COMPUTER SOFTWARE COMPUTER SECURITY

Brand Owner (click to sort) Address Description
ACTIVEWORX Tripwire, Inc. 308 SW 2nd Avenue Portland OR 97204 Computer software for computer security and internet security;ACTIVE WORK;
ACTIVEWORX ACTIVEWORX, INC. 4801 LINTON BLVD. #11A-577 DELRAY BEACH FL 33445 Computer software for computer security and internet security;ACTIVE WORK;
ACTIVEWORX Dell, Jeffrey, Alan #224 5130 Las Verdes Circle Delray Beach FL 33484 Computer software for computer security and internet security;ACTIVE WORK;
ARAMIS Aizoon S.r.l. Strada Del Lionetto 6 I-10146 Torino (TO) Italy Computer software for computer security, namely, software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers; downloadable electronic publications in the nature of magazines, articles and manuals in the field of computer security;Business risk management services; business risk assessment services;Maintenance and updating of computer software relating to computer security and prevention computer risks;
AUDITSTAR TechStar International Corporation P.O. Box 1690 Flowery Branch GA 30542 COMPUTER SOFTWARE FOR COMPUTER SECURITY, SYSTEM INTEGRITY, AND DATA CHECKING AND AUDITING;AUDIT STAR;
BACKSTORY Chronicle 1600 Amphitheatre Parkway Mountain View CA 94043 computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination; computer software used to maintain security over or in computer networks, web applications and/or digital data; computer software for providing computer security; computer software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; computer software for cybersecurity, data analytics, computer security information and event management (SIEM); computer software for monitoring, gathering, analyzing and presenting information from computer network and security devices for computer and network vulnerability management and security compliance and for real-time analysis and monitoring of security alerts;BACK STORY;software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, management, remediation, and elimination; computer security consultancy; software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing computer security; application service provider featuring software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for cybersecurity, data analytics, computer security information and event management (SIEM); software as a service (SaaS), namely, providing temporary use of non-downloadable software for monitoring, gathering, analyzing and presenting information from computer network and security devices for computer and network vulnerability management and security compliance and for real-time analysis and monitoring of security alerts;
CHRONICLE Chronicle 1600 Amphitheatre Parkway Mountain View CA 94043 computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination; computer software used to maintain security over or in computer networks, web applications and/or digital data; computer software for providing computer security; computer software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices;software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, management, remediation, and elimination; computer security consultancy; software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing computer security; application service provider featuring software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices;
ENTER SPACE JERICHO SYSTEMS CORPORATION Suite 250 6600 LBJ Freeway Dallas TX 75240 Computer Software for computer security;
ENTERSPACE SECURITY SUITE JERICHO SYSTEMS CORPORATION Suite 250 6600 LBJ Freeway Dallas TX 75240 Computer software for computer security in the nature of enterprise security software which performs real-time enterprise authorization;ENTER SPACE SECURITY SUITE;SECURITY SUITE;
ENTERSPACE TECHNOLOGY JERICHO SYSTEMS CORPORATION Suite 250 6600 LBJ Freeway Dallas TX 75240 COMPUTER SOFTWARE FOR COMPUTER SECURITY;TECHNOLOGY;
ENTERSPACING JERICHO SYSTEMS CORPORATION Suite 250 6600 LBJ Freeway Dallas TX 75240 Computer software for computer security;
ETAP Graphus Inc. 11111 Chessington Place Reston VA 20194 Computer software for computer security;ELECTRONIC TAP;
MADE SAFE Solarsoft Ltd. Philips House Station Road Hook, Hampshire RG27 9HD United Kingdom Computer software for computer security purposes, namely, anti-virus and firewall software, electronic databases of approved and safe web sites that are suitable for browsing by minors, and software for blocking unwanted pop-up windows; software for controlling and limiting access to computer systems, computer utility software, software to prevent access to data by hackers; software to enable the secure storage of data; encryption software; software to enable the creation and sending of encrypted e-mails; software to enable the permanent deletion of data from computers; hard disk-drive maintenance and management software; web browser content monitoring, filtering and blocking software; file management software for creating, reading and maintaining data files for use in multiple computer architectures; file content monitoring software, namely, computer software to monitor the content of computer files; data storage and retrieval software; computer software to back-up computer data, including computer software that can back up computer data by accessing the data via the internet; computer systems security audit software, namely, computer software that automatically performs an audit to assess the security of computer software programs; computer anti-theft software, namely, computer software to prevent theft of computer hardware;Consultancy in the field of information technology; computer systems analysis and consultancy; computer programming services for others; computer software design for others; updating of computer software for others; performing audits to assess the degree of security of the computer system of others; recovery of computer data; creating and maintaining websites for others; hosting the websites of others on a computer server for a global computer network;
MSR Red Rake Suite 220 5810 Ravina Court Colorado Springs CO 80919 COMPUTER SOFTWARE FOR COMPUTER SECURITY, COMPUTER POLICY COMPLIANCE, MONITORING COMPUTER SYSTEM USE AND NETWORK ACTIVITY;
NPC DATAGUARD NO PANIC COMPUTING INC. Suite 120 25 Royal Crest Court Markham, Ontario L3R9X4 Canada computer software for computer security, data encryption, and technical support relating to computers, computer hardware, computer peripherals, computer software, and communication and consumer electronics products;NO PANIC COMPUTING DATA GUARD;
ON THE FLY Hauri Inc. Seoul 156-754 Republic of Korea Computer software for computer security;
PSDETECT PentaSafe, Incorporated 802 Lovett Boulevard Houston TX 77006 COMPUTER SOFTWARE FOR COMPUTER SECURITY, NAMELY TRACKING, REPORTING, AND HANDLING SYSTEM EVENTS THAT MAY JEOPARDIZE SYSTEM SECURITY;PENTA SAFE DETECT;
PSSECURE PentaSafe, Incorporated 802 Lovett Boulevard Houston TX 77006 COMPUTER SOFTWARE FOR COMPUTER SECURITY, NAMELY PROTECTION FROM UNAUTHORIZED ACCESS;PENTA SAFE SECURE;
RUBICA RUBICA, INC. 6947 COAL CREEK PARKWAY SE, SUITE 389 RENTON WA 98059 computer software for computer security and prevention of risks to computers, mobile devices, and other electronic equipment; computer software for use in the prevention of hacking of computers, mobile devices, and other electronic equipment;Consultation in the field of data theft; Consulting services in the field of security threat assessment, namely, consulting regarding physical security of computer systems and premises housing computer systems;Software as a Service (SaaS) services featuring software for computer security and prevention of risks to computers, mobile devices, and other electronic equipment; Software as a Service (SaaS) services featuring software for use in the prevention of hacking of computers, mobile devices, and other electronic equipment; computer consultation in the field of computer security; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security consultancy; Computer security services for protecting data and information from unauthorized access; Computer security services, namely, security risk and threat consultation in the field of the security of, and vulnerability to breaches and hacking of, computer and electronic information infrastructure; computer security consultation in the field of data theft;
RUBICA Cadir Idris, Inc. 6947 Coal Creek Parkway SE, Suite 389 Renton WA 98059 computer software for computer security and prevention of risks to computers, mobile devices, and other electronic equipment; computer software for use in the prevention of hacking of computers, mobile devices, and other electronic equipment;Consultation in the field of data theft; Consulting services in the field of security threat assessment, namely, consulting regarding physical security of computer systems and premises housing computer systems;Software as a Service (SaaS) services featuring software for computer security and prevention of risks to computers, mobile devices, and other electronic equipment; Software as a Service (SaaS) services featuring software for use in the prevention of hacking of computers, mobile devices, and other electronic equipment; computer consultation in the field of computer security; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security consultancy; Computer security services for protecting data and information from unauthorized access; Computer security services, namely, security risk and threat consultation in the field of the security of, and vulnerability to breaches and hacking of, computer and electronic information infrastructure; computer security consultation in the field of data theft;
SAFE: SECURITY AWARENESS FOR EVERYONE Security Awareness, Inc. 3837 Northdale Blvd. Suite 320 Tampa FL 33624 Computer software for computer security education;SAFE SECURITY AWARENESS FOR EVERY 1;
SHADOOP Zettaset 1945 Landings Drive Mountain View CA 94043 Computer software for computer security, namely, for encryption, ensuring database security, ensuring log-in security and for preventing manipulation of source code;Installation of computer software; Maintenance of computer software; Computer software design;
TRANSFORM THE INTERNET INTO THE ENTERNET JERICHO SYSTEMS CORPORATION Suite 250 6600 LBJ Freeway Dallas TX 75240 Computer software for computer security; downloadable computer software for computer security;
VERIFIABLE INTENT Curriculum Corporation P.O. Box 116 Maineville OH 45034 computer software for computer security;
VIRADICATION Hauri Inc. Seoul 156-754 Republic of Korea Computer software for computer security;
VIRTUAL FIX SecureAll, Inc 3266 Capriana Circle San Jose CA 95135 Computer software for computer security;
VULNERABILITY FIREWALL SecureAll, Inc 3266 Capriana Circle San Jose CA 95135 Computer software for Computer Security;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.