FindOwnerSearch
Brands and Their Owners
| Chaasm Incorporated contact information is shown below | |
| Owner: | CHAASM INCORPORATED |
|---|---|
| Owner Address: | 5596 Westmoreland Rd Whitesboro NY 13492 |
| Owner Web Site | |
| Owner Phone | |
| Owner Toll Free | |
| Owner Fax |
| Brand: |
AUTOSECOPS |
|---|---|
| Description: | AUTOMATED SECURITY OPERATIONS;Maintenance of computer software relating to computer security and prevention of computer risks Computer security consultancy Computer security threat analysis for protecting data; |
| Category: | AUTOMATED SECURITY OPERATIONS |
| Brand: |
CAASM |
|---|---|
| Description: | Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to infrastructure and application services; Computer services, namely, cloud hosting provider services; |
| Category: | COMPUTER SECURITY SERVICES |
| Brand: |
CHAASM |
|---|---|
| Description: | Software development for others in the field of software configuration management; Computer software design, computer programming, and maintenance of computer software; Computer software installation and maintenance; Customizing computer software; Developing and updating computer software; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; Recording software protection programs and security programs onto magnetic media; Services for updating computer software; Updating of computer software relating to computer security and prevention of computer risks; |
| Category: | SOFTWARE DEVELOPMENT OTHERS |
| Brand: |
TRUST NOTHING |
|---|---|
| Description: | Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials to allow for responsible deployment of cloud computing environments for Internet of Things (IoT), artificial intelligence (AI), Big Data and Analytics; |
| Category: | COMPUTER SECURITY SERVICES |
| Brand: |
TRUST NOTHING ARCHITECTURE |
|---|---|
| Description: | Computer Design Architecture with a Defense in Depth approach to security. Trust Nothing Architecture is methodology for designing cyber resilient systems applications and platforms; |
| Category: | COMPUTER DESIGN ARCHITECTURE WITH |