COMPUTER SOFTWARE DATA PROTECTION

Brand Owner (click to sort) Address Description
.SAFE NL Systems Suite 207 5566 W. Main St. Frisco TX 75034 computer software for data protection featuring a multi-layered encrypted file format;DOT SAFE;
APIT Alacritus, Inc. Suite 275 3825 Hopyard Road Pleasanton CA 94588 Computer software for data protection in which data can be restored;APPLICATION PIT;
APPPROTEX BLUE COAT SYSTEMS, INC. 420 NORTH MARY AVENUE SUNNYVALE CA 94085 Computer software for data protection and data encryption in enterprise and cloud computing environments; computer software development tools;APPLICATION PROTECT;Business consulting services in the field of data protection and data encryption for enterprise and cloud computing environments;Data protection and data encryption services for enterprise and cloud computing environments; Software as a Service (SAAS) and Platform as a Service (PAAS) services, namely, hosting software for use by others for use in data protection and data encryption;
AS ANTI-VIRUS AvailaSoft Corporation Limited 8/F, Bank of America Tower, 12 Harcourt Road Central Hong Kong computer software for data protection;
CONCLUSIVE Conclusive Logic, Inc. 800 W. El Camino Real, Suite 180 Mountain View CA 94040 Computer software for data protection; computer software for enterprise security; computer software for secure messaging; computer software for data and computer application protection; computer software for management of public key technologies, protection and control of data, secure access to web portals and computer applications; computer software for enforcement of security policies; computer software for data regulation enforcement; computer processing devices for providing security for networks, information, and computer applications; cryptography devices for providing security for networks, information, and computer applications; computer chips; computer cards;Computer consultation; intergration of computer systems; data encryption services; providing electronic verification of on-line orders of digital content and generating electronic permission codes which then allow users to access said digital content; monitoring of computer systems for security purposes;
CONNECTED EMAILOPTIMIZER AUTONOMY, INC. ONE MARKET PLAZA, SPEAR TOWER, 19TH FLR. SAN FRANCISCO CA 94105 Computer software for data protection providing backup, [ recovery, ] reduction, [ protection, ] storage and/or management of computer data and electronic files and electronic communication related to electronic mail;CONNECTED ELECTRONIC MAIL OPTIMIZER;EMAILOPTIMIZER;
DATA SECURITY IN YOUR POCKET NTI Corporation 9999 Muirlands Blvd. Irvine CA 926182508 Computer software for data protection using encryption technology to create private and public partitions on storage devices;DATA SECURITY;
DATAMILLS DataMills 11 Hasdana Raanan 43650 Israel Computer software for data protection of computing and electronic devices, namely, backup, archiving, and securing email, files, and other forms of data that may be downloaded from a global computer network;DATA MILLS;
DOTSAFE NL Systems Suite 207 5566 W. Main St. Frisco TX 75034 computer software for data protection featuring a multi-layered encrypted file format;DOT SAFE;
DPX CATALOGIC SOFTWARE, INC. 50 Tice Blvd., Ste. 110 Woodcliff NJ 07677 Computer software for data protection, namely, software for snapshot-based backup, recovery and disaster recovery software used to protect computer data;
EDGESAFE DataMills 11 Hasdana Raanan 43650 Israel Computer software for data protection of computing and electronic devices, namely, backup, archiving, and securing email, files, and other forms of data. that may be downloaded from a global computer network;EDGE SAFE;
EDGESAFE DataMills 11 Hasdana Raanan 43650 Israel Computer software for data protection of computing and electronic devices, namely, backup, archiving, and securing email, files, and other forms of data that may be downloaded from a global computer network;EDGE SAFE;
ENCRYPTICS FOR EMAIL ENCRYPTICS 6850 AUSTIN CENTER BLVD. SUITE 320 AUSTIN TX 78731 computer software for data protection featuring a multi-layered encrypted file format;FOR EMAIL;
RECOVERYONE Mendocino Software Inc. 47001 BENICIA STREET FREMONT CA 94538 Computer software for data protection purposes;RECOVERY ONE;
RELIATY BACKUP Workstation Solutions, Incorporated 5 Overlook Drive Amherst NH 03031 Computer software for data protection services;REALITY BACK UP;BACKUP;
RELIATY SERVICES Workstation Solutions, Incorporated 5 Overlook Drive Amherst NH 03031 Computer software for data protection services;SERVICES;
SYSINSPECTOR ESET, spol. s r.o. Einsteinova 24 Bratislava 85101 Slovakia Computer software for data protection, namely, computer software for use in protecting computer databases, operating programs and application programs against unauthorized infiltration and corruption;[ Communications by computer terminals; transmission of messages and images by computer ];SYS INSPECTOR;Designing and developing computer software for data protection; consultancy and expert advisory services regarding computer software for data protection; providing of information relating to computer software for data protection;
TRUEZERO Springcoin, Inc. 4551 Glencoe Ave, Suite 155 Marina Del Rey CA 90292 Computer software for data protection that replaces sensitive data with a tokenized equivalent for business and financial operations conducted via electronic and digital transactions; Computer software for obscuring and encrypting sensitive or personally identifiable data by tokenizing the data; Computer software for data encryption and tokenization of personally identifiable and sensitive data and information; computer software for obscuring and encrypting sensitive or personally identifiable data by tokenizing the data and for decrypting such data; computer software for data security, data protection and data privacy;TRUE ZERO;Data encryption services; data encryption and tokenization services for securing personally identifiable and sensitive data and information; data encryption security services for providing security and anonymity for electronically transmitted data and for financial transactions; Tokenization services for providing security and anonymity for electronically and digitally transmitted financial transactions; Software as a service (SAAS) services featuring software for data protection that replaces sensitive data with a tokenized equivalent for business and financial operations conducted via electronic and digital transactions; Software as a service (SAAS) services featuring software for obscuring and encrypting sensitive or personally identifiable data by tokenizing the data; Software as a service (SAAS) services featuring software for data encryption and tokenization of personally identifiable and sensitive data and information; Software as a service (SAAS) services featuring software for obscuring and encrypting sensitive or personally identifiable data by tokenizing the data and for decrypting such data; Software as a service (SAAS) services featuring software for data security, data protection and data privacy; Providing information, technical support, and consultancy relating to the aforementioned services;
VIRTUAL STANDBY ENCHOICE, INC. 1400 E Southern Ave Tempe AZ 85282 COMPUTER SOFTWARE FOR DATA PROTECTION, DATA SECURITY, DATA BACKUP, DATA RECOVERY, CHECKING INTEGRITY OF DATA, DATA ARCHIVING AND RETRIEVAL, DATA TRANSFER AND FOR DATA SYNCHRONIZATION;VIRTUAL STAND BY;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for identifying dependencies of a software program installed on a host computer prior to duplication of the software program from the host computer to a destination computer and for adapting the identified dependencies to the destination computer after duplication. An installed software program can be copied from a host computer to a destination computer without breaking portions of the image that rely on data unique to the computer context in which the software program is installed. Data structures store functionality exposed by a software program during installation of the software program that captures machine-specific data before duplication so that such machine-specific data can be restored properly after the duplication. Software of the invention processes the information in the data structures before and after the duplication process to identify and adapt, respectively, the dependencies.