FindOwnerSearch
Brands and Their Owners
Contact information is shown below including the 802 Secure website address. | |
Owner: | 802 SECURE |
---|---|
Owner Address: | 111 Lindbergh Avenue, Suite F Livermore CA 94551 |
Owner Web Site | WWW.802SECURE.COM |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
802 SECURE |
---|---|
Description: | EIGHT ZERO TWO SECURE;SECURE;Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of software for secure network operations; |
Category: | EIGHT ZERO TWO SECURE |
Brand: |
AIRDECOY |
---|---|
Description: | AIR DECOY;Computer consultation in the field of computer security; computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; |
Category: | AIR DECOY |
Brand: |
AIRSHIELD |
---|---|
Description: | AIR SHIELD;Providing assessment and defense of IoT and wireless networks using wireless sensors; centralized cloud reporting and analytics; |
Category: | AIR SHIELD |
Brand: |
CRITICAL PATH TO EXPOSURE (CPE) |
---|---|
Description: | CRITICAL PATH EXPOSURE CRITICAL PATH EXPOSURE;Computer consultation in the field of computer security; computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; |
Category: | CRITICAL PATH EXPOSURE CRITICAL PATH |
Brand: |
DECEPTIVE NETWORKING |
---|---|
Description: | Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; |
Category: | COMPUTER SECURITY CONSULTANCY |
Brand: |
INTERNET OF YOU |
---|---|
Description: | Custom design of wearable apparel based on personal selections made by the customer; |
Category: | CUSTOM DESIGN WEARABLE APPAREL |
Brand: |
IOTSECURE |
---|---|
Description: | Wireless communication devices for voice, data or image transmission;INTERNET OT SECURE; |
Category: | WIRELESS COMMUNICATION DEVICES VOICE |
Brand: |
P25CLEANRF |
---|---|
Description: | Broadband wireless equipment, namely, telecommunications base station equipment for cellular and fixed networking and communications applications; computer software for wireless content delivery; software defined radio; all of the foregoing used to ensure performance, reliability, and security of P25 (Project 25) networks through independent auditing of P25 transmissions;P TWENTY FIVE CLEAN RF; |
Category: | BROADBAND WIRELESS EQUIPMENT |
Brand: |
PUSH-BUTTON-AUDIT |
---|---|
Description: | Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; |
Category: | COMPUTER CONSULTATION FIELD |
Brand: |
SECURE WIRELESS AUDIT RISK MANAGEMENT (SWARM) |
---|---|
Description: | SECURE WIRELESS AUDIT RISK MANAGEMENT SECURE WIRELESS AUDIT RISK MANAGEMENT;SECURE WIRELESS AUDIT RISK MANAGEMENT;Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; |
Category: | SECURE WIRELESS AUDIT RISK MANAGEMENT |
Brand: |
SECUREPOCKET |
---|---|
Description: | Telecommunication services, namely, transmission of voice, data, graphics, sound and video by means of broadband power line or wireless networks; Transmission and delivery of data via wireless communication networks; Wireless electronic transmission of data;SECURE POCKET; |
Category: | TELECOMMUNICATION SERVICES |
Brand: |
TM |
---|---|
Description: | Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support, namely, monitoring technological functions of computer network systems; Updating of computer software relating to computer security and prevention of computer risks; |
Category: | TECHNICAL SUPPORT SERVICES |
Brand: |
WIRELESS RISK AUDIT TOOL (WRAT) |
---|---|
Description: | WIRELESS RISK AUDIT TOOL;Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks; |
Category: | WIRELESS RISK AUDIT TOOL |