COMPUTER SOFTWARE INFORMATION SECURITY

Brand Owner (click to sort) Address Description
ARBITRATOR LAYERX TECHNOLOGIES, INC. 8615 Freeport Parkway, Suite 250 Irving TX 75063 Computer software for information security management, namely, computer software and computer hardware for use in the protection, security and integrity of data and information;
BUILT BY ANALYSTS, FOR ANALYSTS SWIMLANE, INC. 363 CENTENNIAL PARKWAY, SUITE 150 LOUISVILLE CO 80027 Computer software for Information Security Operations; Computer software for Incident Response Management;Computer disaster recovery planning; Development of security systems and contingency planning for information systems; Providing temporary use of on-line non-downloadable software and applications for Information Security Operations; Providing temporary use of on-line non-downloadable software and applications for Incident Response Management; Providing a website that gives computer users the ability to manage and remediate information security incidents;
CORNERS CornerSecurity Inc. 41 Peabody St Nashville TN 372102125 Computer software for information security relationship management and risk management;
IR-FLOW SWIMLANE, INC. 363 CENTENNIAL PARKWAY, SUITE 150 LOUISVILLE CO 80027 Computer software for Information Security Operations, namely, software for use in managing information security events; Computer software for Incident Response Management;
IS-DATA IS-DATA 230 Linden Street Santa Cruz CA 95062 Computer software for information security purposes;Storage of digital data and storage services for archiving, processing, and storage of electronic, optical, or other mediums of storage;IS DATA;Monitoring computer systems for security purposes;Computer software consultation, computer software development, and software customization for others; computer software design and computer network design for others; selection, implementation and use of computer hardware and software systems for others; computer consultation services in the field of information security; integration of computer systems and networks;
LAYERX LAYERX TECHNOLOGIES, INC. 8615 Freeport Parkway, Suite 250 Irving TX 75063 Computer software for information security management, namely, computer software and computer hardware for use in the protection, security and integrity of data and information;LAYER X;
LAYERX STI LayerX, Inc. 1405 S. Beltline Road Coppell TX 75019 Computer software for information security management, namely, computer software and computer hardware for use in the protection, security and integrity of data and information;LAYER X;
PKIOS Litronic, Inc. 17861 CARTWRIGHT ROAD IRVINE CA 92614 computer software for information security, information access control, secure communications, electronic signature and hardware integration used in the fields of information security, access control, secure communications and electronic signature;
RKS TRISTRATA SECURITY, INC. 4008 MARBLEHEAD DRIVE SAN RAMON CA 94582 COMPUTER SOFTWARE FOR INFORMATION SECURITY MANAGEMENT OF ELECTRONIC DATA;
SECUREFUSION The Gideon Group, Inc. 3958 Windgrove Crossing Suwanee GA 30024 computer software for information security;SECURE FUSION;(Based on Intent to Use) Computer consultation in the field of computer security;
SRMPLATFORM CornerSecurity Inc. 41 Peabody St Nashville TN 372102125 Computer software for information security relationship management and risk management;SECURITY RELATIONSHIP MANAGEMENT PLATFORM;Computer consultation in the field of computer security; Design and development of computer software for risk management and information security relationship management;
SUPERSMART Guibord, Alan Ralph 1 Stiles Rd Ste 105 Salem NH 03079 Computer software for information security operations centers;SUPER SMART;
SYNCURITY SWIMLANE, INC. 363 CENTENNIAL PARKWAY, SUITE 150 LOUISVILLE CO 80027 Computer software for Information Security Operations, namely, software for use in managing information security events; Computer software for Incident Response Management;Computer disaster recovery planning; Development of security systems and contingency planning for information systems; Providing temporary use of on-line non-downloadable software and applications for incident response management; Providing temporary use of on-line non-downloadable software and applications for information security operations, namely, software for use in managing information security events; Providing a website that gives computer users the ability to manage and remediate information security incidents;
TESS TRISTRATA SECURITY, INC. 4008 MARBLEHEAD DRIVE SAN RAMON CA 94582 COMPUTER SOFTWARE FOR INFORMATION SECURITY MANAGEMENT;
TRISTRATA TRISTRATA SECURITY, INC. 4008 MARBLEHEAD DRIVE SAN RAMON CA 94582 computer software for information security management of electronic data;
TRISTRATA ENTERPRISE SECURITY SERVER TRISTRATA SECURITY, INC. 4008 MARBLEHEAD DRIVE SAN RAMON CA 94582 COMPUTER SOFTWARE FOR INFORMATION SECURITY MANAGEMENT;ENTERPRISE SECURITY SERVER;
TRISTRATA EXTENDED ENTERPRISE SECURITY SERVER TriStrata Inc. 3 Lagoon Drive, Suite 110 Redwood Shores CA 94065 COMPUTER SOFTWARE FOR INFORMATION SECURITY MANAGEMENT;EXTENDED ENTERPRISE SECURITY SERVER;
TRISTRATA SECURITY TRISTRATA SECURITY, INC. 4008 MARBLEHEAD DRIVE SAN RAMON CA 94582 computer software for information security management of electronic data;SECURITY;
TRUSTED EXCHANGE CONTROLLER POINT BEARING CORPORATION 950c NORTH CLARK ST CHICAGO IL 60610 Computer software for information security;EXCHANGE CONTROLLER;
VOLTAGE HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. 10300 Energy Drive Spring TX 77389 Computer software for information security; computer software for authentication and encryption of messages and other data; computer software for trading for security of files and electronic communications through the encryption of personal and business electronic communications; computer software for computer system and application development, deployment, and management; computer software that provides web-based access to applications and services through a web operating system or portal interface; computer hardware and software for converged infrastructure management; computer software to monitor and control information technology infrastructure of servers, data storage, and networking hardware; computer software to enable context-sensitive, real-time information sharing;Computer services, namely, integration of private and public cloud computing environments; consulting services in the field of cloud computing; technical consulting services in the fields of datacenter architecture, public and private cloud solutions, and evaluation and implementation of internet technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration, and management of public and private cloud computing IT and application systems; computer software development; software as a services services, namely, hosting software for use by others for use in database management and application development; technical consulting services related to network security;
VOLTAGE ENTIT SOFTWARE 1140 Enterprise Way, Building G Sunnyvale CA 94089 Computer software for information security; computer software for authentication, encryption and tokenization of data in databases and data stores, including analytic systems, messages, payment transactions and other data; computer software for trading for security of files and electronic communications through the encryption of personal and business electronic communications; computer software for computer system and application development, deployment, and management; computer software that provides web-based access to applications and services through a web operating system or portal interface; computer hardware and software for converged infrastructure management; computer software to monitor and control information technology infrastructure of servers, data storage, and networking hardware; computer software to enable context-sensitive, real-time information sharing;Computer services, namely, integration of private and public cloud computing environments; consulting services in the field of cloud computing; technical consulting services in the fields of datacenter architecture, public and private cloud solutions, and evaluation and implementation of internet technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration, and management of public and private cloud computing IT and application systems; computer software development; software as a service services, namely, hosting software for use by others for use in database management and application development; technical consulting services related to network security;
VOLTAGE SECURITY Voltage Security, Inc. 20400 Stevens Creek Boulevard, Suite 500 Cupertino CA 95014 Computer software for information security, namely for securing business and personal electronic communications and files via cryptography; computer software for encryption and authentication of messages, transactions and other data;SECURITY;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method (400, 500, 600, 700) for synchronizing state information in a security gateway cluster comprising at least two nodes comprises the following steps. Synchronizing (403) state information by sending state information from a first node of said at least two nodes, detecting (401) in said security gateway cluster a predetermined irregularly occurring action, and initiating (402) synchronization of state information as a response to said action. The state information is sent to at least a second node of said at least two nodes. Corresponding computer program, computer program product, software entities (910, 920), a node (900) of a security gateway cluster (950) and a security gateway cluster are also presented.