COMPUTER SOFTWARE USED SECURE

Brand Owner (click to sort) Address Description
DIGITAL EVOLUTION DIGITAL EVOLUTION, INC. 139 Fulton Street New York NY 10038 Computer Software used to secure, monitor, and manage XML and Web services applications and components across distributed enterprise and extranet environments for the purpose of providing centralized management of distributed architectures;DIGITAL;
ENCRYPTED REALPORT DIGI INTERNATIONAL INC. Suite 700 9350 Excelsior Blvd Hopkins MN 55343 Computer software used to secure data transmitted across a computer network;ENCRYPTED REAL PORT;ENCRYPTED;
ETHENTICA ETHENTICA, Inc. 10315 102nd Terrace Sebastian FL 32958 Computer software used to secure entry to various software applications using biometric technology or security codes to authenticate users identity and on-line electronic publications, namely corporate web sites, corporate intranets, portals, content providers and application service providers in the fields of healthcare software applications, healthcare services and electronic data interchange;manuals and business forms in the information and Internet security fields;Business-to-business e-commerce services, namely, providing technology for authenticating users identity via an on-line global computer network;Computer monitoring, verification and identification services for providing entry to various software applications using biometric technology or security codes to authenticate users identity via an on-line global computer network;
EUROPRESIDEO PRESIDEO, INC. 10305 102nd Terrace Sebastian FL 32958 Computer software used to secure access to various software applications using biometric technology to authenticate users identity and electronic publications;Printed advertising and instructional materials, user manuals and business forms;EUROPE PRESIDEO;Business to business e-commerce services providing access to technology for authenticating users identity;Computer services for providing access to various software applications using biometric technology to authenticate users identity via an on-line global computer network;
GREENBORDER Green Border Technologies, Inc. 331 Fairchild Drive Mountain View CA 94043 Computer software used to secure computers, computer networks and electronic data by generating environments for the execution of certain computer content or events isolated from system resources and user data, and by protecting computer hardware and computer networks from malicious content; computer software used for testing software applications; computer software used for harnessing unutilized CPU cycles of computers for distributed computing;GREEN BORDER;
IDAUTHORITY lntegrated Visions, Inc. 10315 102nd Terrace Sebastian FL 32958 Computer software used to secure entry to various software applications using biometric technology to authenticate users identity and electronic publications, namely corporate web sites, corporate intranets, portals, content providers and application service providers in the fields of healthcare software applications, healthcare services and electronic data interchange;Printed advertising materials, namely, brochures, trade journals and booklets in the field of information security and Internet security infrastructure, printed instructional and educational materials, users manuals and business forms in the information and Internet security fields;ID AUTHORITY IDENTIFICATION AUTHORITY;Business-to-business e-commerce services, namely, providing information for authenticating users identity via an on-line global computer network;Computer monitoring, verification and identification services for providing entry to various software applications using biometric technology to authenticate users identity via an on-line global computer network;
INTEGRATED VISIONS Integrated Visions, Inc. 10315 102nd Terrace Sebastian FL 32958 computer software used to secure access to various software applications using biometric technology to authenticate users identity;INTEGRATED;
ITRACE 2DMI iTRACE Technologies, Inc. 3790 El Camino Real, Unit #644 Palo Alto CA 94306 Computer software used to secure, track, trace, authenticate and code digital rights, data, products and documents against fraud, piracy, counterfeiting, tampering and diversion;I TRACE TWO DMI; I TRACE TWO DMI;Design and implementation of software and technology solutions for the purpose of product and document authentication and tracking, tracing, securing and brand monitoring and protection, to protect against fraud, piracy, counterfeiting, tampering and diversion, and to ensure the integrity of genuine products and documents;
PRESIDE0 Integrated Visions, Inc. 10315 102nd Terrace Sebastian FL 32958 Computer software used to secure access to various software applications using biometric technology to authenticate users identity and electronic publications;Printed advertising and instructional materials, users manuals and business forms;PRESIDE0;Business-to-business e-commerce services providing access to technology for authenticating users identity;Computer services for provldlng access to various software applications using biometric technology to authenticate users identity via an on-line global computer network;
PRESIDEO ACCESS MANAGER PRESIDEO, INC. 10305 102nd Terrace Sebastian FL 32958 Computer software used to secure access to various software applications using biometric and other strong authentication technology to authenticate users identity;ACCESS MANAGER;
PRESIDEO PROTECTED PRESIDEO, INC. 10305 102nd Terrace Sebastian FL 32958 Computer software used to secure entry to various software applications using biotmetric technology to authenticate users identity and electronic publications, namely corporate web sites, corporate intranets, portals, content providers and application service providers in the fields of healthcare software applications, healthcare services and electronic data interchage;Printed advertising materials, namely brochures, trade journals and booklets in the field of information security and network and Internet security infrastructure, printed instructional and educational materials, users manuals and business forms in the information and network and Internet security fields;Business-to-business e-commerce services, namely, providing access to technology for authenticating users identity via an on-line global computer network;PROJECTED;Computer monitoring, verification and identification services for providing access to various software applications using biometric technology to authenticate users identity via an on-line global computer network;
PRIVACY CURTAIN Integrated Visions, Inc. 10315 102nd Terrace Sebastian FL 32958 computer software used to secure access to various software applications using biometric technology to authenticate users identity;PRIVACY;
PRIVACY CURTAIN PLUS PRESIDEO, INC. 10305 102nd Terrace Sebastian FL 32958 computer software used to secure access to various software applications using biometric technology to authenticate users identity;In the statement, column 1, before line 1, Presideo, Inc. (Delaware Corporation), 10315 102nd Terrace, Sebastian, FL 32958, by change of name should be inserted.;
SCADASAFE Aegis Technologies. Inc 2020 N. Central Aveune, Suite 200 Phoenix AZ 85004 Computer software used to secure and protect the data communications transmitted by Supervisory Control And Data Acquisition (SCADA) Systems;SCADA SAFE;
SCADASAFE Secure Homeland Technologies 7510 E. Thomas, Suite 214 Scottsdale AZ 85251 Computer software used to secure and protect the data communications transmitted by Supervisory Control And Data Acquisition (SCADA) Systems;SCADA SAFE;
SEARCHPERFECT OAC INC. 4616 W. Sahara Suite #1-448 Las Vegas NV 89102 computer software used to secure clients and seek candidates to fulfill search business requirements for employees;Search Perfect;
SIMPLY SECURE Marchetti, Dean 19 Carlton St. Peabody MA 01960 computer software used to secure and customize the operating system user interface;
THE CURE IN SECURE Green Border Technologies, Inc. 331 Fairchild Drive Mountain View CA 94043 Computer software used to secure computers, computer networks and electronic data by generating environments for the execution of certain computer content or events isolated from system resources and user data, and by protecting computer hardware and computer networks from malicious content; computer software used for testing software applications; computer software used for harnessing unutilized CPU cycles of computers for distributed computing;Design and development of computer software for others; installation, configuration and maintenance of computer software for others; computer services, namely, monitoring, management and reporting to users of data generated by computers running the software for purposes of computer security, software testing and distributed computing;
TRUSTENGINE PRESIDEO, INC. 10305 102nd Terrace Sebastian FL 32958 Computer software used to secure entry to various software applications using biometric technology to authenticate users identity and electronic publications, namely corporate web sites, corporate intranets, portals, content providers and application service providers in the fields of healthcare software applications, healthcare services and electronic data interchange;Printed advertising materials, namely brochures, trade journals and booklets in the field of information security and internet security infrastructure, printed instructional and educational materials, users manuals and business forms in the information and internet security fields;TRUST ENGINE;Business-to-business e-commerce services, namely, providing information for authenticating users identity via an on-line global computer network;Computer monitoring, verification and identification services for providing entry to various software applications using biometric technology to authenticate users identity via an on-line global computer network;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A secure software system for a portable device or computer that provides a simple interface to the device or computer and that retrieves and dynamically decrypts keys and content from a secure media while minimizing exposure of the keys and eliminating the need for manufacturers of the device or computer to create a their own system to manage these complex processes.