COMPUTER SOFTWARE THAT PROVIDES SECURITY

Brand Owner (click to sort) Address Description
GIGAWALL Top Layer Networks, Inc. 2400 Computer Drive Westboro MA 015811770 COMPUTER SOFTWARE THAT PROVIDES SECURITY FOR HIGH SPEED NETWORK TRAFFIC AND DATA FLOWS; AND COMPUTER HARDWARE, NAMELY, INTEGRATED CIRCUITS;GIGA WALL;
ICEPAC NETWORK ICE CORPORATION 2121 South El Camino Real, Suite 1100 San Mateo CA 94403 COMPUTER SOFTWARE THAT PROVIDES SECURITY FOR NETWORKED COMPUTERS THROUGH THE MONITORING OF COMPUTER NETWORKS FOR NETWORK INTRUSION; COMPUTER SOFTWARE THAT PROVIDES FIREWALL PROTECTION;ICE PACK;
SECUREVUE CYGILANT, INC. 2400 DISTRICT AVENUE; SUITE 320 BURLINGTON MA 01803 Computer software that provides security and risk management to help customers gain insight into overall security and risk posture by integrating security information and event management, configuration management, asset management, performance management, vulnerability analysis across heterogenous information technology infrastructures, including network, application and server layers to deliver log management, reporting, monitoring, correlation analysis, forensics, and risk and regulatory compliance management;SECURE VIEW;
TERAWALL Top Layer Networks, Inc. 2400 Computer Drive Westboro MA 015811770 Computer software that provides security for high speed network traffic and data flow; and computer hardware, namely, integrated circuits;TERA WALL;
WWW.BUGSOLVER.COM Astratek, Inc. 5 Hanover Square 24th Floor New York NY 10004 computer software that provides security against theft or unauthorized alteration of executable programs and binary objects run on individual or networked computers; computer software for monitoring the performance of other executable programs including operating systems; and, computer software for use in the testing, debugging and performance optimization of other executable programs including operating systems;BUG SOLVER;WWW. or .COM;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.