ACCESSDATA GROUP, INC.

 ACCESSDATA GROUP, INC. contact information is shown below
Owner:ACCESSDATA GROUP, INC.
Owner Address:588 West 400 South, Suite 350 Lindon UT 84042
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byACCESSDATA GROUP, INC.

Brand:

ACCESSDATA

Description:

computer programs and instructional manuals sold as a unit for file utilities;ACESS DATA;

Category: COMPUTER PROGRAMS INSTRUCTIONAL MANUALS
Brand:

ACCESSDATA

Description:

Conducting workshops, seminars, classes and certification programs, classes, guided study and educational proficiency testing regarding recovering examining and analyzing forensic evidence from digital sources, including computers, mobile electronic devices and cellular telephones; courses of instruction in the field of enterprise investigations, security breaches, incident response, electronic discovery and network forensics;Computer software for investigation of computer networks; computer programs and instructional manuals sold as a unit for educational purposes, namely, educational software featuring instruction in forensic evidence and instruction manuals sold as a unit; computer software for monitoring security or forensic matters in global computer networks, wide area networks, local area networks, mobile electronic devices, and cellular telephones; computer software for simultaneously scanning and indexing electronic documents consisting of program disks, instruction manual, and disk jackets sold as a unit; computer software, namely, software for use in monitoring and reporting security or forensic issues regarding data, electronic documents, images and multimedia content via a local, wide area and global computer network; computer programs for the enabling of access or entrance control; computer software for application and database integration; computer software for creating searchable databases of information and data; computer software for organizing and viewing digital images and photographs; computer software for accessing and copying images located on computer hard drives, mobile electronic devices and cellular telephones in the fields of security and forensics; computer software for decrypting passwords and gaining entry to files and data of computers, mobile electronic devices and cellular telephones; computer software for searching, examining, analyzing and reporting on data and files of computers, mobile electronic devices and cellular telephones for the purpose of gathering evidence; computer software in the field of e-discovery for the collection, preservation, processing, review and production of electronic data; computer software in the field of e-discovery for the collection, preservation, processing, review and production of electronic data; computer software for use in accessing, viewing, storing, and transmitting electronic documents, transcripts, testimony, text, and data, and operating and user manuals and instructions sold therewith; software to facilitate electronic delivery of transcripts, exhibits and videos to attorneys, clients and others; computer software for use in managing litigation documents and deposition testimony; computer intelligence and security software for tracking, collecting, researching, analyzing, processing and delivering intelligence, security information and data from various sources; computer software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security; software used to examine computer data for gathering evidence; software for electronic delivery and storage of legal documents; software for acquiring and preserving data from computers, networks, removable devices and mobile devices for forensic use; software for intellectual property detection and investigation; software for fraud detection and investigation; software for detecting, monitoring, and remediating data theft, data leakage, fraudulent activity and malicious behavior;ACCESS DATA;Color is not claimed as a feature of the mark.;Compiling crime occurrence data; computer and internet security in the nature of providing authentication, issuance, validation and revocation of digital certificates; litigation support services; counseling in the field of compliance with legal, regulatory and self-regulatory standards in the field of laws, regulations, and standards relating to computer security, data extraction, data recovery, data retention, and electronic discovery; electronic discovery counseling in the nature of providing litigation support counseling services relating to the review of e-mails and of other electronically stored information that could be relevant evidence in a lawsuit; expert witness services for reports, analysis and consultation regarding digital evidence from computers, networks, and mobile devices; online legal services, namely, case review and analysis; case management services, namely, coordinating legal services for others;Application service provider featuring software for use in facilitating document and case management of multi district or multi-office legal matters or litigation; computer consultation and maintenance of computer software; providing temporary access to online non-downloadable software, namely, software for accessing and copying images located on computer hard drives, mobile electronic devices and cellular telephones; providing temporary access to online non-downloadable computer software for decrypting passwords and gaining entry to digital files and data on computers, mobile electronic devices and cellular telephones; providing temporary access to online non-downloadable computer software for searching, examining, analyzing and reporting on data and files located on computer hard drives, mobile electronic devices and cellular telephones for the purpose of gathering evidence; software as a service for acquiring and preserving data from computers, networks, removable devices and mobile devices for forensic use; intelligence and security services, namely, computer forensic services in the nature of tracking, collecting, researching, analyzing, processing and delivering intelligence and security technology information and data from various sources; computer consultation in the field of computer security; research and analysis in the field of forensic intelligence and computer and internet security; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; technical support, namely, monitoring of network systems; litigation support services, namely, conducting electronic legal discovery in the nature of reviewing emails, electronically stored information and data that could be relevant evidence in a lawsuit; computer services, namely, providing forensic services to recover lost and deleted data; computer consulting services in the field of critical incident response to information, computer and internet security breaches; software as a service, featuring software for intellectual property detection and investigation, fraud detection and investigation and for detecting, monitoring, and remediating data theft, data leakage, fraudulent activity and malicious behavior; consulting services in the field of maintaining the security and integrity of databases; monitoring of computer systems for security purposes;

Category: CONDUCTING WORKSHOPS
Brand:

ACCESSDATA CERTIFIED EXAMINER

Description:

Conducting workshops, seminars, classes and certification programs, classes, guided study and testing regarding recovering examining and analyzing forensic evidence from digital sources, including computers, personal digital assistants and cellular telephones;ACCESS DATA CERTIFIED EXAMINER;CERTIFIED EXAMINER;

Category: CONDUCTING WORKSHOPS
Brand:

ACCESSDATA INSIGHT

Description:

Software for data and file management, manipulation, analysis, and security;ACCESS DATA INSIGHT;Design and development of computer software for data and file management, manipulation, analysis, and security;

Category: SOFTWARE DATA FILE
Brand:

ACE

Description:

Conducting workshops, seminars, classes and certification programs, classes, guided study and testing regarding recovering, examining and analyzing forensic evidence from digital sources, including computers, personal digital assistants and cellular telephones;

Category: CONDUCTING WORKSHOPS
Brand:

AD ACCESSDATA

Description:

Providing training, namely, classes, workshops, conferences, and seminars in computer forensics, mobile forensics and litigation support; Conducting training, namely, workshops, seminars, classes, certification programs, and educational conferences, all in the fields of cybersecurity, computer and mobile forensics, digital investigations and litigation support, all conducted via classroom instruction, live and recorded non-downloadable online video, and software applications for delivery of electronic training materials; Guided study in the nature of classes, workshops, conferences, and seminars in the field of recovering, examining and analyzing forensic evidence from digital sources, including computers, mobile electronic devices, and cellular telephones; Providing educational testing services in the field of recovery, examination, and analysis of forensic evidence from digital sources; Providing training, namely, classes, workshops, conferences, and seminars in enterprise investigations covering security breaches, incident response, and network forensics; Providing training, namely, classes, workshops, conferences, and seminars in litigation support, electronic discovery, and applying technology to legal work processes; Providing training assistance, namely, providing academic mentoring services in the field of computer programming for students of colleges and universities offering comprehensive software training programs;The mark consists of three concentric circles where the large inner circle carries a stylized letters AD all to the left of the wording ACCESSDATA in stylized typeface.;Computer software for investigation of computer networks; Computer programs and instructional manuals sold as a unit for educational purposes, namely, educational software featuring instruction in forensic evidence and instruction manuals sold as a unit; Computer software for monitoring security on global computer networks, wide area networks, local area networks, mobile electronic devices, and cellular telephones; Computer software for simultaneously scanning and indexing electronic documents consisting of program disks, instruction manual, and disk jackets sold as a unit; Computer software, namely, software for use in storing, accessing, searching and transmitting data, electronic documents, images and multimedia content via a local, wide area and global computer network and operating and user instructions, sold as a unit; Computer programs for the enabling of access or entrance control; Computer software for application and database integration; Computer software for creating searchable databases of information and data; Computer software for organizing and viewing digital images and photographs; Computer software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data and information; Computer software, namely, software for accessing and copying images located on computer hard drives, mobile electronic devices and cellular telephones; Computer software for decrypting passwords and gaining entry to files and data of computers, mobile electronic devices and cellular telephones; Computer software for searching, examining, analyzing and reporting on data and files of computers, mobile electronic devices and cellular telephones for the purpose of gathering evidence; Computer software in the field of e-discovery for the collection, preservation, processing, review and production of electronic data; Downloadable computer software in the field of e-discovery for the collection, preservation, processing, review and production of electronic data; Computer software, namely, software for use in accessing, viewing, storing, and transmitting electronic documents, transcripts, testimony, text, and data, and operating and user manuals and instructions sold therewith; Software to facilitate electronic delivery of transcripts, exhibits and videos to attorneys, clients and others; Computer software for use in managing litigation documents and deposition testimony;AD ACCESS DATA;as to ACCESSDATA;Color is not claimed as a feature of the mark.;Proficiency testing to determine professional competency in recovering, examining and analyzing forensic evidence from digital sources, including computers, mobile electronic devices, and cellular telephones; Providing training assistance, namely, providing temporary teachers and classroom aides to colleges and universities offering comprehensive software training programs; computerized database management of searchable databases in a networked environment; Computer data processing services for the identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of data, metadata, files, and information on computers, computer networks, mobile devices; Processing computer data generated by security breach incidents; Processing computer data for the collection, analysis and monitoring of computer network traffic; Processing computer data for use in fields of cybersecurity, analytics, eDiscovery and computer forensics; Computer data processing services for detecting, reporting, analyzing and eliminating cyber incidents, unauthorized software and network attacks; Computer data processing services for identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of computer data, metadata, files, and information, including data generated from security breach incidents; Computer data processing services for assessing damages resulting from computer security breaches, computer system intrusions and unauthorized use of computer data and computer files; Computer data processing services for diagnosing computer systems, for investigating forensic data, for conducting electronic evidence discovery and for evaluating loss of business from security breaches; Computer services, namely, providing searchable computer databases for others featuring business intelligence data in a networked environment;Forensic investigations in the nature of collecting, preserving, analyzing and reporting data from computers, mobile devices, and network shares for the purpose of fraud and theft prevention, and preparation of litigation; Forensic investigation in the nature of collecting, preserving, analyzing and reporting data from computers, mobile devices, and network shares regarding cyber-incidents such as identity theft, phishing, extortion and malware infections for the purpose of criminal investigations, criminal and civil law defense preparation, civil litigation, and employment background screening; Providing litigation support services for collecting, storing, sharing, reviewing, searching, managing, categorizing and coding documents; Litigation support services, namely, conducting electronic legal discovery in the nature of reviewing e-mails and other electronically stored information that could be relevant evidence in a lawsuit; Providing litigation support services, namely, providing live and online electronic discovery services in the nature of issuing litigation hold notifications and collecting data from a wide range of data sources, such as computers, laptops, mobile phones, network shares, email and cloud computing systems; Litigation support services in the nature of analyzing data to reduce dataset to relevant files, performing keyword searches on reduced datasets, configuring review tools to assist a legal team, and exporting responsive data in selected formats; Computer services, namely, providing searchable computer databases featuring electronic legal discovery information in a networked environment for the purpose of gathering evidence in preparation for litigation;Computer forensic services in the nature of collection and preservation of data from computers, mobile devices, and network shares; Application service provider featuring software for use in facilitating document and case management of multidistrict or multi-office legal matters or litigation; Providing temporary access to online non-downloadable software, namely, software for accessing and copying images located on computer hard drives, mobile electronic devices and cellular telephones; Providing temporary access to online non-downloadable computer software for decrypting passwords and gaining entry to digital files and data on computers, mobile electronic devices and cellular telephones; Providing temporary access to online non-downloadable computer software for searching, examining, analyzing and reporting on data and files located on computer hard drives, mobile electronic devices and cellular telephones for the purpose of gathering evidence;

Category: PROVIDING TRAINING
Brand:

AD INSIGHT

Description:

Software for data and file management, manipulation, analysis, and security;ACCESS DATA INSIGHT;Design and development of computer software for data and file management, manipulation, analysis, and security;

Category: SOFTWARE DATA FILE
Brand:

AD QBLAZE

Description:

Downloadable viewer software for use with forensic software to investigate and analyze data, images and files from computers, mobile devices, and network shares; downloadable software for use in investigating and analyzing data, images and files from computers, mobile devices, and network shares; downloadable viewer software for investigating and analyzing data, images and files located on computer hard drives, mobile electronic devices and cellular telephones; downloadable computer software for investigating, searching, examining, analyzing and reporting on data, images and files located on computer hard drives, mobile electronic devices and cellular telephones; downloadable computer software for assisting and collaborating with other forensic software in conducting forensic investigations and analyses of data, images and files on electronic devices and networks;

Category: DOWNLOADABLE VIEWER SOFTWARE USE
Brand:

AD QBLAZE

Description:

Computer software services in the nature of online non-downloadable viewer software for temporary use with forensic software to investigate and analyze data, images and files from computers, mobile devices, and network shares; non-downloadable application service provider featuring online viewer software for temporary use in investigating and analyzing data, images and files from computers, mobile devices, and network shares; software as a service (SAAS) featuring online non-downloadable software for investigating and analyzing data, images and files located on computer hard drives, mobile electronic devices and cellular telephones; providing online non-downloadable software for temporary use with forensic computer software for investigating, searching, examining, analyzing and reporting on data, images and files located on computer hard drives, mobile electronic devices and cellular telephones; software as a service (SAAS) featuring online non-downloadable software for assisting and collaborating with other forensic software in conducting forensic investigations and analyses of data, images and files on electronic devices and networks;

Category: COMPUTER SOFTWARE SERVICES
Brand:

AD RTK

Description:

Software for enterprise-wide, compliance-focused searches and remediation of problematic data and files; software for recovering data spillage, repairing post-breach forensic data and files, and enabling clean-up of problematic data and files; software for searching, collecting and remediating problematic data and files; software for identifying, assessing and managing risks associated with changes and deviations in compliance with internal policies and regulatory requirements; and software for tracking software performance and breaches, providing periodic database maintenance and clean up, and providing reports and alerts concerning such performance and breaches;ACCESS DATA RTK;

Category: SOFTWARE ENTERPRISE WIDE
Brand:

AD SUMMATION

Description:

Computer software for administration of computer networks; Computer software for application and database integration; Computer software for creating searchable databases of information and data; Computer software for processing digital images; Computer software for the collection, editing, organizing, modifying, book marking, transmission,storage and sharing of data and information;ACCESS DATA SUMMATION;

Category: COMPUTER SOFTWARE ADMINISTRATION
Brand:

CASESCAN

Description:

computer software for simultaneously scanning and indexing documents consisting of program disks, instruction manual, and disk jackets;

Category: COMPUTER SOFTWARE SIMULTANEOUSLY SCANNING
Brand:

CASEVANTAGE

Description:

CASE VANTAGE;Application service provider (ASP) featuring software for use in facilitating the document and case management of multidistrict or multioffice legal matters or litigation;

Category: CASE VANTAGE
Brand:

CERBERUS

Description:

Software for detecting and blocking malware and viruses in computer systems;

Category: SOFTWARE DETECTING BLOCKING
Brand:

DISCOVERY CRACKER

Description:

Computer software in the field of e-discovery for the collection, preservation, processing, review and production of electronic data; and, downloadable computer software in the field of e-discovery the collection, preservation, processing, review and production of electronic data;DISCOVERY;

Category: COMPUTER SOFTWARE FIELD
Brand:

DISTRIBUTED NETWORK ATTACK

Description:

Software for password decryption;

Category: SOFTWARE PASSWORD DECRYPTION
Brand:

FORENSIC TOOLKIT

Description:

Computer software, namely, software used to examine computer data for gathering evidence;

Category: COMPUTER SOFTWARE
Brand:

HERCULE

Description:

Computer forensic software services in the nature of investigating and analyzing data, images and files from computers, mobile devices, and network shares; application service provider featuring software and software widget programs for use in investigating and analyzing data, images and files from computers, mobile devices, and network shares; software as a service (SAAS) featuring software for investigating and analyzing data, images and files located on computer hard drives, mobile electronic devices and cellular telephones and the like; providing online non-downloadable forensic computer software for investigating, searching, examining, analyzing and reporting on data, images and files located on computer hard drives, mobile electronic devices and cellular telephones for the purpose of gathering evidence; software as a services (SAAS) featuring software and software widget programs for assisting and collaborating with other forensic software in conducting forensic investigations and analyses of data, images and files on electronic devices and networks;

Category: COMPUTER FORENSIC SOFTWARE SERVICES
Brand:

HERCULE

Description:

Downloadable computer forensic software for investigating and analyzing data, images and files from computers, mobile devices, and network shares; downloadable computer widget software program for use in investigating and analyzing data, images and files from computers, mobile devices, and network shares; downloadable software for investigating and analyzing data, images and files located on computer hard drives, mobile electronic devices and cellular telephones and the like; downloadable forensic computer software for investigating, searching, examining, analyzing and reporting on data, images and files located on computer hard drives, mobile electronic devices and cellular telephones for the purpose of gathering evidence; downloadable computer software and computer software widget program for assisting and collaborating with other forensic software in conducting forensic investigations and analyses of data, images and files on electronic devices and networks;

Category: DOWNLOADABLE COMPUTER FORENSIC SOFTWARE
Brand:

INSIGHT PLATFORM

Description:

Computer software, namely, software for data examination, gathering, storage, manipulation, management and encryption, in the fields of forensic research, gathering evidence and managing security; computer software, namely, downloadable forensic software for collecting, storing, sharing, reviewing, searching, managing, categorizing and coding documents;

Category: COMPUTER SOFTWARE
Brand:

LAWDROP

Description:

Computer software and hardware, namely, downloadable software and hardware for litigation support, for collecting, storing, sharing, reviewing, searching, managing, categorizing and coding documents; computer software and hardware for creating searchable databases of information and data and managing storage devices in a networked environment; computer software and hardware for electronic discovery, computer forensics, and litigation; computer software and hardware for diagnostics, forensic data investigation, electronic evidence discovery and business loss valuation; Computer software and hardware for centralized identification, acquisition, storage, encryption, management, manipulation, joining, analysis and reporting of computer, computer network data, mobile device data, metadata, files, information and security breach incidents, as well as collection, analysis and monitoring of network traffic, for use in fields of cybersecurity, analytics, eDiscovery and computer forensics, e-discovery and litigation; computer software and hardware for detecting, reporting, analyzing and eliminating cyber incidents, such as malware, unauthorized software and network attacks; computer software and hardware system for identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of computer and computer network data, metadata, files, information and security breach incidents, for use insecurity and system intrusion assessment, investigation of damage to or unauthorized use of computer data and files;LAW DROP;

Category: COMPUTER SOFTWARE HARDWARE
Brand:

LAWDROP

Description:

LAW DROP;Providing litigation support services for collecting, storing, sharing, reviewing, searching, managing, categorizing and coding documents, including storing, sharing and managing data by dragging, dropping and uploading case data into a multi-tenant platform; litigation support services, namely, conducting electronic legal discovery in the nature of reviewing e-mails and other electronically stored information for legal evidence; litigation support services, namely, analyzing data to reduce dataset to relevant files, performing keyword searches on reduced datasets, configuring review tools and exporting responsive data in selected formats all to assist a legal team; legal consultation; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates for computer data, computer network data, mobile device data, metadata, files, information; Monitoring of computer systems, computer network traffic for security purposes for ediscovery and computer forensics; monitoring of computer systems for security purposes for cyber incidents such as malware, unauthorized software and network attacks; monitoring of computer systems for security purposes for system intrusion assessment, investigation of damage to or unauthorized use of computer data and files;Data encryption services for computer network data, metadata, files, information; Design of computer databases for searching information and managing storage devices in a networked environment, including storing, sharing and managing data by dragging, dropping and uploading case data into a multi-tenant platform;

Category: LAW DROP
Brand:

MOBILE PHONE EXAMINER PLUS

Description:

Computer programs for the enabling of access or entrance control; Computer software for application and database integration; Computer software for creating searchable databases of information and data; Computer software for organizing and viewing digital images and photographs; Computer software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data and information;MOBILE PHONE EXAMINER;

Category: COMPUTER PROGRAMS ENABLING
Brand:

MPE VELOCITOR

Description:

The mark consists of the acronym MPE featuring a plus sign with three diagonal streak lines. The center of the plus sign features three small claws. Below all of this are the stylized words VELOCITOR.;Downloadable forensic software for use by mobile phones, cellular phones, mobile devices, computers and internet servers to extract digital information from mobile phones, cellular phones, mobile devices, computers and internet servers; forensic software for supporting extraction of data and/or information from mobile phones, cellular phones, mobile devices, computers and internet servers containing Chinese language, data and information by circumventing and bypassing passwords; downloadable software for digital information extraction by circumventing and bypassing passwords for use on mobile phones, cellular phones, mobile devices, computers and internet servers, and cloned devices having Chinese manufactured chipsets, namely, cloned mobile devices, cloned computers, and cloned computer network servers;Color is not claimed as a feature of the mark.;

Category: