FindOwnerSearch
Brands and Their Owners
Brand | Owner (click to sort) | Address | Description |
---|---|---|---|
ACCESS FILTER | Internet Dynamics, Inc. | 3525 Cass Court #617 Oak Brook IL 60521 | computer software for providing security, authentication, encryption, and virus checking functions for internal computer information networks and a global computer information network; |
ASSIST//CK | Americas Software Corp. | 550 Brickell Avenue, Suite 503 Miami FL 33131 | Computer software for providing security, monitoring, tracking and supervision of suspicious and or irregular activities of customer accounts in the financial industry; |
CENTRI | GLOBAL INTERNET.COM, INC. | 755 Page Mill Road Suite A101 Palo Alto CA 943041018 | computer software for providing security and security management in local, wide and global computer information networks, and manuals sold as a unit; |
CLICKNET SECURITY TECHNOLOGIES | ClickNet Software Corporation | 2460 Zanker Road San Jose CA 951311154 | Computer software for providing security for e-business servers and applications;CLICK NET SECURITY TECHNOLOGIES;Computer services, namely, installation, maintenance, and integration of computer software; |
CYBER BLACK BOX | Voreas Laboratories, Inc. | c/o Troutman Pepper Hamilton Sanders LLP 600 Peachtree St. NE, Ste. 3000 Atlanta GA 30308 | Computer software for providing security to networks; network data storing apparatus; server for managing network; data security apparatus; data processing apparatus; software for ensuring the security of electronic mail; computer software for providing security concerning computer break-in; computer program for security service using home network;Computer programming services for data warehousing; data security services; maintenance of computer software for data processing; monitoring of computer systems for detecting unauthorized access or data breach; development of computer software for security management; development of software for secure network operations; consultancy relating to software maintenance; maintenance of computer software; computer system analysis; |
|
|||
D'AMO | Penta Security Systems, Inc | Hanjin Shipping Building 20F 25-11, Yoido-dong, Youngdeungpo-ku Seoul Republic of Korea | Computer software for providing security to networks; Computer programs for use in ensuring the security of database; Software for ensuring the security of database; Computer software for providing secure access to computer and communication networks; |
DNS FIREWALL | INFOBLOX INC. | 2390 Mission College Boulevard, Ste. 501 Santa Clara CA 95054 | computer software for providing security features to control access from malware or other unauthorized intrusion or vulnerabilities on a computer network;computer services, namely, provision of current data for use in detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; |
DON'T LOG IN WITHOUT IT | Capitol Systems Corporation | Suite 600 2375 E. Camelback Rd. Phoenix AZ 85016 | Computer software for providing security of, to, and for computer networks; computer software for database management, specifically the management of user identifications, uniform resource locators, and computer notes;DO NOT LOG IN WITHOUT IT; |
EAGLEDESK | Raptor Systems, Inc. | 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 | computer software for providing security with respect to data access and communications on computer networks and services; |
EAGLELAN | Raptor Systems, Inc. | 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 | computer software for providing security with respect to data access and communications on computer networks and services; |
EAGLELITE | Raptor Systems, Inc. | 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 | computer software for providing security with respect to data access and communications on computer networks and services; |
EAGLENOMAD | Raptor Systems, Inc. | 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 | computer software for providing security with respect to data access and communications on computer networks and services; |
EAGLEREMOTE | Raptor Systems, Inc. | 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 | computer software for providing security with respect to data access and communications on computer networks and services; |
ENFORCIVE | Enforcive, Inc. | Suite 427 25 East Salem Street Hackensack NJ 07601 | Computer software for providing security and compliance management tools in order to enable data protection and network auditing; and downloadable computer software for providing security and compliance management tools in order to enable data protection and network auditing; |
ENTERPRISE BLACK BOX | Voreas Laboratories, Inc. | c/o Troutman Pepper Hamilton Sanders LLP 600 Peachtree St. NE, Ste. 3000 Atlanta GA 30308 | Computer software for providing security to networks; network data storing apparatus; server for managing network; data security apparatus; data processing apparatus; software for ensuring the security of electronic mail; computer software for providing security concerning computer break-in; computer program for security service using home network;Computer programming services for data warehousing; data security services; maintenance of computer software for data processing; monitoring of computer systems for detecting unauthorized access or data breach; development of computer software for security management; development of software for secure network operations; consultancy relating to software maintenance; maintenance of computer software; computer system analysis; |
ESPION | Espion | Suite 700 11211 Industriplex Blvd. Baton Rouge LA 70809 | Computer software for providing security to computers and computer networks;Consulting services in the field of design, selection, implementation and use of computer network security hardware and software systems, policies and compliance for others; |
FIREWALL-IN-A-BOX | Raptor Systems, Inc. | 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 | computer software for providing security with respect to data access and communications on computer networks and services; |
GAUNTLET | NETWORKS ASSOCIATES TECHNOLOGY, INC. | 3965 FREEDOM CIRCLE SANTA CLARA CA 95054 | computer software for providing security features to computer networks, and manuals sold therewith as a unit; |
GUARDIANSTAT | ProTech Compliance, Inc. | 650 Smithfield Street, Suite 2020 Pittsburgh PA 15222 | Computer software for providing security access to facilities and to hospital vendors;In the statement, Page 1, lines 1-4, should be deleted, and ProTech Compliance, Inc. (Pennsylvania Corporation), 650 SMITHFIELD STREET, SUITE 2020 PITTSBURGH, Pennsylvania 15222 should be reinserted.;GUARDIAN STAT; |
ISPY | Stach & Liu | 8240 S. Kyrene Road, Suite A-113 Tempe AZ 85284 | Computer software providing a security assessment framework for reverse engineering and penetration testing of iOS applications;I SPY; |
LITCOM | Litton Systems, Inc. | Lakewood CA | computer software for providing security to telecommunications networks; computer software for providing electronic mail communications over telecommunications networks; |
NETPOINT | Oblix, Inc. | 18922 Forge Drive Cupertino CA 95014 | Computer software for providing security, user identity management, and/or access to intranets and extranets on a global computer network;NET POINT; |
PASSWORD LOCKER | Capitol Systems Corporation | Suite 600 2375 E. Camelback Rd. Phoenix AZ 85016 | Computer software for providing security of, to, and for computer networks; computer software for database management, specifically the management of user identifications, uniform resource locators, and computer notes;PASS WORD LOCKER;PASSWORD; |
PHISHME | PHISHME INC. | 1608 Village Market Blvd., SE, #B-200 Leesburg VA 20175 | computer software for providing security assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; computer software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management;software as a service (SAAS) services featuring computer software and applications for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; Software as a service (SAAS) services featuring computer software and applications for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; Software as a service (SAAS) services featuring computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; Software as a service (SAAS) services featuring software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; computer security consulting in the field of cybersecurity and information technology security; |
RAPTOR | Raptor Systems, Inc. | 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 | computer software for providing security with respect to data access and communications on computer networks and services;R; |
SAFE ON THE WEB | SYMANTEC CORPORATION | 350 Ellis Street Mountain View CA 94043 | computer software for providing security on global computer communication networks; |
SECURE 4U | Advanced Computer Research, Ltd. | 8 Baker Street London W1M 1DA United Kingdom | COMPUTER SOFTWARE FOR PROVIDING SECURITY FOR WORKSTATIONS AND NETWORKS FROM INFORMATION, APPLICATIONS OR OTHER ITEMS TRANSMITTED OVER A NETWORK;SECURE FOR YOU;SECURE; |
SECURE 4U | Advanced Computer Research, Ltd. | 8 Baker Street London W1M 1DA United Kingdom | COMPUTER SOFTWARE FOR PROVIDING SECURITY FOR WORKSTATIONS AND NETWORKS FROM INFORMATION, APPLICATIONS OR OTHER ITEMS TRANSMITTED OVER A NETWORK;SECURE FOR YOU;SECURE; |
SECURE ENFORCEMENT | InfoExpress, Inc. | 170 S. Whisman Road, Suite B Mountain View CA 94041 | Computer software for providing security to computers and computer networks; |
SPEEDTRAP | Brooktrout Interspeed, Inc. | 601 South Union Street Lawrence MA 01841 | Computer software for providing security against unauthorized access to software and data on digital communication networks;SPEED TRAP; |
SUPERANTISPYWARE | SUPPORT.COM, INC. | Suite 4600, DPT #2009 777 South Figueroa Street Los Angeles CA 900172513 | Computer software for providing security features to scan, detect, delete, remove and guard against potentially harmful or annoying software such as spyware, adware, malware, trojans, rootkits, dialers, parasites, keyloggers, and worms;SUPER ANTI SPYWARE; |
SUPERANTISPYWARE | Skrepetos, Nicholas C | P.O. Box 40161 Eugene OR 97404 | Computer software for providing security features to scan, detect, delete, remove and guard against potentially harmful or annoying software such as spyware, adware, malware, trojans, rootkits, dialers, parasites, keyloggers, and worms;SUPER ANTI SPYWARE; |
SUPERANTISPYWARE | SUPPORT.COM, INC | DPT 2009 - Legal Department 777 South Figueroa St., Suite 4600 Los Angeles CA 90017 | Computer software for providing security features to scan, detect, delete, remove and guard against potentially harmful or annoying software such as spyware, adware, malware, trojans, rootkits, dialers, parasites, keyloggers, and worms;SUPER ANTI-SPYWARE; |
SUPERANTISPYWARE | NICHOLAS C SKREPETOS | PO BOX 40161 EUGENE OR 97404 | Computer software for providing security features to scan, detect, delete, remove and guard against potentially harmful or annoying software such as spyware, adware, malware, trojans, rootkits, dialers, parasites, keyloggers, and worms;SUPER ANTI-SPYWARE; |
THE WALL FROM RAPTOR | Raptor Systems, Inc. | 3422 Old Capitol Trail, Suite 3331 Wilmington DE 19808 | computer software for providing security with respect to data access and communications on computer networks and services; |
TRUEVECTOR | CHECK POINT SOFTWARE TECHNOLOGIES INC. | 959 Skyway Road, Suite 300 San Carlos CA 94070 | computer software for providing security for computers connected to the Internet;TRUE VECTOR; |
VENDORSTAT | ProTech Compliance, Inc. | 650 Smithfield Street, Suite 2020 Pittsburgh PA 15222 | Computer software for providing security access to hospital vendors;In the statement, Page 1, lines 1-4, should be deleted, and ProTech Compliance, Inc., (Pennsylvania Corporation), 650 SMITHFIELD STREET, SUITE 2020, Pittsburgh, Pennsylvania 15222 should be reinserted.;VENDOR STAT; |
VIRTUAL CABINETS | Marathe, Shreehari | Gautam Niwas 154 St. Paul St. Dadar, Mumbai 400014 India | COMPUTER SOFTWARE FOR PROVIDING SECURITY; |
WAPPLES | Penta Security Systems, Inc | Hanjin Shipping Building 20F 25-11, Yoido-dong, Youngdeungpo-ku Seoul Republic of Korea | Computer software for providing security to networks; Computer programs for use in ensuring the security of database; Software for ensuring the security of database; Computer software for providing secure access to computer and communication networks; |
ZONE LABS | CHECK POINT SOFTWARE TECHNOLOGIES INC. | 959 Skyway Road, Suite 300 San Carlos CA 94070 | computer software for providing security for computers connected to the Internet; |
Where the owner name is not linked, that owner no longer owns the brand |