COMPUTER SOFTWARE PROTECT SYSTEMS

Brand Owner (click to sort) Address Description
CCSA CHECK POINT SOFTWARE TECHNOLOGIES LTD. 5 Ha'solelim Street Tel Aviv 6789705 Israel Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management;
CCSE CHECK POINT SOFTWARE TECHNOLOGIES LTD. 5 Ha'solelim Street Tel Aviv 6789705 Israel Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management;
CCSI CHECK POINT SOFTWARE TECHNOLOGIES LTD. 5 Ha'solelim Street Tel Aviv 6789705 Israel Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management;
CCSR CHECK POINT SOFTWARE TECHNOLOGIES LTD. 5 Ha'solelim Street Tel Aviv 6789705 Israel Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management;
SAFE@HOME SofaWare Technologies Limited 3 Hilazon St. Ramat Gan 52522 Israel Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for Internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management;
SAFE@OFFICE SofaWare Technologies Limited 3 Hilazon St. Ramat Gan 52522 Israel Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management;In the statement, Column1, lines 1 thru 4, SOFTWARE TECHNOLOGIES LIMITED (ISRAEL CORPORATION), 34 HA'BARZEL STREET, TEL AVIV 69710, ISRAEL should be deleted, and, SOFTWARE TECHNOLOGIES LIMITED (ISRAEL CORPORATION), 3 HILAZON STREET, RAMAT GAN 52522, ISRAEL should be inserted.;SAFE AT OFFICE;Color is not claimed as a feature of the mark.;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A configurable computer resource usage system for collecting hardware and software usage from computer systems with various operating systems, aggregating and filtering the data, transferring it to a centralized computer system, and performing analysis to determine if a hardware or software upgrade is needed. A computer software product that executes on a client computer workstation and collects performance data relevant to that specific machine and data indicating the versions of software and hardware components installed on that machine. A centralized computer that receives the performance and versioning data, stores it, aggregates it with other static data, and performs analysis to determine if the client computer is an upgrade candidate. A graphical user interface displaying the analysis and relevant summarized data is provided through one of several methods, including a web browser accessing the data over the Internet or LAN or WAN.