COMPUTER SOFTWARE DATA INFORMATION SECURITY

Brand Owner Address Description
BECRYPT TRUSTED CLIENT BeCrypt Limited 11-19 Artillery Row 4th Floor Artillery House London SW1P1RT United Kingdom Computer software for data/information security; computer programs for data/information security; downloadable electronic publications, namely, books, journals, magazines, newsletters, pamphlets, guides, articles, information documents, forms, relating to data/information security;BE CRYPT TRUSTED CLIENT;Licensing of computer software;TRUSTED CLIENT;IT consultancy services; computer consultancy services; computer software consultancy; computer hardware consultancy; computer programming; computer systems design and development; computer systems analysis; design, creation and development of computer software; leasing, rental and hire of computer software; licensing of computer software; maintenance, updating and upgrading of computer software for others; technical support services, namely, troubleshooting of computer software problems; design of data processing systems and data processing networks; conducting feasibility studies; conversion of data or documents from physical to electronic media; information, advisory and consultancy services relating to all the aforesaid services;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.