FindOwnerSearch
Brands and Their Owners
| SECUREAGE TECHNOLOGY PTE. LTD. contact information is shown below | |
| Owner: | SECUREAGE TECHNOLOGY PTE. LTD. |
|---|---|
| Owner Address: | 74 Mackie Avenue Brighton BN1 8RB United Kingdom |
| Owner Web Site | |
| Owner Phone | |
| Owner Toll Free | |
| Owner Fax |
| Brand: |
CATCHPULSE |
|---|---|
| Description: | Downloadable computer software for encryption; Downloadable software for monitoring computer systems for detecting unauthorized access or data breaches;CATCH PULSE;Data encryption services; Monitoring of computer systems for detecting unauthorized access or data breach; Providing virtual computer systems and virtual computer environments through cloud computing; Computer services, namely, providing virtual and non virtual application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers of variable capacity to third party computing and data storage facilities; |
| Category: | DOWNLOADABLE COMPUTER SOFTWARE ENCRYPTION |
| Brand: |
PULSION |
|---|---|
| Description: | Downloadable computer software for encryption; Downloadable software for monitoring computer systems for detecting unauthorized access or data breaches;Data encryption services; Monitoring of computer systems for detecting unauthorized access or data breach; Providing virtual computer systems and virtual computer environments through cloud computing; Computer services, namely, providing virtual and non virtual application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers of variable capacity to third party computing and data storage facilities; |
| Category: | DOWNLOADABLE COMPUTER SOFTWARE ENCRYPTION |
| Brand: |
RESONANT |
|---|---|
| Description: | Downloadable computer software for encryption; Downloadable software for monitoring computer systems for detecting unauthorized access or data breaches;Data encryption services; Monitoring of computer systems for detecting unauthorized access or data breach; Providing virtual computer systems and virtual computer environments through cloud computing; Computer services, namely, providing virtual and non virtual application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers of variable capacity to third party computing and data storage facilities; |
| Category: | DOWNLOADABLE COMPUTER SOFTWARE ENCRYPTION |