COMPUTER SOFTWARE SECURING

Brand Owner (click to sort) Address Description
ACTIVESHOW MARGALLA CONSULTING CORPORATION 1339 Portola Road Woodside CA 94062 Computer software for securing and managing deployment of audio, video, graphic, text, computer programs and other real-time multimedia applications over commuter networks, satellite transmission systems, telecommunications systems including radio, telephone and television, wireless communications systems and other broadcast and networked media systems; computer utility programs for use on network servers and other computer-based communication control equipment; computer utility programs for use on computers linked to computer networks; computer programs for converting data from one format to another; and computer manuals sold therewith as a unit;ACTIVE SHOW;
APPSECURE Business Solutions, Inc. 50 E. Main St. Kings Park NY 11754 computer software for securing a computer application from unauthorized access;
ARDACO Ardaco, a. s. Polianky 5 SK-841 01 Bratislava Slovakia Computer software for securing, encrypting, decrypting, authenticating, transmitting and receiving data, information, messages and voice calls in the field of data and communication security; computer application software for securing, encrypting, decrypting, authenticating, transmitting and receiving data, information, messages and voice calls in the field of data and communication security; communications software for connecting computer network users; communications software for connecting global computer networks; computer software for securing, encrypting, decrypting, authenticating, transmitting and receiving data, information, messages and voice calls in the field of telecommunication technologies; downloadable software for ensuring the security of computers; computer software to maintain and operate computer systems; computer software and firmware for operating system programs; computer software for use in database management; computer software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data; computer software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of information; computer software for application and database integration; computer hardware and software system for data and communication security; computer operating systems; computerized system for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data; downloadable computer operating systems; computer programs for monitoring security of data, information, messages and voice calls in the field of data and communication security; downloadable computer application software for data and communication security; computers; computer hardware; computer peripheral devices; computer memories; microprocessors; data processing apparatus; image scanners; electronic device for monitoring data and communication security; wireless or electronic communication devices for data transmission; telecommunication transmitters; transmitters of electronic signals; telephone apparatus; wireless telephones; cellular telephones; smartphones; telephone switchboards; walkie-talkies; radiotelephony sets; computer hardware, namely, communications servers; audiovisual receivers; apparatus for transmission of intercommunication; apparatus for recording, transmission and reproduction of sound or images; optical instruments and components, namely, optical transmitters, optical receivers, optical transceivers; blank magnetic data carriers; blank optical data carriers; downloadable electronic publications in the nature of books, magazines and manuals in the field of data and communication security;Providing telecommunications connections to a global computer network; providing user access to global computer networks; providing access to telecommunication networks; providing private and secure real-time electronic communication over a computer network; providing information relating to telecommunications; telephone communication services; telephone communications; communications by computer terminals; transmission of information by electronic communications networks among computers connected to the same telematic network; communications via fiber-optic networks; radio communications; satellite transmission of signals; electronic data transmission; computer-aided transmission of messages and images; electronic transmission of messages; wireless broadcasting services; rental of message sending apparatus; rental of telecommunication apparatus; rental of telephones; providing access to databases; transmission of digital files;Computer software design; development of software for communication systems; computer programming; computer programming services for security of electronic data; design and development of electronic data security systems; updating of software; rental of computer software; maintenance of computer software; installation of computer software; software as a service (SAAS) services featuring software for securing, encrypting, decrypting, authenticating, transmitting and receiving data, information, messages and voice calls in the field of data and communication security; duplication of computer programs; consultancy in the design and development of computers; computer software consultancy; computer technology consultancy services; computer security consultancy; outsource service providers in the field of information technology; telecommunication technology consultancy services; computer system design; computer system analysis; information technology (IT) consulting services; providing information on computer technology and programming via a web site; providing virtual computer systems and virtual computer environments through cloud computing; electronic data storage; off-site data backup; research and development of new products for others; graphic design; recovery of computer data; conversion of computer programs and data, other than physical conversion; conversion of data or documents from physical to electronic media; data conversion of electronic information; providing search engines for the Internet; scanning, namely, digitization of documents; data encryption and decoding services;
CLOUD AGENT LENOVO (SINGAPORE) PTE. LTD. 151 Lorong Chuan #02-01 New Tech Park 556741 Singapore Computer software for securing and integrating access to web servers, web applications and web services;CLOUD;
DIGITAL CONFIDENCE eCertain, Inc. 1601 Rio Grande Suite 500 Austin TX 78701 COMPUTER SOFTWARE FOR SECURING AND VERIFYING DATA AND DOCUMENTS OVER A GLOBAL COMPUTER NETWORK;ELECTRONIC TRANSMISSION OF DATA AND DOCUMENTS;DIGITAL;
DISTRIBUTED INTELLIGENCE FOR SECURE STORAGE FireRock Technology Corporation Suite 103-286 14835 East Shea Blvd. Fountain Hills AZ 85268 Computer software for securing and accelerating network storage, database management, data integration and classification;
ECERTAIN eCertain, Inc. 1601 Rio Grande Suite 500 Austin TX 78701 COMPUTER SOFTWARE FOR SECURING AND VERIFYING DATA AND DOCUMENTS OVER A GLOBAL COMPUTER NETWORK;ELECTRONIC STORAGE OF MESSAGES, DOCUMENTS AND DATA;ELECTRONIC TRANSMISSION OF DATA AND DOCUMENTS;E CERTAIN;PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE COMPUTER SOFTWARE OVER A GLOBAL COMPUTER NETWORK FOR USE IN DATA ENCRYPTION SERVICES; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE COMPUTER SOFTWARE OVER A GLOBAL COMPUTER NETWORK FOR USE IN AUTHENTICATION OF ELECTRONIC DOCUMENTS; AUTHENTICATION SERVICES, NAMELY, APPLYING DIGITAL SIGNATURES TO ELECTRONIC DOCUMENTS AND DATA TO VERIFY THAT THE DOCUMENTS AND DATA HAVE NOT BEEN ALTERED AFTER APPLICATION OF A DIGITAL SIGNATURE; AUTHENTICATION SERVICES, NAMELY, APPLYING ELECTRONIC DATE AND TIME STAMP TO ELECTRONIC DOCUMENTS AND DATA TO VERIFY TIME AND DATE RECEIVED; AUTHENTICATION SERVICES, NAMELY, PROVIDING PROOF OF RECEIPT OF ELECTRONIC DOCUMENTS AND DATA;
ENABLING SECURE BUSINESS LIQUID MACHINES, INC. 10 Maguire Road, Building 1 Lexington MA 02421 Computer software for securing and managing business information and business processes;SECURE BUSINESS;
HYPERCONTEXT WootCloud, Inc. 2025 Gateway Place, Suite 230 San Jose CA 95110 Computer software for for securing IoT (Internet of Things) over a network and RF spectrum that is AI driven. A security software technology for uniquely establishing the identity and context of physical smart devices leveraging over three hundred device characteristics. The device characteristics are automatically arrived by machine learning to power the context of any device inside enterprises. The context information is used to secure and protect the transfer of data over a network which in turn affects decisions taken by the computer system that may be downloaded from a global computer network;HYPER CONTEXT;
HYPERTUNNEL HYPERSPACE COMMUNICATIONS, INC. Suite 6600 8480 East Orchard Road Greenwood Village CO 80111 Computer software for securing and optimizing network performance over existing dial-up, broadband, wireless, and wide and local area networks and associated user's manuals sold as a unit therewith;HYPER TUNNEL;
ICESSL ICEsoft Technologies, Inc. Suite 315 2390 East Camelback Road Phoenix AZ 85016 computer software for securing the connection while Internet browsing;
LEDO Transactor Networks, Inc. 221 Main Street, Suite 1530 San Francisco CA 94105 computer software for securing the ownership and distribution of digital objects over interactive networks;
NETMOTION MOBILE IQ NETMOTION SOFTWARE, INC. 1505 Westlake Ave. N., Suite 500 Seattle WA 98109 Computer software for securing, measuring, tracking and optimizing wireless and wireline communications and network performance; Computer server software for searching, indexing and monitoring of client's data, providing operational intelligence, business analytics and troubleshooting of client's data and computer client software for accessing the provided results thereof; computer search engine software and instructional manuals sold as a unit therewith;NET MOTION MOBILE IQ;MOBILE;
NETMOTION MOBILITY NETMOTION SOFTWARE, INC. 1505 Westlake Ave. N., Suite 500 Seattle WA 98109 Computer software for securing, measuring, tracking and optimizing wireless and wireline communications and network performance between mobile devices;NET MOTION MOBILITY;MOBILITY;
PASSWORD GENIE NEONOVA NETWORK SERVICES 1201 EDWARDS MILL ROAD SUITE 102 RALEIGH NC 27607 Computer software for securing, organizing, maintaining, and managing profiles, logins and passwords for web based activities;PASSWORD;
PDMARK Ardaco, a. s. Polianky 5 SK-841 01 Bratislava Slovakia Computer software for securing, encrypting, decrypting, authenticating, transmitting and receiving data, information, messages and voice calls in the field of data and communication security; computer application software for securing, encrypting, decrypting, authenticating, transmitting and receiving data, information, messages and voice calls in the field of data and communication security; communications software for connecting computer network users; communications software for connecting global computer networks; computer software for securing, encrypting, decrypting, authenticating, transmitting and receiving data, information, messages and voice calls in the field of telecommunication technologies; downloadable software for ensuring the security of computers; computer software to maintain and operate computer systems; computer software and firmware for operating system programs; computer software for use in database management; computer software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data; computer software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of information; computer software for application and database integration; computer hardware and software system for data and communication security; computer operating systems; computerized system for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data; downloadable computer operating systems; computer programs for monitoring security of data, information, messages and voice calls in the field of data and communication security; downloadable computer application software for data and communication security; computers; computer hardware; computer peripheral devices; computer memories; microprocessors; data processing apparatus; image scanners; electronic device for monitoring data and communication security; wireless or electronic communication devices for data transmission; telecommunication transmitters; transmitters of electronic signals; telephone apparatus; wireless telephones; cellular telephones; smartphones; telephone switchboards; walkie-talkies; radiotelephony sets; computer hardware, namely, communications servers; audiovisual receivers; apparatus for transmission of intercommunication; apparatus for recording, transmission and reproduction of sound or images; optical instruments and components, namely, optical transmitters, optical receivers, optical transceivers; blank magnetic data carriers; blank optical data carriers; downloadable electronic publications in the nature of books, magazines and manuals in the field of data and communication security;Providing telecommunications connections to a global computer network; providing user access to global computer networks; providing access to telecommunication networks; providing private and secure real-time electronic communication over a computer network; providing information relating to telecommunications; telephone communication services; telephone communications; communications by computer terminals; transmission of information by electronic communications networks among computers connected to the same telematic network; communications via fiber-optic networks; radio communications; satellite transmission of signals; electronic data transmission; computer-aided transmission of messages and images; electronic transmission of messages; wireless broadcasting services; rental of message sending apparatus; rental of telecommunication apparatus; rental of telephones; providing access to databases; transmission of digital files;PD MARK;Computer software design; development of software for communication systems; computer programming; computer programming services for security of electronic data; design and development of electronic data security systems; updating of software; rental of computer software; maintenance of computer software; installation of computer software; software as a service (SAAS) services featuring software for securing, encrypting, decrypting, authenticating, transmitting and receiving data, information, messages and voice calls in the field of data and communication security; duplication of computer programs; consultancy in the design and development of computers; computer software consultancy; computer technology consultancy services; computer security consultancy; outsource service providers in the field of information technology; telecommunication technology consultancy services; computer system design; computer system analysis; information technology (IT) consulting services; providing information on computer technology and programming via a web site; providing virtual computer systems and virtual computer environments through cloud computing; electronic data storage; off-site data backup; research and development of new products for others; graphic design; recovery of computer data; conversion of computer programs and data, other than physical conversion; conversion of data or documents from physical to electronic media; data conversion of electronic information; providing search engines for the Internet; scanning, namely, digitization of documents; data encryption and decoding services;
POLICY DROPLET LIQUID MACHINES, INC. 10 Maguire Road, Building 1 Lexington MA 02421 Computer software for securing and managing business information and business processes;POLICY;
PRIVASECURE Argonaut Software 407 Eureka Street San Francisco CA 94114 Computer software for securing a software application against unauthorized access;PRIVATE SECURE;
PRIVATE ISLAND Mind Chasers Inc. Suite 35-315 297 Route 72W Manahawkin NJ 08050 Computer software for securing and monitoring a local area network that may be downloaded from a global computer network; Downloadable software for connecting, operating, and managing networked devices in the nature of routers, computers, Webcams, and kitchen appliances via Ethernet that are both secure and private in the internet of things (IoT);
SECURESHOW MARGALLA COMMUNICATIONS, INC. 1339 Portola Road Woodside CA 94062 Computer software for securing and managing deployment of audio, video, graphic text, and computer programs over global computer networks;
SENTEON Senteon Suite 504 101 N. Cherry Street Winston-Salem NC 27101 Computer software for securing and regulating access to data by software applications; data protection software and data security software;
SILENTEL Ardaco, a. s. Polianky 5 SK-841 01 Bratislava Slovakia Computer software for securing, encrypting, decrypting, authenticating, transmitting and receiving data, information, messages and voice calls in the field of data and communication security; computer application software for securing, encrypting, decrypting, authenticating, transmitting and receiving data, information, messages and voice calls in the field of data and communication security; communications software for connecting computer network users; communications software for connecting global computer networks; computer software for securing, encrypting, decrypting, authenticating, transmitting and receiving data, information, messages and voice calls in the field of telecommunication technologies; downloadable software for ensuring the security of computers; computer software to maintain and operate computer systems; computer software and firmware for operating system programs; computer software for use in database management; computer software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data; computer software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of information; computer software for application and database integration; computer hardware and software system for data and communication security; computer operating systems; computerized system for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data; downloadable computer operating systems; computer programs for monitoring security of data, information, messages and voice calls in the field of data and communication security; downloadable computer application software for data and communication security; computers; computer hardware; computer peripheral devices; computer memories; microprocessors; data processing apparatus; image scanners; electronic device for monitoring data and communication security; wireless or electronic communication devices for data transmission; telecommunication transmitters; transmitters of electronic signals; telephone apparatus; wireless telephones; cellular telephones; smartphones; telephone switchboards; walkie-talkies; radiotelephony sets; computer hardware, namely, communications servers; audiovisual receivers; apparatus for transmission of intercommunication; apparatus for recording, transmission and reproduction of sound or images; optical instruments and components, namely, optical transmitters, optical receivers, optical transceivers; blank magnetic data carriers; blank optical data carriers; downloadable electronic publications in the nature of books, magazines and manuals in the field of data and communication security;Providing telecommunications connections to a global computer network; providing user access to global computer networks; providing access to telecommunication networks; providing private and secure real-time electronic communication over a computer network; providing information relating to telecommunications; telephone communication services; telephone communications; communications by computer terminals; transmission of information by electronic communications networks among computers connected to the same telematic network; communications via fiber-optic networks; radio communications; satellite transmission of signals; electronic data transmission; computer-aided transmission of messages and images; electronic transmission of messages; wireless broadcasting services; rental of message sending apparatus; rental of telecommunication apparatus; rental of telephones; providing access to databases; transmission of digital files;Computer software design; development of software for communication systems; computer programming; computer programming services for security of electronic data; design and development of electronic data security systems; updating of software; rental of computer software; maintenance of computer software; installation of computer software; software as a service (SAAS) services featuring software for securing, encrypting, decrypting, authenticating, transmitting and receiving data, information, messages and voice calls in the field of data and communication security; duplication of computer programs; consultancy in the design and development of computers; computer software consultancy; computer technology consultancy services; computer security consultancy; outsource service providers in the field of information technology; telecommunication technology consultancy services; computer system design; computer system analysis; information technology (IT) consulting services; providing information on computer technology and programming via a web site; providing virtual computer systems and virtual computer environments through cloud computing; electronic data storage; off-site data backup; research and development of new products for others; graphic design; recovery of computer data; conversion of computer programs and data, other than physical conversion; conversion of data or documents from physical to electronic media; data conversion of electronic information; providing search engines for the Internet; scanning, namely, digitization of documents; data encryption and decoding services;
TECH OFFICE NEONOVA NETWORK SERVICES 1201 EDWARDS MILL ROAD SUITE 102 RALEIGH NC 27607 COMPUTER SOFTWARE FOR SECURING, ORGANIZING, MAINTAINING, AND MANAGING PROFILES, LOGINS AND PASSWORDS FOR WEB BASED ACTIVITIES; DOWNLOADABLE SOFTWARE FOR COMPUTERS AND MOBILE DEVICES, namely, SOFTWARE FOR UPLOADING, STORING, AND CREATING SEARCHABLE DATABASES OF INFORMATION AND ELECTRONIC DATA, SHARING AND MANAGING INFORMATION AND DATA, AND ACCESSING AND DOWNLOADING INFORMATION AND DATA THROUGH COMPUTERS AND MOBILE DEVICES ON A CLOUD COMPUTING NETWORK;ONLINE TECHNICAL SUPPORT SERVICES, NAMELY, TROUBLESHOOTING IN THE NATURE OF THE REPAIR OF COMPUTER HARDWARE;TECH;COMPUTER VIRUS PROTECTION SERVICES; COMPUTER SERVICES, namely, ACTING AS AN APPLICATION SERVICE PROVIDER IN THE FIELD OF KNOWLEDGE MANAGEMENT TO HOST COMPUTER APPLICATION SOFTWARE FOR THE PURPOSE OF UPLOADING, SECURING, STORING, ORGANIZING, MAINTAINING, ACCESSING, AND MANAGING INFORMATION AND ELECTRONIC DATA FROM MOBILE AND NON-MOBILE DEVICES ON A CLOUD COMPUTING NETWORK; ONLINE TECHNICAL SUPPORT SERVICES, NAMELY, TROUBLESHOOTING IN THE NATURE OF DIAGNOSING COMPUTER HARDWARE AND SOFTWARE PROBLEMS; REPAIR OF COMPUTER SOFTWARE; MONITORING OF COMPUTER SYSTEMS FOR CYBERSECURITY PURPOSES;
TRANSACTOR POSTLINEAR ENTERTAINMENT, INC. 503 Pixie Trail Mill Valley CA 94941 computer software for securing the ownership and distribution of digital objects over interactive networks;TRANS ACTOR;
WEBNETWORK Stoneware, Inc. P.O. Box 3352 Carmel IN 460823352 Computer software for securing and integrating access to web servers, web applications and web services;WEB NETWORK;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.