FindOwnerSearch
Brands and Their Owners
| TECH SLAYERS LLC contact information is shown below | |
| Owner: | TECH SLAYERS LLC |
|---|---|
| Owner Address: | 4519 W. Sheridan St Phoenix AZ 85035 |
| Owner Web Site | |
| Owner Phone | |
| Owner Toll Free | |
| Owner Fax |
| Brand: |
LOKI |
|---|---|
| Description: | Downloadable computer software for providing network, internet, and computer security; Downloadable computer software for providing intrusion detection and prevention; Downloadable privacy control software; Downloadable content filtering software; Downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; Downloadable computer software for use in vulnerability scanning of networks and websites; Downloadable computer application software for analysis of computer network firewalls, servers and other network devices vulnerability to unauthorized access and internal computer network vulnerability; |
| Category: | DOWNLOADABLE COMPUTER SOFTWARE PROVIDING |
| Brand: |
LOKI |
|---|---|
| Description: | Computer consulting services in the field of security integration, network security, network architecture, and computer security; Software as a service (SaaS) for use in monitoring and tracking authorized access of computers and networks; Consulting services, namely, providing advice and consultation in the field of computer security services for protecting data against theft or unauthorized access; Development, design, and implementation services in the field of security, access, authorization, and identification systems for computers, and computer networks for others; Computer systems analysis in the field of security, access, authorization, and identification systems for computers and computer networks; Security verification of computer network firewalls, servers and other network devices to prevent unauthorized access to network and internal computer network vulnerability; |
| Category: | COMPUTER CONSULTING SERVICES |
| Brand: |
TECH SLAYERS |
|---|---|
| Description: | Downloadable computer software for providing network, internet, and computer security; Downloadable computer software for providing intrusion detection and prevention; Downloadable privacy control software; Downloadable content filtering software; Downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; Downloadable computer software for use in vulnerability scanning of networks and websites; Downloadable computer application software for analysis of computer network firewalls, servers and other network devices vulnerability to unauthorized access and internal computer network vulnerability;TECH; |
| Category: | DOWNLOADABLE COMPUTER SOFTWARE PROVIDING |
| Brand: |
TECH SLAYERS |
|---|---|
| Description: | TECH;Computer consulting services in the field of security integration, network security, network architecture, and computer security; Software as a service (SaaS) for use in monitoring and tracking authorized access of computers and networks; Consulting services, namely, providing advice and consultation in the field of computer security services for protecting data against theft or unauthorized access; Development, design, and implementation services in the field of security, access, authorization, and identification systems for computers, and computer networks for others; Computer systems analysis in the field of security, access, authorization, and identification systems for computers and computer networks; Security verification of computer network firewalls, servers and other network devices to prevent unauthorized access to network and internal computer network vulnerability; |
| Category: | TECH |
| Brand: |
TECHSLAYERS |
|---|---|
| Description: | The mark consists of the word TECHSLAYERS adjacent to an interrupted partial oval with a striped rectangular shape centered on the top of the shape, a line with curved ends below and parallel to the flat side of the shape, and a vertical line bisecting the long portion of the shape.;Downloadable computer software for providing network, internet, and computer security; Downloadable computer software for providing intrusion detection and prevention; Downloadable privacy control software; Downloadable content filtering software; Downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; Downloadable computer software for use in vulnerability scanning of networks and websites; Downloadable computer application software for analysis of computer network firewalls, servers and other network devices vulnerability to unauthorized access and internal computer network vulnerability;TECH SLAYERS;Computer consulting services in the field of security integration, network security, network architecture, and computer security; Software as a service (SaaS) for use in monitoring and tracking authorized access of computers and networks; Consulting services, namely, providing advice and consultation in the field of computer security services for protecting data against theft or unauthorized access; Development, design, and implementation services in the field of security, access, authorization, and identification systems for computers, and computer networks for others; Computer systems analysis in the field of security, access, authorization, and identification systems for computers and computer networks; Security verification of computer network firewalls, servers and other network devices to prevent unauthorized access to network and internal computer network vulnerability; |
| Category: |