FindOwnerSearch
Brands and Their Owners
CloudPassage, Inc. contact information is shown below | |
Owner: | CLOUDPASSAGE, INC. |
---|---|
Owner Address: | 95 3rd Street San Francisco CA 94103 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
CLOUDPASSAGE |
---|---|
Description: | Computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments;CLOUD PASSAGE;Computer services, namely, ensuring computer security by restricting network access to computers, controlling computer operating system and application security configuration parameters, monitoring and managing access rights and privileges to computers, and monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; cloud computing services, namely, providing software as a service (SaaS) services, namely, hosting software for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments, and infrastructure-as-a-service (IaaS) services, namely, hosting one or more virtual computers for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments; computer consultation in the field of cloud computer security; |
Category: | COMPUTER SECURITY SOFTWARE |
Brand: |
DEEP CONTAINER MONITORING |
---|---|
Description: | computer software for use in automating the security of containerized computer program applications and environments, and for securing computer program applications and environments using containerization; computer software for automated firewall creation and management, vulnerability monitoring, file integrity monitoring, configuration and access management and monitoring;CONTAINER MONITORING;computer services, namely, electronic storage of computer program files for others for use in developing other computer software; providing temporary use of non-downloadable computer software for use in computer program application development; providing temporary use of non-downloadable computer software for use in automating the security of containerized computer program applications and environments, and for securing computer program applications and environments using containerization; providing temporary use of non-downloadable computer software for automated firewall creation and management, vulnerability monitoring, file integrity monitoring, configuration and access management and monitoring; |
Category: | COMPUTER SOFTWARE USE |
Brand: |
HALO |
---|---|
Description: | Computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments; |
Category: | COMPUTER SECURITY SOFTWARE |
Brand: |
HALO CLOUD SECURE |
---|---|
Description: | CLOUD SECURE;software as a service (SAAS) services featuring software for analyzing the configurations of public cloud provider services and account settings against standards-based and user-generated security and compliance controls; software as a service (SAAS) services featuring software for monitoring, analyzing, displaying and reporting on configuration risks relating to accounts running applications running on computing systems offered by public cloud service providers; computer software for monitoring the internal and external vulnerability of public cloud computing applications and user accounts; computer services for monitoring access rights and privileges to cloud computing services provided by infrastructure-as-a-service (IaaS) providers; consultation in the field of cloud computer security relating to the foregoing; |
Category: | CLOUD SECURE |
Brand: |
VIRTUAL PERIMETER ON DEMAND |
---|---|
Description: | computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy, visualize and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments;Monitoring of computer systems for security purposes, namely, detection of anomalous system activity and third-party user behaviors based on computer network traffic;computer services, namely, ensuring computer security by restricting network access to computers, controlling computer operating system and application security configuration parameters, monitoring and managing access rights and privileges to computers, and monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; cloud computing services, namely, providing software as a service (SaaS) services, namely, hosting software for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments, and infrastructure-as-a-service (IaaS) services, namely, hosting one or more virtual computers for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments; computer consultation in the field of cloud computer security; analysis of computer network traffic; establishing computer network communications baselines for the purpose of detecting anomalies and unauthorized changes; computer services, namely, analysis of computer network traffic associated with malicious or fraudulent activity; |
Category: | COMPUTER SECURITY SOFTWARE |
Brand: |
VPOD |
---|---|
Description: | computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy, visualize and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments;computer services, namely, ensuring computer security by restricting network access to computers, controlling computer operating system and application security configuration parameters, monitoring and managing access rights and privileges to computers, and monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; cloud computing services, namely, providing software as a service (SaaS) services, namely, hosting software for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments, and infrastructure-as-a-service (IaaS) services, namely, hosting one or more virtual computers for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments; computer consultation in the field of cloud computer security; analysis of computer network traffic; establishing computer network communications baselines for the purpose of detecting anomalies and unauthorized changes; computer services, namely, analysis of computer network traffic associated with malicious or fraudulent activity; |
Category: | COMPUTER SECURITY SOFTWARE |