DATA SECURITY CONSULTANCY

Brand Owner (click to sort) Address Description
ADVISORY INFORMATION TECHNOLOGY Mauldin & Jenkins 200 Galleria Parkway, Suite 1700 Atlanta GA 30339 Data security consultancy; Consulting services in the field of cloud computing; Consulting services in the field of software as a service (SAAS); Consultancy services in the field of computer software; Consultancy services in the fields of selection, implementation and use of computer hardware and software systems for others; Computer software design and programming services;
BE POLITELY PARANOID SocialProof Security 2443 Fillmore Street #380-6871 San Francisco CA 94115 Data security consultancy; Internet security consultancy; Computer security threat analysis for protecting data; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Design and development of electronic data security systems;
DATA SAFETY INDEX GDB 18851 NE 29th Avenue, Suite 303 Aventura FL 33180 Data security consultancy;
DIG SECURITY Dig Security Solutions Ltd Shlomo Ibn Gabirol St 30 Tel Aviv-Yafo 6407807 Israel Data security consultancy; Design and development of electronic data security systems; Monitoring of computer systems for detecting unauthorized access or data breach; Providing temporary use of on-line non-downloadable cloud computing software for providing security threat management systems for monitoring and tracking of security vulnerabilities in computer software, computers, and computer networks; Software as a service (SAAS) services featuring software for identification and mitigation of data risk for cloud data assets; Software as a service (SAAS) services featuring software for detection, classification, control, and protection of data assets across the cloud on the internet;
DOMLYTIC O'Rourke, Christopher 186 Seven Farms Drive Ste F #235 Daniel Island SC 29492 Data security consultancy;
ESOF VMDR TAC Security, Inc. Suite 403 355 Bryant Street San Francisco CA 94107 Data security consultancy; internet security consultancy; computer security consultancy; development of software for secure network operations; design and development of electronic data security systems; consultancy in the field of security software; IT security services in the nature of protection and recovery of computer data; maintenance and updating of computer software relating to computer security and prevention of computer risks; computer security services for protection against illegal network access; software design services; software consultancy services; software design and development services; testing of computer programs; computer software and hardware testing services; design and development of computer hardware and software for the development, maintenance, and use of interactive audio-video computer conference systems; Software as a Service (SAAS) services;
FORMER HACKERS, FIGHTING HACKERS. Domlytic 186 Seven Farms Drive Ste F #235 Daniel Island SC 29492 Data security consultancy;
ISEKURE SINGH, MAGWANT M B PO BOX 5237 DEPTFORD NJ 08096 Data security consultancy; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Consulting in the field of information technology; Consulting services in the design and implementation of computer-based information systems for businesses; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Information technology consulting services;
KNETIVTY KNETIVTY 7716 Harwood Place Springfield VA 22152 Data security consultancy; Internet security consultancy; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services;
MUSUBU Release 2 Innovations 5729 Pindell Road Lothian MD 20711 Data security consultancy; Design of electronic information graphics and data visualization materials;
NAVIO Navio International, Inc. Suite 200 244 California Street San Francisco CA 94111 Data security consultancy;
QUADRON QUADRON Kibervédelmi Szolgáltató Korlátolt Felelosségu Társaság Sas street 10-12 H-1051 Budapest Hungary Data security consultancy; data encryption and decryption services; conversion of computer programs and data, other than physical conversion; digitization of documents; electronic data storage; cloud computing; rental of web servers; electronic monitoring of credit card activity to detect fraud via the internet; creating and designing website-based indexes of information for others [information technology services]; web site design consultancy; information technology [IT] consultancy; internet security consultancy; providing search engines for the internet; outsource service providers in the field of information technology; research and development of new products for others; off-site data backup; platform as a service [PaaS]; computer technology consultancy; providing information on computer technology and programming via a web site; computer rental, software update; recovery of computer data; computer security consultancy; development of computer platforms; duplication of computer programs; monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems to detect breakdowns; monitoring of computer systems by remote access; computer system design; computer system analysis; rental of computer software; computer virus protection services; consultancy in the design and development of computer hardware; computer programming; computer software consultancy; electronic monitoring of personally identifying information to detect identity theft via the internet; server hosting; updating of computer software; software development in the framework of software publishing; maintenance of computer software; software as a service [SaaS]; installation of computer software; computer software design; technological consultancy; telecommunications technology consultancy; creating and maintaining web sites for others; hosting computer sites [web sites];
RED TRIDENT Red Trident Inc 904 Gemini Ave Houston TX 77058 Data security consultancy, namely, performing cyber security assessments, developing cyber programs, and implementing security controls focused on industrial control systems; Design and development of electronic data security systems, namely, developing products that allow users to assess the security posture of their network, maintain security compliance with various standards, and test new products for effective security controls;
SECURITY AT THE SPEED OF CODE BluBracket, Inc. 941 Emerson St Palo Alto CA 943012415 Data security consultancy; Internet security consultancy; Software as a service (SAAS) services featuring software for protecting against the theft and/or loss of source code within corporate networks, on corporate servers, and on corporate managed and unmanaged devices;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace. In another embodiment, subgroups called "tribes" can be formed within a telespace and each tribe adopts the security level of the telespace in which it resides.