COMPUTER SOFTWARE PLATFORMS CYBER

Brand Owner (click to sort) Address Description
ARC4DIA Roberge, Indre 196 Boul Perron Est Caplan, Quebec G0C1H0 Canada Computer software platforms for cyber security;ARC FOUR DIA: ARC FOR DIA;Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer consultation in the field of cyber security; Development of security systems and contingency planning for information systems;
BITVOYANT BLUEVOYANT 335 MADISON AVENUE SUITE 5G NEW YORK NY 10017 Computer software platforms for cyber intelligence collection and proactive cyber services and solutions, for use in the field of cyber defense by users of computer networks;In the statement, line 1, should be deleted, and Bitvoyant, LLC Delaware Limited Liability Company should be inserted.;BIT VOYANT;Computer security consultancy; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer virus protection services; Design and development of electronic data security systems;
SOC PRIME SOC Prime, Inc. 399 Boylston Street, 6th Floor Boston MA 02116 Computer software platforms for cyber security; Computer software platforms, downloadable, for cyber security; Computer software for authorising access to databases; Computer software for computer system and application development, deployment and management; Computer software to maintain and operate computer system;Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of threat detection; Computer systems analysis; Data security consultancy; Installation, maintenance, and updating of computer software; Internet security consultancy; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems to detect breakdowns; Software as a service (SAAS) services featuring software for cyber security; Software as a service (SAAS) services, namely, hosting software for use by others for use in cyber security; Technical support, namely, monitoring technological functions of computer network systems;
TEMPUS Bitvoyant St, 100 211 North Union Street Alexandria VA 22314 Computer software platforms for cyber defense for users computer networks;Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer virus protection services; Consulting services in the field of software as a service (SAAS); Design and development of electronic data security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Platform as a service (PAAS) featuring computer software platforms for computer network security;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.