TURING

Welcome to the Brand page for “TURING”, which is offered here for Computer software for analysing, monitoring, auditing and visualizing data and information; computer software for identifying patterns, anomalies and irregular events within data sets; computer software for identifying patterns, anomalies and irregular events in internet traffic; computer software for identifying, monitoring and logging changes of internet user behaviour; computer software for detecting, tracking, preventing and/or identifying fraudulent or criminal activity on the internet; computer software for controlling and preventing access to web sites; downloadable computer software for analysing, monitoring, auditing and visualizing data and information; downloadable computer software for identifying patterns, anomalies and irregular events within data sets; downloadable computer software for identifying patterns, anomalies and irregular events in internet traffic; downloadable computer software for identifying, monitoring and logging changes of internet user behaviour; downloadable computer software for detecting, tracking, preventing and/or identifying fraudulent or criminal activity on the internet; downloadable computer software for controlling and preventing access to web sites; application software for mobile phones and other mobile devices for collecting, monitoring and analysing data, code, information, sound, video, images and text transmitted and received via the internet; application software for mobile phones and other mobile devices for analysing, monitoring, auditing and visualizing data and information; application software for mobile phones and other mobile devices for identifying patterns, anomalies and irregular events within data sets; application software for mobile phones and other mobile devices for identifying patterns, anomalies and irregular events in internet traffic; application software for mobile phones and other mobile devices for identifying, monitoring and logging changes of internet user behaviour; application software for mobile phones and other mobile devices for detecting, tracking, preventing and/or identifying fraudulent or criminal activity on the internet; application software for mobile phones and other mobile devices for controlling and preventing access to web sites; computer software for collecting, monitoring and analysing data, code, information, sound, video, images and text transmitted and received via the internet; computer and internet security software;provision of telecommunication access and links to computer databases and to the internet; communication by computer terminals; providing and leasing access time to computer databases and computer network access services;software as a service for analysing, monitoring, auditing and visualizing data and information; software as a service for identifying patterns, anomalies and irregular events within data sets; software as a service for identifying patterns, anomalies and irregular events in internet traffic; software as a service for identifying, monitoring and logging changes of internet user behaviour; software as a service for detecting, tracking, preventing and identifying fraudulent or criminal activity on the internet; software as a service for controlling and preventing access to web sites; software as a service for the collection, monitoring and analysis of data, code, information, sound, video, images and text transmitted and received via the internet; collecting, monitoring and analysing data, code, information, sound, video, images and text transmitted and received via the internet for the purposes of internet security and for detecting, tracking, preventing and identifying fraudulent or criminal activity on the internet; computer services, computer programming services and computing resource services; computer data security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials and monitoring and auditing access to data; provision of security services for computer networks, restricting access to and by computer networks to and of undesired websites, media and individuals; computer encryption services, data encryption and data decryption; malware and spyware detection services; computer data recovery services; computer software design services; information, advisory and consultancy services relating to the aforesaid; information, advisory and consultancy services in the fields of computer and internet security;.

Its status is currently believed to be active. Its class is unavailable. “TURING” is believed to be currently owned by “Nominet UK”.

Owner:
NOMINET UK
Owner Details
Description:
Computer software for analysing, monitoring, auditing and visualizing data and information; computer software for identifying patterns, anomalies and irregular events within data sets; computer software for identifying patterns, anomalies and irregular events in Internet traffic; computer software for identifying, monitoring and logging changes of Internet user behaviour; computer software for detecting, tracking, preventing and/or identifying fraudulent or criminal activity on the internet; computer software for controlling and preventing access to web sites; downloadable computer software for analysing, monitoring, auditing and visualizing data and information; downloadable computer software for identifying patterns, anomalies and irregular events within data sets; downloadable computer software for identifying patterns, anomalies and irregular events in Internet traffic; downloadable computer software for identifying, monitoring and logging changes of Internet user behaviour; downloadable computer software for detecting, tracking, preventing and/or identifying fraudulent or criminal activity on the internet; downloadable computer software for controlling and preventing access to web sites; application software for mobile phones and other mobile devices for collecting, monitoring and analysing data, code, information, sound, video, images and text transmitted and received via the internet; application software for mobile phones and other mobile devices for analysing, monitoring, auditing and visualizing data and information; application software for mobile phones and other mobile devices for identifying patterns, anomalies and irregular events within data sets; application software for mobile phones and other mobile devices for identifying patterns, anomalies and irregular events in Internet traffic; application software for mobile phones and other mobile devices for identifying, monitoring and logging changes of Internet user behaviour; application software for mobile phones and other mobile devices for detecting, tracking, preventing and/or identifying fraudulent or criminal activity on the internet; application software for mobile phones and other mobile devices for controlling and preventing access to web sites; computer software for collecting, monitoring and analysing data, code, information, sound, video, images and text transmitted and received via the internet; computer and internet security software;Provision of telecommunication access and links to computer databases and to the Internet; communication by computer terminals; providing and leasing access time to computer databases and computer network access services;Software as a service for analysing, monitoring, auditing and visualizing data and information; Software as a service for identifying patterns, anomalies and irregular events within data sets; software as a service for identifying patterns, anomalies and irregular events in Internet traffic; software as a service for identifying, monitoring and logging changes of Internet user behaviour; software as a service for detecting, tracking, preventing and identifying fraudulent or criminal activity on the internet; software as a service for controlling and preventing access to web sites; software as a service for the collection, monitoring and analysis of data, code, information, sound, video, images and text transmitted and received via the internet; collecting, monitoring and analysing data, code, information, sound, video, images and text transmitted and received via the internet for the purposes of internet security and for detecting, tracking, preventing and identifying fraudulent or criminal activity on the internet; Computer Services, computer programming services and computing resource services; computer data security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials and monitoring and auditing access to data; provision of security services for computer networks, restricting access to and by computer networks to and of undesired websites, media and individuals; computer encryption services, data encryption and data decryption; malware and spyware detection services; computer data recovery services; computer software design services; information, advisory and consultancy services relating to the aforesaid; information, advisory and consultancy services in the fields of computer and internet security;
Categories: COMPUTER SOFTWARE ANALYSING