COMPUTER NETWORK SECURITY CONSULTANCY

Brand Owner (click to sort) Address Description
AERGAP DATASSURANT, INC. Suite 550 11921 FREEDOM DRIVE RESTON VA 20190 Computer network and security consultancy, namely, conducting information security compliance assessments and computer network security policy development; providing hardware based, web based, cloud based non-downloadable software for the purpose of scanning, testing, and assessing the computers, networks and websites of others for malware, viruses, network and web application vulnerabilities to validate the Secure Sockets Layer certificates of others websites;
AERGAP La Barge, Michael 11951 Freedom Drive Suite 1300 Reston VA 20190 Computer network and security consultancy, namely, conducting information security compliance assessments and computer network security policy development; providing hardware based, web based, cloud based non-downloadable software for the purpose of scanning, testing, and assessing the computers, networks and websites of others for malware, viruses, network and web application vulnerabilities to validate the Secure Sockets Layer certificates of others websites;
ENKRYPTOCORP LLC Enkryptocorp 8618 jogeva rise San Antonio TX 78251 Computer network security consultancy; Computer security consultancy; Computer security threat analysis for protecting data; Data security consultancy; Internet security consultancy; Telecommunication network security consultancy;
MODERNCYBER ModernCyber 780 Oak Park Dr Melbourne FL 32940 Computer network security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Telecommunication network security consultancy; Updating of computer software relating to computer security and prevention of computer risks;
VXARCH DLC Technology Solutions, Inc. 777 Route 70, Suite G-104 Marlton NJ 08053 Computer network security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer services, namely, remote management of information technology (IT) systems of others comprised of security information and event management, log management and retention, and password management; Computer services, namely, remote management of the information technology (IT) systems of others; Computer virus protection services; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Data encryption services; Information technology consulting services; Planning, design and management of information technology systems; Remote computer backup services; Technology consultation in the field of cybersecurity;
WRITE ONCE, DETECT EVERYWHERE Netography, Inc. 548 Market Street, #50425 San Francisco CA 94104 Computer network security consultancy; Software as a service (SAAS) services featuring software for network security, security monitoring, threat detection and remediation;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A policy-based network security management system is disclosed. In one embodiment, the system comprises a security management controller comprising one or more processors; a computer-readable medium carrying one or more sequences of instructions for policy-based network security management, wherein execution of the one or more sequences of instructions by the one or more processors causes the one or more processors to perform the steps of receiving a set of data regarding a user of a computer network; automatically deciding on a course of action based on the set of data, wherein the course of action may be adverse to the user although the set of data is insufficient to establish whether the user is performing a malicious action; and sending signals to one or more network elements in the computer network to implement the decision.