802 Secure

 Contact information is shown below including the 802 Secure website address.
Owner:802 SECURE
Owner Address:111 Lindbergh Avenue, Suite F Livermore CA 94551
Owner Web SiteWWW.802SECURE.COM
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned by802 Secure

Brand:

802 SECURE

Description:

EIGHT ZERO TWO SECURE;SECURE;Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of software for secure network operations;

Category: EIGHT ZERO TWO SECURE
Brand:

AIRDECOY

Description:

AIR DECOY;Computer consultation in the field of computer security; computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;

Category: AIR DECOY
Brand:

AIRSHIELD

Description:

AIR SHIELD;Providing assessment and defense of IoT and wireless networks using wireless sensors; centralized cloud reporting and analytics;

Category: AIR SHIELD
Brand:

CRITICAL PATH TO EXPOSURE (CPE)

Description:

CRITICAL PATH EXPOSURE CRITICAL PATH EXPOSURE;Computer consultation in the field of computer security; computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;

Category: CRITICAL PATH EXPOSURE CRITICAL PATH
Brand:

DECEPTIVE NETWORKING

Description:

Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;

Category: COMPUTER SECURITY CONSULTANCY
Brand:

INTERNET OF YOU

Description:

Custom design of wearable apparel based on personal selections made by the customer;

Category: CUSTOM DESIGN WEARABLE APPAREL
Brand:

IOTSECURE

Description:

Wireless communication devices for voice, data or image transmission;INTERNET OT SECURE;

Category: WIRELESS COMMUNICATION DEVICES VOICE
Brand:

P25CLEANRF

Description:

Broadband wireless equipment, namely, telecommunications base station equipment for cellular and fixed networking and communications applications; computer software for wireless content delivery; software defined radio; all of the foregoing used to ensure performance, reliability, and security of P25 (Project 25) networks through independent auditing of P25 transmissions;P TWENTY FIVE CLEAN RF;

Category: BROADBAND WIRELESS EQUIPMENT
Brand:

PUSH-BUTTON-AUDIT

Description:

Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management;

Category: COMPUTER CONSULTATION FIELD
Brand:

SECURE WIRELESS AUDIT RISK MANAGEMENT (SWARM)

Description:

SECURE WIRELESS AUDIT RISK MANAGEMENT SECURE WIRELESS AUDIT RISK MANAGEMENT;SECURE WIRELESS AUDIT RISK MANAGEMENT;Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;

Category: SECURE WIRELESS AUDIT RISK MANAGEMENT
Brand:

SECUREPOCKET

Description:

Telecommunication services, namely, transmission of voice, data, graphics, sound and video by means of broadband power line or wireless networks; Transmission and delivery of data via wireless communication networks; Wireless electronic transmission of data;SECURE POCKET;

Category: TELECOMMUNICATION SERVICES
Brand:

TM

Description:

Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support, namely, monitoring technological functions of computer network systems; Updating of computer software relating to computer security and prevention of computer risks;

Category: TECHNICAL SUPPORT SERVICES
Brand:

WIRELESS RISK AUDIT TOOL (WRAT)

Description:

WIRELESS RISK AUDIT TOOL;Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks;

Category: WIRELESS RISK AUDIT TOOL