COMPUTER SOFTWARE SECURITY MANAGEMENT

Brand Owner (click to sort) Address Description
AC2000SE SENSORMATIC ELECTRONICS CORPORATION 6600 Congress Avenue Boca Raton FL 33487 Computer software for security management, namely access control, event monitoring, and alarm monitoring;
ADCNET Anonymous Data Corporation 4340 S. Valley View Blvd Suite 210 Las Vegas NV 89103 COMPUTER SOFTWARE FOR SECURITY MANAGEMENT OF DATA THAT MAY BE DOWNLOADED FROM A GLOBAL COMPUTER NETWORK;ANONYMOUS DATA CORPORATION NET;
OPS Suite-Soft Technologies, Inc. 47 Potterfield Dr. Lovettsville VA 20180 Computer software for security management;
PPM 2000 PPM 2000 INC. Suite 500, 10216 - 124 Street Edmonton, Alberta T5N 4A3 Canada computer software for security management, namely, for tracking incidents, managing investigations and generating reports for security and loss prevention personnel;2000;
REAL TIME MCAFEE, INC. 2821 Mission College Blvd. Santa Clara CA 95054 Computer software for security management, incident response, unmanaged assets, patch management, continuous monitoring, network access control, detection and remediation of malware; computer software for systems management, asset management, file distribution, software metering, software license management, audit and compliance, configuration management; computer software for automatically detecting failures and their root causes;Providing on-line non-downloadable software for security management, incident response, unmanaged assets, patch management, continuous monitoring, network access control, detection and remediation of malware; computer software for systems management, asset management, file distribution, software metering, software license management, audit and compliance, configuration management; computer software for automatically detecting failures and their root causes;
REAL TIME COMMAND MCAFEE, INC. 2821 Mission College Blvd. Santa Clara CA 95054 Computer software for security management, incident response, unmanaged assets, patch management, continuous monitoring, network access control, detection and remediation of malware; computer software for systems management, asset management, file distribution, software metering, software license management, audit and compliance, configuration management; computer software for automatically detecting failures and their root causes;Providing on-line non-downloadable software for security management, incident response, unmanaged assets, patch management, continuous monitoring, network access control, detection and remediation of malware; computer software for systems management, asset management, file distribution, software metering, software license management, audit and compliance, configuration management; computer software for automatically detecting failures and their root causes;
TANIUM Tanium Inc. 2100 Powell Street, Suite 1600 Emeryville CA 94608 Computer software for security management, incident response, unmanaged assets, patch management, continuous monitoring, network access control, detection and remediation of malware; computer software for systems management, asset management, file distribution, software metering, software license management, audit and compliance, configuration management; computer software for automatically detecting failures and their root causes;In the statement, Column 1, line 1, Tanium, Inc. should be deleted, and Tanium Inc. should be inserted.;
TITAN SECURITY TOOLKIT Team Titan - Powell, Farmer, Archibald 1738 Pomeroy Avenue Santa Clara CA 95051 Computer software for security management and configuration of computer network operating systems;TITAN SECURITY TOOL KIT;SECURITY TOOLKIT;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for controlling integrity measurement of an un-trusted system component on a client system includes a trusted management utility configured to measure the integrity of the un-trusted system component, a trusted fixed token resident on the client system, and a trusted registration service. The trusted registration service creates a signed hash of the trusted management utility software and stores the signed hash of the trusted management utility software in the trusted fixed token. The trusted registration service creates a security domain and stores the security domain in the trusted fixed token. The trusted fixed token creates a signed hash of the trusted management utility software and the security domain, and securely communicates the signed hash of the trusted management utility software and the security domain to the trusted registration service. The trusted management utility software is installed on the client system and executed to gather integrity measurements on the un-trusted system component. A hash of the un-trusted system component and the trusted management utility software is created and stored in the trusted fixed token. This data may be combined with the security domain. The hash of the un-trusted system component, the trusted management utility software, and the security domain may be interrogated by the trusted registration service to verify the integrity of the un-trusted system component.