COMPUTER PROGRAMS COMPUTER SECURITY

Brand Owner (click to sort) Address Description
ALIENVAULT AlienVault, Inc. 1875 S. Grant Street, Suite 200 San Mateo CA 94402 Computer programs for computer security; computer hardware containing computer security software;Color is not claimed as a feature of the mark.;Granting of computer software licenses relating to computer security;Computer systems analysis for the installation of computer systems in the field of computer security; design of computer networks for others in the field of computer security; design and development of computer software, for others, in the field of computer security; computer consultancy in the field of computer security; computer programming for others in the field of computer security; design of computer software in the field of computer security; installation of computer software in the field of computer security; rental of computer software in the field of computer security; maintenance of computer software in the field of computer security; updating of computer software for others in the field of computer security; duplication of computer programs in the field of computer security; conversion of computer program data or information in the field of computer security; recovery of computer data in the field of computer security; creating and maintaining web sites for others in the field of computer security; hosting others' web sites on a computer server for a global computer network in the field of computer security; technical consulting, namely, technical project studies in the field of computer security; data processing using computers in connection with computer security; operation and maintenance of software in computer systems in relation to computer security;
ALIENVAULT Open Source Security Information; Management S.L. Mártires Concepcionistas, 11 - 2° A E-28006 Madrid Spain Computer programs for computer security; computer hardware containing computer security software;Color is not claimed as a feature of the mark.;Granting of computer software licenses relating to computer security;Computer systems analysis for the installation of computer systems in the field of computer security; design of computer networks for others in the field of computer security; design and development of computer software, for others, in the field of computer security; computer consultancy in the field of computer security; computer programming for others in the field of computer security; design of computer software in the field of computer security; installation of computer software in the field of computer security; rental of computer software in the field of computer security; maintenance of computer software in the field of computer security; updating of computer software for others in the field of computer security; duplication of computer programs in the field of computer security; conversion of computer program data or information in the field of computer security; recovery of computer data in the field of computer security; creating and maintaining web sites for others in the field of computer security; hosting others' web sites on a computer server for a global computer network in the field of computer security; technical consulting, namely, technical project studies in the field of computer security; data processing using computers in connection with computer security; operation and maintenance of software in computer systems in relation to computer security;
CYBERC4 KRATOS DEFENSE & SECURITY SOLUTIONS, INC. 10680 Treena Street, 6th Floor San Diego CA 92131 Computer programs for computer security; computer hardware containing computer security software; cyber security computer hardware and software to protect computer networks against unauthorized intrusion, data theft, compromise, infiltration and corruption by hackers, and other risks as it relates to computer security; cyber security appliances, namely, computer hardware and software combinations for protecting computer networks against unauthorized intrusion, data theft, compromise, infiltration and corruption by hackers, and other risks relating to computer security, for providing real-time Security Information Event Management (SIEM) for satellite networks for use in providing situational awareness across network and security devices, for providing real-time monitoring and recording and built-in alerting for use in protecting against insider threats, for providing cyber security hardware and software that passes secure information across classified and unclassified network domains, and for providing computer hardware and software combinations that reverse engineer internet protocol out of an RF link; cyber security software and software incorporating algorithms for use in harden system configuration against tampering;CYBER C FOUR;Computer security service, namely, providing real-time Security Information Event Management (SIEM) for satellite networks for use in providing situational awareness across network and security devices;
CYBERMAXX CYBERMAXX 2115 YEAMAN PL NASHVILLE TN 37206 Computer programs for computer security protection, namely, to monitor computer systems and detect unauthorized access or data breaches;CYBER MAXX;
DECINSPECT DIGITAL EQUIPMENT CORPORATION Maynard MA computer programs for computer security applications and analysis, and program manuals sold or distributed therewith as a unit;dec inspect;
MALWARERADAR PANDA SECURITY, S.L. Gran Vía de Don Diego López de Haro, 4 Bilbao, Bizkaia 48001 Spain Computer programs for computer security; software and hardware for computer security; computer programs for prevention of computer risks; software and hardware for prevention of computer risks;MALWARE RADAR; MAL SOFTWARE RADAR;Color is not claimed as a feature of the mark.;granting of computer software licenses in the field of computer security and/or prevention of computer risks;Computer systems analysis for the installation of computer systems in the field of computer security and/or prevention of computer risks; design of computer networks for others in the field of computer security and/or prevention of computer risks; design and development of computer hardware and software, for others in the field of computer security and/or prevention of computer risks; consultancy in the field of computers in the field of computer security and/or prevention of computer risks; rental of computers in the field of computer security and/or prevention of computer risks; computer programming for others in the field of computer security and/or prevention of computer risks; design of computer software in the field of computer security and/or prevention of computer risks; installation of computer software in the field of computer security and/or prevention of computer risks; rental of computer software in the field of computer security and/or prevention of computer risks; maintenance of computer software in the field of computer security and/or prevention of computer risks; updating of computer software for others in the field of computer security and/or prevention of computer risks; duplication of computer programs in the field of computer security and/or prevention of computer risks; conversion of computer program data or information in the field of computer security and/or prevention of computer risks; recovery of computer data in the field of computer security and/or prevention of computer risks; creating and maintaining Web sites for others in the field of computer security and/or prevention of computer risks; hosting the Web sites of others on a computer server for a global computer network in the field of computer security and/or prevention of computer risks; technical consulting, namely, technical project studies in the field of computer security and/or prevention of computer risks; computer consultation services in the field of computer security; services of information processing using computers in connection with computer security and/or prevention of computer risks; operation and maintenance of software in computer systems in connection with computer security and/or prevention of computer risks;
SAI Security Applications, Inc. 300 Westage Business Center - Suite 210 Fishkill NY 12524 computer programs for computer security used in connection with data processing;SAI;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system includes various security measures to insure that semi-permanent operating programs, such a boot blocks and firmware, are updated properly. For example, the system may include a security switch that can enable a host computer to load a replacement program into another computer, such as an appliance server for example, if the other computer fails. Also, if a replacement program is being loaded over a network connection that fails, the loading can resume automatically after re-establishment of the network connection. In addition, certain programs, such as boot blocks, may be verified in an execution memory, such as RAM, and loaded into a more permanent storage memory, such as ROM, only if verified.