COMPUTER SOFTWARE PROVIDING SECURITY

Brand Owner (click to sort) Address Description
ACCESS FILTER Internet Dynamics, Inc. 3525 Cass Court #617 Oak Brook IL 60521 computer software for providing security, authentication, encryption, and virus checking functions for internal computer information networks and a global computer information network;
ASSIST//CK Americas Software Corp. 550 Brickell Avenue, Suite 503 Miami FL 33131 Computer software for providing security, monitoring, tracking and supervision of suspicious and or irregular activities of customer accounts in the financial industry;
CENTRI GLOBAL INTERNET.COM, INC. 755 Page Mill Road Suite A101 Palo Alto CA 943041018 computer software for providing security and security management in local, wide and global computer information networks, and manuals sold as a unit;
CLICKNET SECURITY TECHNOLOGIES ClickNet Software Corporation 2460 Zanker Road San Jose CA 951311154 Computer software for providing security for e-business servers and applications;CLICK NET SECURITY TECHNOLOGIES;Computer services, namely, installation, maintenance, and integration of computer software;
CYBER BLACK BOX Voreas Laboratories, Inc. c/o Troutman Pepper Hamilton Sanders LLP 600 Peachtree St. NE, Ste. 3000 Atlanta GA 30308 Computer software for providing security to networks; network data storing apparatus; server for managing network; data security apparatus; data processing apparatus; software for ensuring the security of electronic mail; computer software for providing security concerning computer break-in; computer program for security service using home network;Computer programming services for data warehousing; data security services; maintenance of computer software for data processing; monitoring of computer systems for detecting unauthorized access or data breach; development of computer software for security management; development of software for secure network operations; consultancy relating to software maintenance; maintenance of computer software; computer system analysis;
D'AMO Penta Security Systems, Inc Hanjin Shipping Building 20F 25-11, Yoido-dong, Youngdeungpo-ku Seoul Republic of Korea Computer software for providing security to networks; Computer programs for use in ensuring the security of database; Software for ensuring the security of database; Computer software for providing secure access to computer and communication networks;
DNS FIREWALL INFOBLOX INC. 2390 Mission College Boulevard, Ste. 501 Santa Clara CA 95054 computer software for providing security features to control access from malware or other unauthorized intrusion or vulnerabilities on a computer network;computer services, namely, provision of current data for use in detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices;
DON'T LOG IN WITHOUT IT Capitol Systems Corporation Suite 600 2375 E. Camelback Rd. Phoenix AZ 85016 Computer software for providing security of, to, and for computer networks; computer software for database management, specifically the management of user identifications, uniform resource locators, and computer notes;DO NOT LOG IN WITHOUT IT;
EAGLEDESK Raptor Systems, Inc. 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 computer software for providing security with respect to data access and communications on computer networks and services;
EAGLELAN Raptor Systems, Inc. 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 computer software for providing security with respect to data access and communications on computer networks and services;
EAGLELITE Raptor Systems, Inc. 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 computer software for providing security with respect to data access and communications on computer networks and services;
EAGLENOMAD Raptor Systems, Inc. 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 computer software for providing security with respect to data access and communications on computer networks and services;
EAGLEREMOTE Raptor Systems, Inc. 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 computer software for providing security with respect to data access and communications on computer networks and services;
ENFORCIVE Enforcive, Inc. Suite 427 25 East Salem Street Hackensack NJ 07601 Computer software for providing security and compliance management tools in order to enable data protection and network auditing; and downloadable computer software for providing security and compliance management tools in order to enable data protection and network auditing;
ENTERPRISE BLACK BOX Voreas Laboratories, Inc. c/o Troutman Pepper Hamilton Sanders LLP 600 Peachtree St. NE, Ste. 3000 Atlanta GA 30308 Computer software for providing security to networks; network data storing apparatus; server for managing network; data security apparatus; data processing apparatus; software for ensuring the security of electronic mail; computer software for providing security concerning computer break-in; computer program for security service using home network;Computer programming services for data warehousing; data security services; maintenance of computer software for data processing; monitoring of computer systems for detecting unauthorized access or data breach; development of computer software for security management; development of software for secure network operations; consultancy relating to software maintenance; maintenance of computer software; computer system analysis;
ESPION Espion Suite 700 11211 Industriplex Blvd. Baton Rouge LA 70809 Computer software for providing security to computers and computer networks;Consulting services in the field of design, selection, implementation and use of computer network security hardware and software systems, policies and compliance for others;
FIREWALL-IN-A-BOX Raptor Systems, Inc. 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 computer software for providing security with respect to data access and communications on computer networks and services;
GAUNTLET NETWORKS ASSOCIATES TECHNOLOGY, INC. 3965 FREEDOM CIRCLE SANTA CLARA CA 95054 computer software for providing security features to computer networks, and manuals sold therewith as a unit;
GUARDIANSTAT ProTech Compliance, Inc. 650 Smithfield Street, Suite 2020 Pittsburgh PA 15222 Computer software for providing security access to facilities and to hospital vendors;In the statement, Page 1, lines 1-4, should be deleted, and ProTech Compliance, Inc. (Pennsylvania Corporation), 650 SMITHFIELD STREET, SUITE 2020 PITTSBURGH, Pennsylvania 15222 should be reinserted.;GUARDIAN STAT;
ISPY Stach & Liu 8240 S. Kyrene Road, Suite A-113 Tempe AZ 85284 Computer software providing a security assessment framework for reverse engineering and penetration testing of iOS applications;I SPY;
LITCOM Litton Systems, Inc. Lakewood CA computer software for providing security to telecommunications networks; computer software for providing electronic mail communications over telecommunications networks;
NETPOINT Oblix, Inc. 18922 Forge Drive Cupertino CA 95014 Computer software for providing security, user identity management, and/or access to intranets and extranets on a global computer network;NET POINT;
PASSWORD LOCKER Capitol Systems Corporation Suite 600 2375 E. Camelback Rd. Phoenix AZ 85016 Computer software for providing security of, to, and for computer networks; computer software for database management, specifically the management of user identifications, uniform resource locators, and computer notes;PASS WORD LOCKER;PASSWORD;
PHISHME PHISHME INC. 1608 Village Market Blvd., SE, #B-200 Leesburg VA 20175 computer software for providing security assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; computer software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management;software as a service (SAAS) services featuring computer software and applications for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; Software as a service (SAAS) services featuring computer software and applications for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; Software as a service (SAAS) services featuring computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; Software as a service (SAAS) services featuring software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; computer security consulting in the field of cybersecurity and information technology security;
RAPTOR Raptor Systems, Inc. 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 computer software for providing security with respect to data access and communications on computer networks and services;R;
SAFE ON THE WEB SYMANTEC CORPORATION 350 Ellis Street Mountain View CA 94043 computer software for providing security on global computer communication networks;
SECURE 4U Advanced Computer Research, Ltd. 8 Baker Street London W1M 1DA United Kingdom COMPUTER SOFTWARE FOR PROVIDING SECURITY FOR WORKSTATIONS AND NETWORKS FROM INFORMATION, APPLICATIONS OR OTHER ITEMS TRANSMITTED OVER A NETWORK;SECURE FOR YOU;SECURE;
SECURE 4U Advanced Computer Research, Ltd. 8 Baker Street London W1M 1DA United Kingdom COMPUTER SOFTWARE FOR PROVIDING SECURITY FOR WORKSTATIONS AND NETWORKS FROM INFORMATION, APPLICATIONS OR OTHER ITEMS TRANSMITTED OVER A NETWORK;SECURE FOR YOU;SECURE;
SECURE ENFORCEMENT InfoExpress, Inc. 170 S. Whisman Road, Suite B Mountain View CA 94041 Computer software for providing security to computers and computer networks;
SPEEDTRAP Brooktrout Interspeed, Inc. 601 South Union Street Lawrence MA 01841 Computer software for providing security against unauthorized access to software and data on digital communication networks;SPEED TRAP;
SUPERANTISPYWARE SUPPORT.COM, INC. Suite 4600, DPT #2009 777 South Figueroa Street Los Angeles CA 900172513 Computer software for providing security features to scan, detect, delete, remove and guard against potentially harmful or annoying software such as spyware, adware, malware, trojans, rootkits, dialers, parasites, keyloggers, and worms;SUPER ANTI SPYWARE;
SUPERANTISPYWARE Skrepetos, Nicholas C P.O. Box 40161 Eugene OR 97404 Computer software for providing security features to scan, detect, delete, remove and guard against potentially harmful or annoying software such as spyware, adware, malware, trojans, rootkits, dialers, parasites, keyloggers, and worms;SUPER ANTI SPYWARE;
SUPERANTISPYWARE SUPPORT.COM, INC DPT 2009 - Legal Department 777 South Figueroa St., Suite 4600 Los Angeles CA 90017 Computer software for providing security features to scan, detect, delete, remove and guard against potentially harmful or annoying software such as spyware, adware, malware, trojans, rootkits, dialers, parasites, keyloggers, and worms;SUPER ANTI-SPYWARE;
SUPERANTISPYWARE NICHOLAS C SKREPETOS PO BOX 40161 EUGENE OR 97404 Computer software for providing security features to scan, detect, delete, remove and guard against potentially harmful or annoying software such as spyware, adware, malware, trojans, rootkits, dialers, parasites, keyloggers, and worms;SUPER ANTI-SPYWARE;
THE WALL FROM RAPTOR Raptor Systems, Inc. 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 computer software for providing security with respect to data access and communications on computer networks and services;
TRUEVECTOR CHECK POINT SOFTWARE TECHNOLOGIES INC. 959 Skyway Road, Suite 300 San Carlos CA 94070 computer software for providing security for computers connected to the Internet;TRUE VECTOR;
VENDORSTAT ProTech Compliance, Inc. 650 Smithfield Street, Suite 2020 Pittsburgh PA 15222 Computer software for providing security access to hospital vendors;In the statement, Page 1, lines 1-4, should be deleted, and ProTech Compliance, Inc., (Pennsylvania Corporation), 650 SMITHFIELD STREET, SUITE 2020, Pittsburgh, Pennsylvania 15222 should be reinserted.;VENDOR STAT;
VIRTUAL CABINETS Marathe, Shreehari Gautam Niwas 154 St. Paul St. Dadar, Mumbai 400014 India COMPUTER SOFTWARE FOR PROVIDING SECURITY;
WAPPLES Penta Security Systems, Inc Hanjin Shipping Building 20F 25-11, Yoido-dong, Youngdeungpo-ku Seoul Republic of Korea Computer software for providing security to networks; Computer programs for use in ensuring the security of database; Software for ensuring the security of database; Computer software for providing secure access to computer and communication networks;
ZONE LABS CHECK POINT SOFTWARE TECHNOLOGIES INC. 959 Skyway Road, Suite 300 San Carlos CA 94070 computer software for providing security for computers connected to the Internet;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.