COMPUTER NETWORK SECURITY SYSTEMS

Brand Owner (click to sort) Address Description
AVERTIS Galea Network Security Inc. 2120 Victoria Avenue, Greenfield Park Quebec, J4V 1M9 Canada computer network security systems, namely, firewalls comprised of computer hardware and computer software for use in protecting computer networks from data theft or damage by unauthorized users;
CYBERGUARD MCAFEE, INC. 2821 Mission College Blvd. Santa Clara CA 95054 computer network security systems, namely firewalls comprising computer software and hardware for use in protecting computer networks from data theft or damage by unauthorized users;CYBER GUARD;
CYBERGUARD CYBERGUARD CORPORATION Suite 200 2000 West Commercial Boulevard Fort Lauderdale FL 33009 computer network security systems, namely, firewalls comprising computer hardware and software for use in protecting computer networks from access by unauthorized users;
CYBERGUARD Harris Computer Systems Corporation 2101 West Cypress Creek Road Fort Lauderdale FL 33309 computer network security systems, namely firewalls comprising computer software and hardware for use in protecting computer networks from data theft or damage by unauthorized users;CYBER GUARD;
CYBERGUARD HARRIS COMPUTER SYSTEMS CORP. 2101 W. Cypress Creek Road Fort Lauderdale FL 33309 computer network security systems, namely, firewalls comprising computer hardware and software for use in protecting computer networks from access by unauthorized users;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A policy-based network security management system is disclosed. In one embodiment, the system comprises a security management controller comprising one or more processors; a computer-readable medium carrying one or more sequences of instructions for policy-based network security management, wherein execution of the one or more sequences of instructions by the one or more processors causes the one or more processors to perform the steps of receiving a set of data regarding a user of a computer network; automatically deciding on a course of action based on the set of data, wherein the course of action may be adverse to the user although the set of data is insufficient to establish whether the user is performing a malicious action; and sending signals to one or more network elements in the computer network to implement the decision.