Amash LLC

 Amash LLC contact information is shown below
Owner:AMASH LLC
Owner Address:1333 Burr Ridge Parkway, Suite 200 Burr Ridge IL 60527
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byAmash LLC

Brand:

ZUKEY

Description:

Security token hardware; downloadable or recorded security token software; computer authentication token hardware; downloadable or recorded computer authentication token software; USB computer security keys; electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; wireless transmitters and receivers; transmitters of electronic signals; data processors; downloadable or recorded computer software for authenticating computer users; downloadable or recorded computer software for network and computer security; downloadable or recorded computer software for data encryption and decryption; downloadable or recorded computer software for accessing secure computer systems and services;Electronic data transmission; electronic transmission of user credentials and user authentication data; providing access to computer programs in data networks; providing access to databases; providing private and secure real time electronic communication over a computer network;Computer user authentication services; authentication, issuance and validation of digital certificates; software as a service (SaaS) for security token management; software as a service (SaaS) for authentication token management; software as a service (SaaS) for authenticating computer users; software as a service (SaaS) for network and computer security; software as a service (SaaS) for data encryption and decryption; software as a service (SaaS) for accessing secure computer systems and services; data security consulting; information technology consulting; data encryption services; computer security services in the nature of administering digital certificates; computer security services in the nature of administering digital keys; computer security services, namely, restricting unauthorized access to computers and computer networks; computer security services, namely, restricting unauthorized network access by users without credentials; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;

Category: SECURITY TOKEN HARDWARE