ENTERPRISE COMPUTER SOFTWARE THAT MONITORS

Brand Owner (click to sort) Address Description
ACR/INSTREAM PRECISELY SOFTWARE INCORPORATED 1700 District Avenue, Suite 300 Burlington MA 01803 Enterprise computer software that monitors information within varied processing steps of other computer software and computer systems to detect missed processing steps, incorrect processing sequences, duplicate processing, duplicate business artifacts, processing delays, and inaccurate, inconsistent, or incomplete information; computer software that issues alerts, audit trails, and reports concerning the foregoing; and manuals distributed therewith as a unit;ACR/IN STREAM;
INFOGIX ASSURE PRECISELY SOFTWARE INCORPORATED 1700 District Avenue, Suite 300 Burlington MA 01803 Enterprise computer software that monitors information within varied processing steps of other computer software and computer systems to detect inaccurate, inconsistent, or incomplete information and monitors processing delays, erroneous duplication, and processing sequence errors; computer software that issues alerts, audit trails, and reports concerning the foregoing; and manuals distributed therewith as a unit;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An intrusion detection system (IDS) that uses application monitors for detecting application-based attacks against computer systems. The IDS implements application monitors in the form of a software program to learn and monitor the behavior of system programs in order to detect attacks against computer hosts. The application monitors implement machine learning algorithms to provide a mechanism for learning from previously observed behavior in order to recognize future attacks that it has not seen before. The application monitors include temporal locality algorithms to increased the accuracy of the IDS. The IDS of the present invention may comprise a string-matching program, a neural network, or a time series prediction algorithm for learning normal application behavior and for detecting anomalies.