INFORMATION TECHNOLOGY NETWORK SECURITY MONITORING

Brand Owner Address Description
LIBERTY LIFARS 244 Fifth Avenue, Suite 2035 New York NY 10001 Information technology network security monitoring and consulting services, namely, providing computer security strategies to enterprises to help them guard their intellectual property, data and network infrastructure against cyber security attack, and conducting computer security assessments involving penetration testing of computers and networks to determine information security vulnerability; Information technology security monitoring services, namely, monitoring and maintaining information technology infrastructures of enterprises to guard data and information from unauthorized access; information technology security incident response services, namely, restricting unauthorized computer network access by users without credentials; Managed information technology security services, namely, computer security threat analysis and testing for protecting data; Threat hunting computer security services, namely, detection of ongoing and zero-day cyberattacks and advanced persistent threats as well as other advanced hackers tactics, techniques and procedures and indicators of compromise;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An apparatus and technique for allowing wireless electronic badges to temporarily establish a wireless network (e.g., a piconet network) with a network security station mounted in a facility of an employer, a gym, a membership club, etc. The wireless electronic badges automatically exchange user code with the network security station, and receives relevant badge information for display and use by that particular secured facility. In a preferred embodiment, BLUETOOTH technology is used in the wireless piconet front ends of the electronic wireless badge and the network security station. The disclosed electronic wireless badge includes an LCD display, a display controller, an information exchange module, and a wireless front end (e.g., a wireless piconet network such as a BLUETOOTH network). The electronic wireless badge includes a unique user code which is passed to the network security station. The network security station includes a complementary wireless front end, together with a database of user codes and badge display information for the properly authorized user codes. As an individual enters an area requiring identification, their electronic wireless badge exchanges a security code with the network security station, and upon proper authorization receives from the network security station appropriate badge display information for display. Exemplary display information may include, e.g., a photo of the authorized user corresponding to the authorization code in the electronic wireless badge, a name of the authorized user, an identification number, a company for which the displayed badge information relates, a membership type, a security level, etc.