FindOwnerSearch
Brands and Their Owners
NetCentrics Corporation contact information is shown below | |
Owner: | NETCENTRICS CORPORATION |
---|---|
Owner Address: | 205 Van Buren Street, Suite 420 Herndon VA 20170 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
MEETING STUDIO |
---|---|
Description: | Computer software for planning meetings, viewing and editing meeting agendas, managing meetings, and meeting follow-up, namely recording decisions, next actions, issues, and minutes generated at the meeting;MEETING;Providing temporary use of non-downloadable software for planning meetings, viewing and editing meeting agendas, managing meetings, and meeting follow-up, namely recording decisions, next actions, issues, and minutes generated at the meeting; |
Category: | COMPUTER SOFTWARE PLANNING MEETINGS |
Brand: |
REVENANT |
---|---|
Description: | Cloud computing featuring software for use designin, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems; Computer programming and maintenance of computer programs; Computer programming and software design; Computer services, namely, integration of computer software into multiple systems and networks; Computer services, namely, integration of private and public cloud computing environments; Computer software design and updating; Computer software installation and maintenance; Design and development of computer hardware and software; Design and testing of new products for others; Developing and updating computer software; Outsource service provider in the field of information technology consulting; Outsource service providers in the field of information technology; Platform as a service (PAAS) featuring computer software platforms for designin, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems; Providing virtual computer systems and virtual computer environments through cloud computing; Software as a service (SAAS) services featuring software for cyber-attack identification; Software as a service (SAAS) services featuring software for cyber-attack identification; Telecommunications technology consultancy; |
Category: | CLOUD COMPUTING FEATURING SOFTWARE |
Brand: |
WRAITH |
---|---|
Description: | Technology consultation in the fields of information technology, cybersecurity, and security analysis; Information technology consulting services; Computer programming consultancy in the fields of Information technology and cybersecurity; Technical support services, namely, providing technical advice relating to the operation of computers in the fields of cyber-security and information technology, troubleshooting in the nature of discovery and diagnosing of computer hardware and software problems, and troubleshooting in the nature of discovery and diagnosing of cyber-security and information technology problems; Platform as a service (PAAS) featuring computer software platforms for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyber-attack identification and verification systems, and security analysis systems; Software as a service (SAAS) services featuring software for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyber-attack identification and verification systems, and security analysis systems; Infrastructure as a service, namely, hosting software for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyberattack identification and verification systems, and security analysis systems; Providing temporary use of on-line non-downloadable cloud computing software for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyberattack identification and verification systems, and security analysis systems; Cloud computing services, namely, providing temporary use of non-downloadable cloud-based operating software platform for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyber-attack identification and verification systems, and security analysis systems; |
Category: | TECHNOLOGY CONSULTATION FIELDS |