COMPUTER SOFTWARE CYBER SECURITY

Brand Owner (click to sort) Address Description
ANOMALYTICS Cyberflow Analytics, Inc. Suite 525 4250 Executive Square La Jolla CA 92037 Computer software for cyber security for the detection and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat (APT) attacks to steal intellectual property from corporations or disrupt operations;Software as a service (SAAS) services featuring software for use in cyber security for the detection and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat (APT) attacks to steal intellectual property from corporations or disrupt operations;
CYBER CELL SRC, INC. 7502 Round Pond North Syracuse NY 13212 Computer software for cyber security;Computer software development in the field of cyber security;
CYBERFLOW ANALYTICS WEBROOT INC. 385 Interlocken Crescent, Suite 800 Broomfield CO 80021 Computer software for cyber security for the detection and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat (APT) attacks to steal intellectual property from corporations or disrupt operations;CYBER FLOW ANALYTICS;ANALYTICS;Software as a service (SAAS) services featuring software for use in cyber security for the detection and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat (APT) attacks to steal intellectual property from corporations or disrupt operations;
CYBERINTELLIGENCE-AS-A-SERVICE Cyberflow Analytics #1503 969 Market Street San Diego CA 92101 Computer software for Cyber Security for the detection and mitigation of Advanced Persistent Threat (APT) attacks to steal intellectual property from corporations;CYBER INTELLIGENCE-AS-A-SERVICE;Software as a service (SAAS) services featuring software for use in Cyber Security for the detection and mitigation of Advanced Persistent Threat (APT) attacks to steal intellectual property from corporations;
CYBERIQ CyberIQ Services, Inc. 2101 Wilson Avenue, Suite 1000 Arlington VA 22201 Computer software for cyber security, for defense and mitigation of cyber and physical threats and attacks, for threat detection, for threat analysis, for threat response, for attack denial, for attack disruption, for sourced collaboration that enables alerting and response to threats, for real-time situational awareness and advanced analytics of cyber threats; Computer consultation services, computer services, and cloud-based services in the fields of computer security and cyber security;CYBER IQ;
IDENTISAFE VIRTUALSHIELD 1055 W. 7th St. 33rd Floor Los Angeles CA 90017 Computer software for cyber security;IDENTITY SAFE;
NAVRIE Cyvr 73 Greentree Drive #346 Dover DE 19904 Computer software for cyber security and artificial intelligence;
NETONOMY Netonomy Ltd. 1 Shikma St. Bnei Darom 79250 Israel Computer software for cyber security management for scanning and penetration testing of computers and networks to assess information security vulnerability, restricting unauthorized network access and maintaining network integrity; downloadable mobile applications in the field of cyber security management for scanning and penetration testing of computers and networks to assess information security vulnerability, restricting unauthorized network access and maintaining network integrity;
STANDACO Blick, Jason 215 Powell Ave Pleasant Hill CA 94523 Computer software for cyber security that may be downloaded from a global computer network;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.