CloudPassage, Inc.

 CloudPassage, Inc. contact information is shown below
Owner:CLOUDPASSAGE, INC.
Owner Address:95 3rd Street San Francisco CA 94103
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byCloudPassage, Inc.

Brand:

CLOUDPASSAGE

Description:

Computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments;CLOUD PASSAGE;Computer services, namely, ensuring computer security by restricting network access to computers, controlling computer operating system and application security configuration parameters, monitoring and managing access rights and privileges to computers, and monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; cloud computing services, namely, providing software as a service (SaaS) services, namely, hosting software for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments, and infrastructure-as-a-service (IaaS) services, namely, hosting one or more virtual computers for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments; computer consultation in the field of cloud computer security;

Category: COMPUTER SECURITY SOFTWARE
Brand:

DEEP CONTAINER MONITORING

Description:

computer software for use in automating the security of containerized computer program applications and environments, and for securing computer program applications and environments using containerization; computer software for automated firewall creation and management, vulnerability monitoring, file integrity monitoring, configuration and access management and monitoring;CONTAINER MONITORING;computer services, namely, electronic storage of computer program files for others for use in developing other computer software; providing temporary use of non-downloadable computer software for use in computer program application development; providing temporary use of non-downloadable computer software for use in automating the security of containerized computer program applications and environments, and for securing computer program applications and environments using containerization; providing temporary use of non-downloadable computer software for automated firewall creation and management, vulnerability monitoring, file integrity monitoring, configuration and access management and monitoring;

Category: COMPUTER SOFTWARE USE
Brand:

HALO

Description:

Computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments;

Category: COMPUTER SECURITY SOFTWARE
Brand:

HALO CLOUD SECURE

Description:

CLOUD SECURE;software as a service (SAAS) services featuring software for analyzing the configurations of public cloud provider services and account settings against standards-based and user-generated security and compliance controls; software as a service (SAAS) services featuring software for monitoring, analyzing, displaying and reporting on configuration risks relating to accounts running applications running on computing systems offered by public cloud service providers; computer software for monitoring the internal and external vulnerability of public cloud computing applications and user accounts; computer services for monitoring access rights and privileges to cloud computing services provided by infrastructure-as-a-service (IaaS) providers; consultation in the field of cloud computer security relating to the foregoing;

Category: CLOUD SECURE
Brand:

VIRTUAL PERIMETER ON DEMAND

Description:

computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy, visualize and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments;Monitoring of computer systems for security purposes, namely, detection of anomalous system activity and third-party user behaviors based on computer network traffic;computer services, namely, ensuring computer security by restricting network access to computers, controlling computer operating system and application security configuration parameters, monitoring and managing access rights and privileges to computers, and monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; cloud computing services, namely, providing software as a service (SaaS) services, namely, hosting software for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments, and infrastructure-as-a-service (IaaS) services, namely, hosting one or more virtual computers for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments; computer consultation in the field of cloud computer security; analysis of computer network traffic; establishing computer network communications baselines for the purpose of detecting anomalies and unauthorized changes; computer services, namely, analysis of computer network traffic associated with malicious or fraudulent activity;

Category: COMPUTER SECURITY SOFTWARE
Brand:

VPOD

Description:

computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy, visualize and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments;computer services, namely, ensuring computer security by restricting network access to computers, controlling computer operating system and application security configuration parameters, monitoring and managing access rights and privileges to computers, and monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; cloud computing services, namely, providing software as a service (SaaS) services, namely, hosting software for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments, and infrastructure-as-a-service (IaaS) services, namely, hosting one or more virtual computers for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments; computer consultation in the field of cloud computer security; analysis of computer network traffic; establishing computer network communications baselines for the purpose of detecting anomalies and unauthorized changes; computer services, namely, analysis of computer network traffic associated with malicious or fraudulent activity;

Category: COMPUTER SECURITY SOFTWARE