COMPUTER INFORMATION SECURITY SOFTWARE

Brand Owner (click to sort) Address Description
DEEPSURFACE DEEPSURFACE SECURITY, INC. #58-112 13500 SW Pacific Hwy. Portland OR 97223 computer and information security software; computer software for computer and information security; computer software for managing security strategy and resources relating to the security risk industry; computer programs for managing security strategy and resources for use in the security risk industry; computer hardware relating to the security risk industry; predictive computer and network vulnerability management software; computer malware incident forensics software; cybersecurity incident response software; cybersecurity alarms; computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; all aforementioned software being downloadable and/or recorded software;DEEP SURFACE;
DISKERASER Communication Technologies, inc. 11710 Plaza America Drive, Suite 2000 Reston VA 20190 Computer information security software, namely software for data removal and hard disk sanitizing for quickly and completely deleting everything on a computer hard drive;DISK ERASER;
KANCHIL DEEPSURFACE SECURITY, INC. #58-112 13500 SW Pacific Hwy. Portland OR 97223 computer and information security software; computer software for computer and information security; computer software for managing security strategy and resources relating to the security risk industry; computer programs for managing security strategy and resources for use in the security risk industry; computer hardware relating to the security risk industry; predictive computer and network vulnerability management software; computer malware incident forensics software; cybersecurity incident response software; cybersecurity alarms; computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; all aforementioned software being downloadable and/or recorded software;
NO TRACE Communication Technologies, inc. 11710 Plaza America Drive, Suite 2000 Reston VA 20190 computer information security software, namely, software for programmable deletion of sensitive data that makes data retrieval by any means impossible;
PREDICTIVE RISK MANAGEMENT DEEPSURFACE SECURITY, INC. #58-112 13500 SW Pacific Hwy. Portland OR 97223 Computer and information security software; computer software for computer and information security; computer software for managing security strategy and resources relating to the security risk industry; computer programs for managing security strategy and resources for use in the security risk industry; computer hardware relating to the security risk industry; predictive computer and network vulnerability management software; computer malware incident forensics software; cybersecurity incident response software; cybersecurity alarms; computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; all aforementioned software being downloadable and/or recorded software;Providing online, nondownloadable computer and information security software; Providing online, nondownloadable computer software for computer and information security; Providing online, nondownloadable computer software for managing security strategy and resources relating to the security risk industry; Providing online, nondownloadable computer programs for managing security strategy and resources for use in the security risk industry; Providing online, nondownloadable predictive computer and network vulnerability management software; Providing online, nondownloadable computer malware incident forensics software; Providing online, nondownloadable cybersecurity incident response software; Providing online, nondownloadable computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks;
PREDICTIVE VULNERABILITY MANAGEMENT DEEPSURFACE SECURITY, INC. #58-112 13500 SW Pacific Hwy. Portland OR 97223 Computer and information security software; computer software for computer and information security; computer software for managing security strategy and resources relating to the security risk industry; computer programs for managing security strategy and resources for use in the security risk industry; computer hardware relating to the security risk industry; predictive computer and network vulnerability management software; computer malware incident forensics software; cybersecurity incident response software; cybersecurity alarms; computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; all aforementioned software being downloadable and/or recorded software;Providing online, nondownloadable computer and information security software; Providing online, nondownloadable computer software for computer and information security; Providing online, nondownloadable computer software for managing security strategy and resources relating to the security risk industry; Providing online, nondownloadable computer programs for managing security strategy and resources for use in the security risk industry; Providing online, nondownloadable predictive computer and network vulnerability management software; Providing online, nondownloadable computer malware incident forensics software; Providing online, nondownloadable cybersecurity incident response software; Providing online, nondownloadable computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method (400, 500, 600, 700) for synchronizing state information in a security gateway cluster comprising at least two nodes comprises the following steps. Synchronizing (403) state information by sending state information from a first node of said at least two nodes, detecting (401) in said security gateway cluster a predetermined irregularly occurring action, and initiating (402) synchronization of state information as a response to said action. The state information is sent to at least a second node of said at least two nodes. Corresponding computer program, computer program product, software entities (910, 920), a node (900) of a security gateway cluster (950) and a security gateway cluster are also presented.