NetCentrics Corporation

 NetCentrics Corporation contact information is shown below
Owner:NETCENTRICS CORPORATION
Owner Address:205 Van Buren Street, Suite 420 Herndon VA 20170
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byNetCentrics Corporation

Brand:

MEETING STUDIO

Description:

Computer software for planning meetings, viewing and editing meeting agendas, managing meetings, and meeting follow-up, namely recording decisions, next actions, issues, and minutes generated at the meeting;MEETING;Providing temporary use of non-downloadable software for planning meetings, viewing and editing meeting agendas, managing meetings, and meeting follow-up, namely recording decisions, next actions, issues, and minutes generated at the meeting;

Category: COMPUTER SOFTWARE PLANNING MEETINGS
Brand:

REVENANT

Description:

Cloud computing featuring software for use designin, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems; Computer programming and maintenance of computer programs; Computer programming and software design; Computer services, namely, integration of computer software into multiple systems and networks; Computer services, namely, integration of private and public cloud computing environments; Computer software design and updating; Computer software installation and maintenance; Design and development of computer hardware and software; Design and testing of new products for others; Developing and updating computer software; Outsource service provider in the field of information technology consulting; Outsource service providers in the field of information technology; Platform as a service (PAAS) featuring computer software platforms for designin, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems; Providing virtual computer systems and virtual computer environments through cloud computing; Software as a service (SAAS) services featuring software for cyber-attack identification; Software as a service (SAAS) services featuring software for cyber-attack identification; Telecommunications technology consultancy;

Category: CLOUD COMPUTING FEATURING SOFTWARE
Brand:

WRAITH

Description:

Technology consultation in the fields of information technology, cybersecurity, and security analysis; Information technology consulting services; Computer programming consultancy in the fields of Information technology and cybersecurity; Technical support services, namely, providing technical advice relating to the operation of computers in the fields of cyber-security and information technology, troubleshooting in the nature of discovery and diagnosing of computer hardware and software problems, and troubleshooting in the nature of discovery and diagnosing of cyber-security and information technology problems; Platform as a service (PAAS) featuring computer software platforms for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyber-attack identification and verification systems, and security analysis systems; Software as a service (SAAS) services featuring software for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyber-attack identification and verification systems, and security analysis systems; Infrastructure as a service, namely, hosting software for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyberattack identification and verification systems, and security analysis systems; Providing temporary use of on-line non-downloadable cloud computing software for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyberattack identification and verification systems, and security analysis systems; Cloud computing services, namely, providing temporary use of non-downloadable cloud-based operating software platform for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyber-attack identification and verification systems, and security analysis systems;

Category: TECHNOLOGY CONSULTATION FIELDS