FindOwnerSearch
Brands and Their Owners
| LIFARS, LLC contact information is shown below | |
| Owner: | LIFARS, LLC |
|---|---|
| Owner Address: | 244 Fifth Avenue, Suite 2035 New York NY 10001 |
| Owner Web Site | |
| Owner Phone | |
| Owner Toll Free | |
| Owner Fax |
| Brand: |
BREACH VACCINE |
|---|---|
| Description: | BREACH;Information technology security monitoring services, namely, monitoring and maintaining information technology infrastructures of enterprises to guard data and information from unauthorized access; information technology security incident response services, namely, restricting unauthorized computer network access by users without credentials; Managed information technology security services, namely, computer security threat analysis and testing for protecting data; Threat hunting computer security services, namely, detection of ongoing and zero-day cyberattacks and advanced persistent threats as well as other advanced hackers tactics, techniques and procedures and indicators of compromise; |
| Category: | BREACH |
| Brand: |
CYBER VACCINE |
|---|---|
| Description: | Downloadable computer software for use in collecting, filtering, normalizing, enriching, processing, and analyzing system, application and security event data from computers and computer networks; downloadable computer software for use in transmitting and receiving system, application and security event data from computers and computer networks for detecting, monitoring, reporting, analyzing and removing malicious code, such as ransomware, nation states cyber military infections, commodity criminal malware, and any other computer code and programs that is considered malicious and unwanted;CYBER; |
| Category: | DOWNLOADABLE COMPUTER SOFTWARE USE |
| Brand: |
CYBERCREO |
|---|---|
| Description: | Computer simulation security training;Computer and computer network security consulting services, namely, vulnerability assessment of computer devices by running a battery of technical tests and verifying vulnerabilities using manual and automated means; ascertaining cybersecurity and computer security compliance risks for others, determining adequate cybersecurity risk protective measures for others, computer security consulting services, namely, influencing the client organization's culture with effective communication and awareness regarding computer security risks, developing, leading and managing cybersecurity goals and developing a cybersecurity strategy; developing computer security compliance programs and developing an overall cybersecurity operational strategy; implementation and provision of managed computer and network security services; cyber threat hunting services, namely, computer network security consulting services; computer and network security testing services featuring the performance of table top exercises used to test incident response plans; computer risk assessment advisory services, namely, enumerating vulnerabilities by using a systematic review of security weaknesses, assigning severity levels to each vulnerability to prioritize remediation, and analyzing results using a variety of manual and automated tests and their validations; computer security consulting services featuring emergency response team assessments that provide vulnerability classifications of high, medium, or low and a description of vulnerability impact towards a business environment; ransomware advisory services, namely, computer security consultancy regarding ransomware threats and minimizing computer network disruption during ransomware threats; computer and network security management and administration advisory services; internal and external computer network penetration testing; computer forensics imaging and analysis; computer security consulting services in the nature of providing non-legal expert witness consulting regarding creating evidence target lists for forensics analysis, initiating a chain of custody for evidence, processing and authentication of evidence, and documenting evidence in the nature of photographs, logs from the forensic preservation process, and metadata review of computer records; digital computer forensics investigation; cyber resiliency advisory, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software code review for security vulnerabilities; |
| Category: | COMPUTER SIMULATION SECURITY TRAINING |
| Brand: |
HACKBIT |
|---|---|
| Description: | HACK BIT;Computer and computer network security consulting services, namely, internal and external computer network penetration testing; Computer security services in the nature of vulnerability assessment of computer devices by running a battery of technical tests and verifying vulnerabilities using manual and automated means; Computer security services in the nature of software code review for security vulnerabilities; Computer risk assessment advisory services, namely, enumerating vulnerabilities by using a systematic review of security weaknesses, assigning severity levels to each vulnerability to prioritize remediation, and analyzing results using a variety of manual and automated tests and their validations; Cyber resiliency advisory, namely, computer security consultancy in the field of scanning and penetration testing of applications, computers and networks to assess information security vulnerability; Computer security services in the nature of ascertaining cybersecurity and computer security compliance risks for others, determining adequate cybersecurity risk protective measures for others, computer security consulting services, namely, influencing the client organization's culture with effective communication and awareness regarding computer security risks, developing, leading and managing cybersecurity goals and developing a cybersecurity strategy; Computer security services in the nature of cyber threat hunting services; Computer security consulting services featuring emergency response team assessments that provide vulnerability classifications of high, medium, or low and a description of vulnerability impact towards a business environment; Computer and network security management and administration advisory services; |
| Category: | HACK BIT |
| Brand: |
LIBERTY |
|---|---|
| Description: | Information technology network security monitoring and consulting services, namely, providing computer security strategies to enterprises to help them guard their intellectual property, data and network infrastructure against cyber security attack, and conducting computer security assessments involving penetration testing of computers and networks to determine information security vulnerability; Information technology security monitoring services, namely, monitoring and maintaining information technology infrastructures of enterprises to guard data and information from unauthorized access; information technology security incident response services, namely, restricting unauthorized computer network access by users without credentials; Managed information technology security services, namely, computer security threat analysis and testing for protecting data; Threat hunting computer security services, namely, detection of ongoing and zero-day cyberattacks and advanced persistent threats as well as other advanced hackers tactics, techniques and procedures and indicators of compromise; |
| Category: | INFORMATION TECHNOLOGY NETWORK SECURITY MONITORING |
| Brand: |
LIFARS |
|---|---|
| Description: | Computer simulation security training;Computer and computer network security consulting services, namely, vulnerability assessment of computer devices by running a battery of technical tests and verifying vulnerabilities using manual and automated means; outsourced CISO (Chief Information Security Officer) services comprising the management of strategic computer security programs assessed using benchmarks in the nature of a recognized cybersecurity framework, and the development of an information security risk management program; ascertaining cybersecurity and computer security compliance risks for others, determining adequate cybersecurity risk protective measures for others, computer security consulting services, namely, influencing the client organization's culture with effective communication and awareness regarding computer security risks, developing, leading and managing cybersecurity goals and developing a cybersecurity strategy; developing computer security compliance programs and developing an overall cybersecurity operational strategy; implementation and provision of managed computer and network security services; cyber threat hunting services, namely, computer network security consulting services; computer and network security testing services featuring the performance of table top exercises used to test incident response plans; computer risk assessment advisory services, namely, enumerating vulnerabilities by using a systematic review of security weaknesses, assigning severity levels to each vulnerability to prioritize remediation, and analyzing results using a variety of manual and automated tests and their validations; computer security consulting services featuring emergency response team assessments that provide vulnerability classifications of high, medium, or low and a description of vulnerability impact towards a business environment; ransomware advisory services, namely, computer security consultancy regarding ransomware threats and minimizing computer network disruption during ransomware threats; computer and network security management and administration advisory services; internal and external computer network penetration testing; computer forensics imaging and analysis; computer security consulting services in the nature of providing non-legal expert witness consulting regarding creating evidence target lists for forensics analysis, initiating a chain of custody for evidence, processing and authentication of evidence, and documenting evidence in the nature of photographs, logs from the forensic preservation process, and metadata review of computer records; digital computer forensics investigation; cyber resiliency advisory, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software code review for security vulnerabilities; |
| Category: | COMPUTER SIMULATION SECURITY TRAINING |
| Brand: |
LIFE'S A BREACH |
|---|---|
| Description: | Educational and entertainment services, namely, a continuing program featuring stories, news, interviews, information, commentary in the field of information technology, network security, forensics and data theft accessible by computer networks and satellite; Educational and entertainment services, namely, providing audio and video podcasts featuring stories, news, interviews, information, commentary in the field of information technology, network security, forensics and data theft;Downloadable podcasts in the field of information technology, network security, forensics and data theft;LIFE IS A BREACH;Clothing, namely, t-shirts, caps being headwear, baseball hats, bandanas, sweatshirts, and polo shirts; |
| Category: | EDUCATIONAL ENTERTAINMENT SERVICES |
| Brand: |
LIFE'S A BREACH |
|---|---|
| Description: | Educational and entertainment services, namely, a continuing program featuring stories, news, interviews, information, commentary in the field of information technology, network security, forensics and data theft accessible by computer networks and satellite; Educational and entertainment services, namely, providing audio and video podcasts featuring stories, news, interviews, information, commentary in the field of information technology, network security, forensics and data theft; Entertainment and educational services, namely, providing podcasts in the fields of cybersecurity, information technology, network security, forensics, and data theft;LIFE IS A BREACH; |
| Category: | EDUCATIONAL ENTERTAINMENT SERVICES |
| Brand: |
MONGOOSE |
|---|---|
| Description: | Downloadable computer programs and software for use in providing visibility, management, and monitoring of computer networks, computer stations, handheld electronic devices, and cloud computing resources; Downloadable computer programs for use in tracking software and data in computer networks, computer stations, handheld electronic devices, and cloud computing resources, identifying unauthorized, new or unknown software and data files, and blocking unauthorized access; Downloadable computer programs for preventing unauthorized access to computer networks, computer stations, handheld electronic devices, and cloud computing resources; Downloadable computer software for use in providing security for computer networks, computer stations, handheld electronic devices, and cloud computing resources;Computer network, application and endpoint security services, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and analysis of the malware by reverse engineering and other means; Computer security services in the nature of identifying and analyzing existing known threats to develop custom strategies for anticipating and safeguarding against future anomalous activity on computer networks, computer stations, handheld electronic devices, and cloud computing resources; Computer security services in the nature of surveillance and assessment of existing privileges of users of computer networks, computer stations, handheld electronic devices, and cloud computing resources, for network or mobile resources based on authenticated credentials; Installation and maintenance of computer software relating to computer security and mitigation of associated risks; Installation and maintenance of software-as-a-service featuring software for use in providing visibility and threat assessment, prevention, analysis, detection, and response for computer networks, computer stations, and handheld electronic devices; Computer security services for protecting data and information, namely, providing security for computer networks, computer stations, and handheld electronic devices; Installation and maintenance of online non-downloadable intrusion detection software; Computer security services, namely, tracking software and data in computer networks, computer stations, and handheld electronic devices, identifying unauthorized, new or unknown software and data files, and blocking unauthorized access; Computer security software, namely, temporary use of online, non-downloadable computer software for use in threat intelligence, compromise prevention, incident analysis, anomaly detection, and incident response, including on a near real-time basis, computer networks, computer stations, handheld electronic devices, and cloud computing resources; |
| Category: | DOWNLOADABLE COMPUTER PROGRAMS SOFTWARE |
| Brand: |
RANSOMWARE VACCINE |
|---|---|
| Description: | RANSOM WARE VACCINE;RANSOMWARE;Computer security consultancy; |
| Category: | RANSOM WARE VACCINE |
| Brand: |
RAN_SIM |
|---|---|
| Description: | Computer security consultancy services to assess information security vulnerabilities and improve computer and network security in order to prevent criminal activity; software as a service (SAAS) services featuring software used in the field of network security providing live attack simulations of current threat actors in order to test network infrastructure resilience to viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs found on computers, networks, and electronic devices; |
| Category: | COMPUTER SECURITY CONSULTANCY SERVICES |
| Brand: |
THE DAILY TRUTH |
|---|---|
| Description: | DAILY;Computer and computer network security consulting services, namely, vulnerability assessment of computer devices by running a battery of technical tests and verifying vulnerabilities using manual and automated means; |
| Category: | DAILY |