ENTERPRISE COMPUTER HARDWARE SOFTWARE

Brand Owner (click to sort) Address Description
ACTIVE THREAT DECEPTION ACALVIO TECHNOLOGIES, INC. 2520 Mission College Blvd., Suite 110 Santa Clara CA 95054 Enterprise computer hardware and software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;ACTIVE THREAT;
BACKBOX ETI-NET Inc. Suite 400 505 Maisonneuve West Montreal Quebec H3A3C2 Canada enterprise computer hardware and software for data backup and disaster recovery;BACK BOX;
INTELLIPORT Intellivence, Inc. 1400 Coleman Avenue, Suite F28 Santa Clara CA 95050 Enterprise computer hardware and software applications for providing access to and organization of enterprise data, applications and corporate resources, as well as services and sites available on the world wide web;
INTELLIPORT Intellivence, Inc. 1400 Coleman Avenue, Suite F28 Santa Clara CA 95050 ENTERPRISE COMPUTER HARDWARE AND SOFTWARE APPLICATIONS FOR PROVIDING ACCESS TO AND ORGANIZATION OF ENTERPRISE DATA, APPLICATIONS AND CORPORATE RESOURCES, AS WELL AS SERVICES AND SITES AVAILABLE ON THE WORLD WIDE WEB;INTELLIGENT PORT; INTELLIGENCE PORT; INTELLIGIBLE PORT;Color is not claimed as a feature of the mark.;
SHADOW NETWORKS ACALVIO TECHNOLOGIES, INC. 2520 Mission College Blvd., Suite 110 Santa Clara CA 95054 Enterprise computer hardware and software solutions for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;NETWORKS;
SHADOWNET ACALVIO TECHNOLOGIES, INC. 2520 Mission College Blvd., Suite 110 Santa Clara CA 95054 Enterprise computer hardware and software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;SHADOW NET;Software as a service (SAAS) services featuring enterprise software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An integrated hardware and software monitoring system for a remote computer includes an event monitoring module loaded on the remote computer. The event monitoring module includes a hardware event detector that detects hardware events on the remote computer that may need attention, and a software service detector that detects status of software running on the remote computer to determine if any of the software has failed or is not operating properly, and to output a software event as a result thereof. The monitoring system also includes a data transmission system for performing a data transmission so as to notify a support specialist over a network connection of a hardware event or software event detected by the event monitoring module. The monitoring system further includes a graphical user interface provided on a display of the remote computer for allowing a user of the remote computer to make selections as to which software services and hardware events are to be detected.