COMPUTER HARDWARE |
Brand: |
TXONE EDGEONE |
---|---|
Description: | computer hardware; computer software; software for information security; network firewall; computer firewall;TXONE EDGE ONE;designing of computer program; computer data processing; quality testing of products; designing of computer software; updating of computer software; consultancy of computer software design; analysis of computer system; designing of computer system; installation of computer software; providing temporary use of online non-downloadable computer software; recovery of computer data; conversion of physical data or documents into electronic carriers; conversion of non-physical computer programs and data; establishing and maintaining websites for others; managing host computer for others; managing servers for others; network authentication services; network security management services; consultancy of computer security; consultancy of computer data security; consultancy of network security; consultancy of designing and development of computer hardware; consultancy of computer technology; remote monitoring of computer systems; monitoring of computer systems for detecting faults; monitoring of computer systems for detecting unauthorized access or data leakage; providing information regarding computer technology and program designing via websites; cloud computing; software as a service (SaaS); providing information technology services through outsourcing; platform as a service (PaaS); development of computer platforms; consultancy of telecommunication network security; computer virus protection services; |
Category: | COMPUTER HARDWARE |
Brand: |
TXONE NETWORKS |
---|---|
Description: | The mark consists of one incomplete and four complete horizontal line in red, with a solid red circle at the left end of each line, two complete lines and two incomplete lines in white, each with a solid red circle at the left end of the line, all converging to form a right facing or forward facing arrow in red, adjacent to the word txOne in black appearing over the word networks in black.;The color(s) red, white and black is/are claimed as a feature of the mark.;NETWORKS;software as a service (SAAS) services featuring computer security software; providing online non-downloadable computer security software; software as a service (SAAS) services featuring computer firewall software; providing online non-downloadable computer firewall software; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer and network security policy management and enforcement; providing online non-downloadable software for computer and network security policy management and enforcement; software as a service (SAAS) services featuring computer software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for monitoring, segmenting and locking down data and computers; providing online non-downloadable software for monitoring, segmenting and locking down data and computers; software as a service (SAAS) services featuring computer software for securing industrial machinery, industrial control systems and manufacturing; providing online non-downloadable software for securing industrial machinery, industrial control systems and manufacturing; software as a service (SAAS) services featuring IOT security software; providing online non-downloadable IOT security software; software as a service (SAAS) services featuring security software for Industrial Control Systems (ICS); providing online non-downloadable security software for Industrial Control Systems (ICS); software as a service (SAAS) services featuring computer software for network and device security; providing online non-downloadable software for network and device security; software as a service (SAAS) services featuring virtual server software; providing online non-downloadable virtual server software; software as a service (SAAS) services featuring computer utility software; providing online non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for application whitelisting and blacklisting; providing online non-downloadable software for application whitelisting and blacklisting; software as a service (SAAS) services featuring computer software for providing virus and malware pattern updates; providing online non-downloadable software for providing virus and malware pattern updates; software as a service (SAAS) services featuring computer software for computer network management and configuration; providing online non-downloadable software for computer network management and configuration; software as a service (SAAS) services featuring computer software for managing computer hardware, switches and routers; providing online non-downloadable software for managing computer hardware, switches and routers; software as a service (SAAS) services featuring web consoles; providing online non-downloadable software, namely, web consoles; design and development of computer hardware and software; computer software consulting services; computer network consulting services; computer hardware consulting services; information technology consulting services; consulting services in the field of cloud computing; consulting in the field of cloud computing networks and applications; consulting services in the fields of computer software and software as a service; consulting services in the fields of computers, computer hardware, computer networks and network security; consulting services in the fields of industrial control systems and manufacturing computer hardware and software security, IOT security hardware and software; consultation in deploying and managing computer security hardware, software and network components; computer network and software consultation services for securing industrial machinery; custom configuration of computer software, computer hardware and computer networks; developing and deploying customized computer hardware and software in the fields of computer software, data and network security; technical support services, namely, troubleshooting and remediation of computer software, SAAS, computer hardware and network problems; technical support services, namely, computer network security incident response and remediation services; technical support services in the fields of computers, computer hardware, computer networks, network security and network architecture; technical support services in the fields of industrial control systems and manufacturing security, IOT security hardware and software; technical support services, namely, administration, management and updating of computers, computer hardware, computer software and computer networks; technical support services, namely, conducting onsite visits and review existing network environment, and consulting on computer network security and assisting with installation of computer hardware and software and network components; providing virtual computer systems and virtual computer environments through cloud computing; providing virtual security appliances, namely virtual hardware and software for securing and protecting computers, computer hardware, industrial machinery and computer networks; |
Category: |