COMPUTER SOFTWARE SECURING DATA

Brand Owner (click to sort) Address Description
DBD DIGITAL BY DESIGN, INC. 201 East Main Street, Suite G Charlottesville VA 22902 computer software for securing data and information on networks, servers, mainframes, personal computers, and communications devices; computer software for conducting on-line financial transactions and receiving on-line financial information and data;computer services for analyzing and improving the security of computer systems and networks; computer services, namely, providing and designing an on-line marketplace for third party vendors who wish to advertise and sell goods and services via global computer networks;
DMZ GATEWAY GLOBALSCAPE, INC. Suite 100 11095 Viking Drive Eden Prairie MN 55344 Computer software for securing data storage and retrieval, authentication and firewall transversal;GATEWAY;
DMZ GATEWAY GLOBALSCAPE, INC. Suite 100 11095 Viking Drive Eden Prairie MN 55344 Computer software for securing data storage and retrieval, authentication and firewall transversal;
INNERWALL TVIIM Suite 101 4845 Pearl East Circle Boulder CO 80301 computer software for securing data and connectivity on computer systems and computer processes; computer software for encryption; computer software for use in the safeguarding of digital files; computer software for the creation of firewalls; computer software for computer security and prevention of computer risks;INNER WALL;licensing of intellectual property;technical consultation in the fields of network engineering services and internet services; computer software consultancy; computer software development; computer software design; consulting services in the fields of selection, implementation, and use of computer software systems for others; updating and maintenance of computer software; providing online non-downloadable software for securing data and connectivity on computer systems and computer processes, encryption, safeguarding of digital files, creation of firewalls, computer security and prevention of computer risks;
MICROSHARD SHARDSECURE, INC. 9th Floor 101 Avenue of the Americas New York NY 10013 Computer software for securing data by fragmentation;MICRO SHARD;Software as a service (SAAS) services featuring software for securing data by fragmentation;
MICROSHARD CTM Insights 1988 Beekman Court Yorktown Heights NY 10598 Computer software for securing data by fragmentation;MICRO SHARD;Software as a service (SAAS) services featuring software for securing data by fragmentation;
SHARDSECURE SHARDSECURE, INC. 9th Floor 101 Avenue of the Americas New York NY 10013 Computer software for securing data by fragmentation;SHARD SECURE;Software as a service (SAAS) services featuring software for securing data by fragmentation;
TRUEPERSONA Trusona, Inc. 8767 E. Via de Ventura, Suite 275 Scottsdale AZ 852583383 Computer software for securing data, encryption, digital signatures, authentication, fraud detection, and secure socket layer (SSL) certificate management across operating environments, multiple platforms and net protocols, websites and mobile devices; computer software for designing, customizing and personalizing financial cards, identification cards, smart cards, loyalty cards, transportation cards, secure credentials, passports, and delivery forms and carriers; computer software for real-time monitoring of network, fraud detection management, fraud detection analytics and reporting, and fraud intelligence; computer software for capturing electronic signatures; computer hardware;TRUE PERSONA;Verification of personal identity via in-person registration services for security purposes;Providing temporary use of nondownloadable software for securing data, encryption, digital signatures, authentication, fraud detection, and secure socket layer (SSL) certificate management across operating environments, multiple platforms and net protocols, websites and mobile devices; providing temporary use of nondownloadable software for designing, customizing and personalizing financial cards, identification cards, smart cards, loyalty cards, transportation cards, secure credentials, passports, and delivery forms and carriers; providing temporary use of nondownloadable software for real-time monitoring of network, fraud detection management, fraud detection analytics and reporting, and fraud intelligence; providing temporary use of nondownloadable software for capturing electronic signatures; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Electronic signature verification services using technology to authenticate user identity for e-commerce transactions; computer security consultation services in the fields of authentication, identification verification, data theft and identity theft;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for identifying dependencies of a software program installed on a host computer prior to duplication of the software program from the host computer to a destination computer and for adapting the identified dependencies to the destination computer after duplication. An installed software program can be copied from a host computer to a destination computer without breaking portions of the image that rely on data unique to the computer context in which the software program is installed. Data structures store functionality exposed by a software program during installation of the software program that captures machine-specific data before duplication so that such machine-specific data can be restored properly after the duplication. Software of the invention processes the information in the data structures before and after the duplication process to identify and adapt, respectively, the dependencies.