COMPUTER SOFTWARE DEFINITION

Brand Owner (click to sort) Address Description
FA-EPM FULL ARMOR CORPORATION 198 Tremont Street, Suite 402 Boston MA 02116 Computer software for the definition, application, enforcement and audit of security policies for processing and user devices, namely, desk-top computers, lap-top computers, mobile phones, personal digital assistants, virtual private network client and computer kiosks;FULL ARMOR- EPM;
FAEPM FULL ARMOR CORPORATION 198 Tremont Street, Suite 402 Boston MA 02116 Computer software for the definition, application, enforcement and audit of security policies for processing and user devices, namely, desk-top computers, lap-top computers, mobile phones, personal digital assistants, virtual private network client and computer kiosks;
FULL ARMOR ENDPOINT POLICY MANAGER FULL ARMOR CORPORATION 198 Tremont Street, Suite 402 Boston MA 02116 Computer software for the definition, application, enforcement and audit of security policies for processing and user devices, namely, desk-top computers, lap-top computers, mobile phones, personal digital assistants, virtual private network client and computer kiosks;FULL ARMOR END POINT POLICY MANAGER;ENDPOINT POLICY MANAGER;
FULLARMOR END-POINT POLICY MANAGER FULL ARMOR CORPORATION 198 Tremont Street, Suite 402 Boston MA 02116 Computer software for the definition, application, enforcement and audit of security policies for processing and user devices, namely, desk-top computers, lap-top computers, mobile phones, personal digital assistants, virtual private network client and computer kiosks;FULL ARMOR END-POINT POLICY MANAGER;END-POINT POLICY MANAGER;
FULLARMOR ENDPOINT POLICY MANAGER FULL ARMOR CORPORATION 198 Tremont Street, Suite 402 Boston MA 02116 Computer software for the definition, application, enforcement and audit of security policies for processing and user devices, namely, desk-top computers, lap-top computers, mobile phones, personal digital assistants, virtual private network client and computer kiosks;FULL ARMOR END POINT POLICY MANAGER;ENDPOINT POLICY MANAGER;
FULLARMOR ENTERPRISE POLICY MANAGER FULL ARMOR CORPORATION 198 Tremont Street, Suite 402 Boston MA 02116 Computer software for the definition, application, enforcement and audit of security policies for processing and user devices, namely, desk-top computers, lap-top computers, mobile phones, personal digital assistants, virtual private network client and computer kiosks;FULL ARMOR ENTERPRISE POLICY MANAGER;ENTERPRISE POLICY MANAGER;
FULLARMOR EPM FULL ARMOR CORPORATION 198 Tremont Street, Suite 402 Boston MA 02116 Computer software for the definition, application, enforcement and audit of security policies for processing and user devices, namely, desk-top computers, lap-top computers, mobile phones, personal digital assistants, virtual private network client and computer kiosks;FULL ARMOR EPM;EPM;
FULLARMOREPM FULL ARMOR CORPORATION 198 Tremont Street, Suite 402 Boston MA 02116 Computer software for the definition, application, enforcement and audit of security policies for processing and user devices, namely, desk-top computers, lap-top computers, mobile phones, personal digital assistants, virtual private network client and computer kiosks;FULL ARMOR EPM;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for distributing portable computer virus definition records with binary file conversion are described. One or more virus definition records are stored into a structured virus database. Each virus definition record includes an identifier uniquely identifying a computer virus, at least one virus name associated with the computer virus, a virus definition sentence comprising object code providing operations to detect the identified computer virus within a computer system, and a virus removal sentence comprising object code providing operations to clean the identified computer virus from the computer system. At least one updated virus definition record is stored into the structured virus database indexed by the identifier and the at least one virus name for each virus definition record. The virus definition records stored in the structured virus database are converted into a virus data file. The virus data file includes virus definition sets. Each virus definition set includes binary data encoding instructions to detect the computer virus within a computer system, instructions to clean the computer virus from the computer system, and names associated with the computer virus.