COMPUTER SECURITY SOFTWARE THAT PROVIDES

Brand Owner (click to sort) Address Description
BANKALARM MeterNet Corporation 100 West Grove Street #360 Reno NV 89509 Computer Security Software that provides real-time detection, authorization and monitoring during PC online banking;BANK ALARM;
GETSECRET NATURAL9 Beratung und IT Service GmbH Hallerstrasse 6 20146 Hamburg Germany Computer security software that provides for storing secret, confidential information for the private and business user;
SECURETERM HUMMINGBIRD LTD. 1 Sparks Avenue North York, Ontario M2H 2W1 Canada Computer security software that provides authenticated and encrypted terminal sessions, file transfer operations and forwarding of communications from personal computers or workstations to host computers;SECURE TERM;
TOP SECRET COMPUTER ASSOCIATES INTERNATIONAL, INC. One Computer Associates Plaza Islandia NY 11749 COMPUTER SECURITY SOFTWARE THAT PROVIDES AUTHENTICATION, NETWORK AND RESOURCE ACCESS CONTROL, LOGGING, MONITORING, REPORTING AND ADMINISTRATION WITHIN A SINGLE SYSTEM OR A MULTI-SYSTEM NETWORKED ENTERPRISE AND USER AND INSTRUCTION GUIDES, SOLD AS A UNIT;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.