Brands and Their Owners
Brand | Owner (click to sort) | Address | Description |
---|---|---|---|
ACTIVEWORX | Tripwire, Inc. | 308 SW 2nd Avenue Portland OR 97204 | Computer software for computer security and internet security;ACTIVE WORK; |
ACTIVEWORX | ACTIVEWORX, INC. | 4801 LINTON BLVD. #11A-577 DELRAY BEACH FL 33445 | Computer software for computer security and internet security;ACTIVE WORK; |
ACTIVEWORX | Dell, Jeffrey, Alan | #224 5130 Las Verdes Circle Delray Beach FL 33484 | Computer software for computer security and internet security;ACTIVE WORK; |
ARAMIS | Aizoon S.r.l. | Strada Del Lionetto 6 I-10146 Torino (TO) Italy | Computer software for computer security, namely, software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers; downloadable electronic publications in the nature of magazines, articles and manuals in the field of computer security;Business risk management services; business risk assessment services;Maintenance and updating of computer software relating to computer security and prevention computer risks; |
AUDITSTAR | TechStar International Corporation | P.O. Box 1690 Flowery Branch GA 30542 | COMPUTER SOFTWARE FOR COMPUTER SECURITY, SYSTEM INTEGRITY, AND DATA CHECKING AND AUDITING;AUDIT STAR; |
|
|||
BACKSTORY | Chronicle | 1600 Amphitheatre Parkway Mountain View CA 94043 | computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination; computer software used to maintain security over or in computer networks, web applications and/or digital data; computer software for providing computer security; computer software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; computer software for cybersecurity, data analytics, computer security information and event management (SIEM); computer software for monitoring, gathering, analyzing and presenting information from computer network and security devices for computer and network vulnerability management and security compliance and for real-time analysis and monitoring of security alerts;BACK STORY;software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, management, remediation, and elimination; computer security consultancy; software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing computer security; application service provider featuring software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for cybersecurity, data analytics, computer security information and event management (SIEM); software as a service (SaaS), namely, providing temporary use of non-downloadable software for monitoring, gathering, analyzing and presenting information from computer network and security devices for computer and network vulnerability management and security compliance and for real-time analysis and monitoring of security alerts; |
CHRONICLE | Chronicle | 1600 Amphitheatre Parkway Mountain View CA 94043 | computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination; computer software used to maintain security over or in computer networks, web applications and/or digital data; computer software for providing computer security; computer software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices;software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, management, remediation, and elimination; computer security consultancy; software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing computer security; application service provider featuring software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; |
ENTER SPACE | JERICHO SYSTEMS CORPORATION | Suite 250 6600 LBJ Freeway Dallas TX 75240 | Computer Software for computer security; |
ENTERSPACE SECURITY SUITE | JERICHO SYSTEMS CORPORATION | Suite 250 6600 LBJ Freeway Dallas TX 75240 | Computer software for computer security in the nature of enterprise security software which performs real-time enterprise authorization;ENTER SPACE SECURITY SUITE;SECURITY SUITE; |
ENTERSPACE TECHNOLOGY | JERICHO SYSTEMS CORPORATION | Suite 250 6600 LBJ Freeway Dallas TX 75240 | COMPUTER SOFTWARE FOR COMPUTER SECURITY;TECHNOLOGY; |
ENTERSPACING | JERICHO SYSTEMS CORPORATION | Suite 250 6600 LBJ Freeway Dallas TX 75240 | Computer software for computer security; |
ETAP | Graphus Inc. | 11111 Chessington Place Reston VA 20194 | Computer software for computer security;ELECTRONIC TAP; |
MADE SAFE | Solarsoft Ltd. | Philips House Station Road Hook, Hampshire RG27 9HD United Kingdom | Computer software for computer security purposes, namely, anti-virus and firewall software, electronic databases of approved and safe web sites that are suitable for browsing by minors, and software for blocking unwanted pop-up windows; software for controlling and limiting access to computer systems, computer utility software, software to prevent access to data by hackers; software to enable the secure storage of data; encryption software; software to enable the creation and sending of encrypted e-mails; software to enable the permanent deletion of data from computers; hard disk-drive maintenance and management software; web browser content monitoring, filtering and blocking software; file management software for creating, reading and maintaining data files for use in multiple computer architectures; file content monitoring software, namely, computer software to monitor the content of computer files; data storage and retrieval software; computer software to back-up computer data, including computer software that can back up computer data by accessing the data via the internet; computer systems security audit software, namely, computer software that automatically performs an audit to assess the security of computer software programs; computer anti-theft software, namely, computer software to prevent theft of computer hardware;Consultancy in the field of information technology; computer systems analysis and consultancy; computer programming services for others; computer software design for others; updating of computer software for others; performing audits to assess the degree of security of the computer system of others; recovery of computer data; creating and maintaining websites for others; hosting the websites of others on a computer server for a global computer network; |
MSR | Red Rake | Suite 220 5810 Ravina Court Colorado Springs CO 80919 | COMPUTER SOFTWARE FOR COMPUTER SECURITY, COMPUTER POLICY COMPLIANCE, MONITORING COMPUTER SYSTEM USE AND NETWORK ACTIVITY; |
NPC DATAGUARD | NO PANIC COMPUTING INC. | Suite 120 25 Royal Crest Court Markham, Ontario L3R9X4 Canada | computer software for computer security, data encryption, and technical support relating to computers, computer hardware, computer peripherals, computer software, and communication and consumer electronics products;NO PANIC COMPUTING DATA GUARD; |
ON THE FLY | Hauri Inc. | Seoul 156-754 Republic of Korea | Computer software for computer security; |
PSDETECT | PentaSafe, Incorporated | 802 Lovett Boulevard Houston TX 77006 | COMPUTER SOFTWARE FOR COMPUTER SECURITY, NAMELY TRACKING, REPORTING, AND HANDLING SYSTEM EVENTS THAT MAY JEOPARDIZE SYSTEM SECURITY;PENTA SAFE DETECT; |
PSSECURE | PentaSafe, Incorporated | 802 Lovett Boulevard Houston TX 77006 | COMPUTER SOFTWARE FOR COMPUTER SECURITY, NAMELY PROTECTION FROM UNAUTHORIZED ACCESS;PENTA SAFE SECURE; |
RUBICA | RUBICA, INC. | 6947 COAL CREEK PARKWAY SE, SUITE 389 RENTON WA 98059 | computer software for computer security and prevention of risks to computers, mobile devices, and other electronic equipment; computer software for use in the prevention of hacking of computers, mobile devices, and other electronic equipment;Consultation in the field of data theft; Consulting services in the field of security threat assessment, namely, consulting regarding physical security of computer systems and premises housing computer systems;Software as a Service (SaaS) services featuring software for computer security and prevention of risks to computers, mobile devices, and other electronic equipment; Software as a Service (SaaS) services featuring software for use in the prevention of hacking of computers, mobile devices, and other electronic equipment; computer consultation in the field of computer security; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security consultancy; Computer security services for protecting data and information from unauthorized access; Computer security services, namely, security risk and threat consultation in the field of the security of, and vulnerability to breaches and hacking of, computer and electronic information infrastructure; computer security consultation in the field of data theft; |
RUBICA | Cadir Idris, Inc. | 6947 Coal Creek Parkway SE, Suite 389 Renton WA 98059 | computer software for computer security and prevention of risks to computers, mobile devices, and other electronic equipment; computer software for use in the prevention of hacking of computers, mobile devices, and other electronic equipment;Consultation in the field of data theft; Consulting services in the field of security threat assessment, namely, consulting regarding physical security of computer systems and premises housing computer systems;Software as a Service (SaaS) services featuring software for computer security and prevention of risks to computers, mobile devices, and other electronic equipment; Software as a Service (SaaS) services featuring software for use in the prevention of hacking of computers, mobile devices, and other electronic equipment; computer consultation in the field of computer security; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security consultancy; Computer security services for protecting data and information from unauthorized access; Computer security services, namely, security risk and threat consultation in the field of the security of, and vulnerability to breaches and hacking of, computer and electronic information infrastructure; computer security consultation in the field of data theft; |
SAFE: SECURITY AWARENESS FOR EVERYONE | Security Awareness, Inc. | 3837 Northdale Blvd. Suite 320 Tampa FL 33624 | Computer software for computer security education;SAFE SECURITY AWARENESS FOR EVERY 1; |
SHADOOP | Zettaset | 1945 Landings Drive Mountain View CA 94043 | Computer software for computer security, namely, for encryption, ensuring database security, ensuring log-in security and for preventing manipulation of source code;Installation of computer software; Maintenance of computer software; Computer software design; |
TRANSFORM THE INTERNET INTO THE ENTERNET | JERICHO SYSTEMS CORPORATION | Suite 250 6600 LBJ Freeway Dallas TX 75240 | Computer software for computer security; downloadable computer software for computer security; |
VERIFIABLE INTENT | Curriculum Corporation | P.O. Box 116 Maineville OH 45034 | computer software for computer security; |
VIRADICATION | Hauri Inc. | Seoul 156-754 Republic of Korea | Computer software for computer security; |
VIRTUAL FIX | SecureAll, Inc | 3266 Capriana Circle San Jose CA 95135 | Computer software for computer security; |
VULNERABILITY FIREWALL | SecureAll, Inc | 3266 Capriana Circle San Jose CA 95135 | Computer software for Computer Security; |
Where the owner name is not linked, that owner no longer owns the brand |