COMPUTER SOFTWARE USED PROTECT

Brand Owner (click to sort) Address Description
CLEAN SLATE FORTRES GRAND CORPORATION PO Box 888 119 W Garro Street Plymouth IN 46563 Computer software used to protect public access computers by scouring the computer drive back to its original configuration upon reboot;
FOLDERSEAL Surety 12020 Sunrise Valley Drive, Suite 250 Reston VA 20191 computer software used to protect and authenticate electronic data and records;FOLDER SEAL;
PRIVATESURFER U.S. Municipal Products 12685 Dorsett, Suite 140 Maryland Heights MO 63043 Computer software used to protect the privacy of information accessed via a personal computer and a global computer information network by removing the trail of information that has been accessed and providing an encrypted storage vault with built-in image viewer for information, whether originating from a global computer information network or other sources on the user's personal computer, and instruction manuals distributed therewith;PRIVATE SURFER;
RETURNIL Returnil, SIA K. Valdemara Iela 37 Riga LV-1011 Latvia Computer software used to protect computers from viruses, spyware and unwanted programs, preserve computer settings, and ensure Internet privacy;
TIME TUNNEL APPLE INC. One Apple Park Way Cupertino CA 95014 Computer software used to protect and back up computer files, and to recover and restore deleted and overwritten files;
TMEG TRUSTED INFORMATION SYSTEMS, INC. 3060 Washington Road - Rt. 97 Glenwood MD 21738 computer software used to protect confidential and classified data and information;
TMEG-100 TRUSTED INFORMATION SYSTEMS, INC. 3060 Washington Road - Rt. 97 Glenwood MD 21738 computer software used to protect confidential and classified data and information;
VAULTWARE U.S. Municipal Products 12685 Dorsett, Suite 140 Maryland Heights MO 63043 Computer software used to protect the privacy of information accessed via a personal computer by providing an encrypted storage vault with a built-in image viewer for information while providing programmatic and user interfaces to electronic messaging systems which allows users to insert, retrieve and manipulate messages and attachments, which maintain security via encryption, and instruction manuals distributed therewith;VAULT WARE;
ZEPHRA ZEPHRA 360 Post Street Suite 1105 San Francisco CA 94108 computer software used to protect electronically-accessible corporate information, for use in securing, sharing and managing encrypted electronic data on computer hardware and computer networks, and through the Internet;Information encryption and security technology services for securing, sharing and managing encrypted data on computer hardware and computer networks, and through the Internet;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.