COMPUTER SYSTEM SECURITY CONSULTING

Brand Owner (click to sort) Address Description
BETRUSTED PRICEWATERHOUSECOOPERS LLP 300 Madison Avenue New York NY 10017 computer system security consulting and advisory services, namely, consulting services for analysis design, implementation, testing and operation of security systems for computer systems and networks; providing consulting services to ensure identification, authorization, authentication, encryption, integrity, confidentiality and non-repudiation of participants and data involved in communication of computer data;
SECURE DIGITAL INFRASTRUCTURE Guardent, Inc 75 Third Avenue Waltham MA 02451 Computer system security consulting, advisory, and management services, namely, strategic consulting services for analysis, design, implementation, testing, and operation of security systems for computer systems and networks;
SECURITY DIALTONE Guardent, Inc. 75 Third Avenue Waltham MA 02451 computer system security consulting, advisory, and management services, namely, strategic consulting services for analysis, design, implementation, testing, operation of security systems for computer systems and networks, and deployment and maintenance of a continuous communications link between a host server and a client device for the purpose of providing and managing computer and network security of the client network;SECURITY DIAL TONE;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.