FindOwnerSearch
Brands and Their Owners
| Amash LLC contact information is shown below | |
| Owner: | AMASH LLC |
|---|---|
| Owner Address: | 1333 Burr Ridge Parkway, Suite 200 Burr Ridge IL 60527 |
| Owner Web Site | |
| Owner Phone | |
| Owner Toll Free | |
| Owner Fax |
| Brand: |
ZUKEY |
|---|---|
| Description: | Security token hardware; downloadable or recorded security token software; computer authentication token hardware; downloadable or recorded computer authentication token software; USB computer security keys; electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; wireless transmitters and receivers; transmitters of electronic signals; data processors; downloadable or recorded computer software for authenticating computer users; downloadable or recorded computer software for network and computer security; downloadable or recorded computer software for data encryption and decryption; downloadable or recorded computer software for accessing secure computer systems and services;Electronic data transmission; electronic transmission of user credentials and user authentication data; providing access to computer programs in data networks; providing access to databases; providing private and secure real time electronic communication over a computer network;Computer user authentication services; authentication, issuance and validation of digital certificates; software as a service (SaaS) for security token management; software as a service (SaaS) for authentication token management; software as a service (SaaS) for authenticating computer users; software as a service (SaaS) for network and computer security; software as a service (SaaS) for data encryption and decryption; software as a service (SaaS) for accessing secure computer systems and services; data security consulting; information technology consulting; data encryption services; computer security services in the nature of administering digital certificates; computer security services in the nature of administering digital keys; computer security services, namely, restricting unauthorized access to computers and computer networks; computer security services, namely, restricting unauthorized network access by users without credentials; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; |
| Category: | SECURITY TOKEN HARDWARE |