COMPUTER SECURITY SOFTWARE RESTRICTING

Brand Owner (click to sort) Address Description
CENTER ZERO Cortez, Jessie S. 25420 Pierson Rd. Homeland CA 92548 Computer security software for restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;
CTZ CENTER ZERO Cortez, Jessie S. 25420 Pierson Rd. Homeland CA 92548 Computer security software for restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;
GUARDMAIL SecureWare, Inc. 430 Tenth Street, Ste. N-210 Atlanta GA 30318 computer security software for restricting communications over a network;GUARDMAIL;
OPTENET MAILSECURE ALLOT COMMUNICATIONS SPAIN, S.L.U. VÍA DE LAS DOS CASTILLAS, 9-1 PORTAL 2, 2 B, POZUELO DE ALARCÓN MADRID Spain Computer security software for restricting, monitoring, reporting and managing access to the Internet and other global computer networks;OPTE NETWORK MAIL SECURE;Computer programming services in the field of searching, classifying and filtering content on the Internet, in other global computer networks and other electronic media; computer programming in the fields of safe Internet navigation and electronic communications exchange; design and development of computer and software; technological and scientific services, and research and investigation related to same;
OPTENET WEBFILTER ALLOT COMMUNICATIONS SPAIN, S.L.U. VÍA DE LAS DOS CASTILLAS, 9-1 PORTAL 2, 2 B, POZUELO DE ALARCÓN MADRID Spain Computer security software for restricting, monitoring, reporting and managing access to the Internet and other global computer networks;OPTE NETWORK WEB FILTER;WEBFILTER;Computer programming services in the field of searching, classifying and filtering content on the Internet, in other global computer networks and other electronic media; computer programming in the fields of safe Internet navigation and electronic communications exchange; design and development of computers and software; technological and scientific services, and research and investigation related to same;
OPTENET WEBSECURE ALLOT COMMUNICATIONS SPAIN, S.L.U. VÍA DE LAS DOS CASTILLAS, 9-1 PORTAL 2, 2 B, POZUELO DE ALARCÓN MADRID Spain Computer security software for restricting, monitoring, reporting and managing access to the Internet and other global computer networks;OPTE NETWORK WEB SECURE;Computer programming services in the field of searching, classifying and filtering content on the Internet, in other global computer networks and other electronic media; computer programming in the fields of safety concerning Internet navigation and electronic communications exchange; design and development of computers and software; technological and scientific services, and research and investigation concerning same;
OPTIMIZED BY OPTENET OPTENET, Inc. Suite 901 2875 NE 191st Aventura FL 33180 Computer Security Software for restricting, monitoring, reporting and managing access to the Internet and other global computer networks;OPTIMIZED;Computer security software programming services, in the field of searching, classifying and filtering content on the Internet, in other global computer networks and other electronic media, excluding in the fields of Internet access, cable television, and telephone communications;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.