Brands and Their Owners
Brand | Owner (click to sort) | Address | Description |
---|---|---|---|
COMPUTERSAFE | SAVARESE, EDWARD W. | 1106 2nd Street Suite 20 Encinitas CA 92024 | COMPUTER SECURITY SOFTWARE FOR USE IN PROTECTING DATA STORED ON A COMPUTER HARD DRIVE BY HIDING, LOCKING AND ENCRYPTING FILES;COMPUTER SAFE; |
DEEP DISCOVERY | Trend Micro Kabushiki Kaisha | Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan | computer security software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; computer network and data security software for use in protecting computers, computer networks, and mobile devices; computer software for use in monitoring, inspecting, analyzing and reporting on data traffic on computer networks; computer software for identifying, tracking, simulating and analyzing potential security threats to computers, computer data and computer systems; computer software for identifying malicious content, communications and computer and network behavior threatening computers and computer networks; computer software for detecting and responding to advanced persistent threats and targeted security attacks; computer hardware; computer security appliances, network security appliances, and unified threat management (UTM) appliances, namely, computer hardware and software for detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer data, computer networks, and mobile devices; virtual computer security appliances and virtual network security appliances, namely, virtual machine images emulating computer hardware and software for detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer data, computer networks, and mobile devices; |
GLOB@LCERTS | GLOBALCERTS | 701 PALOMAR AIRPORT RD. STE 300 CARLSBAD CA 92011 | Computer security software for use in data security, for encryption, for ensuring the security of electronic mail, and for management of digital certificates;GLOB@L CERTS; GLOBAL CERTS; GLOBALCERTS; |
GLOB@LCERTS | Globalcerts, LC | 117 South 14th Street Richmond VA 23219 | Computer security software for use in data security, for encryption, for ensuring the security of electronic mail, and for management of digital certificates;GLOB@L CERTS; GLOBAL CERTS; GLOBALCERTS; |
IMSHIELD | Infosec Co., Ltd. | 7F, 1008-4, Daechi-dong, Gangnam-gu Nat'l Council of Saemaul Undong Movement Seoul Republic of Korea | Computer security software for use in securing mobile terminals for electronic transactions by monitoring and locating lost mobile terminals, as well as providing backup files for data on mobile terminals and encryption of said mobile terminals;IM SHIELD; |
|
|||
INTRUSION.COM | ODS NETWORKS, INC. | 1101 E. Arapaho Road Richardson TX 75081 | COMPUTER SECURITY SOFTWARE FOR USE IN THE FIELD OF DATA AND NETWORK SECURITY; COMPUTER SOFTWARE FOR USE IN DETECTING UNAUTHORIZED ACCESS AND ATTEMPTS TO ACCESS AND MISUSE COMPUTER SYSTEMS AND NETWORKS; AND COMPUTER SECURITY SOFTWARE FOR USE IN MONITORING THE DATA INTEGRITY OF COMPUTER SYSTEMS AND NETWORKS, AND INSTRUCTION MANUALS SOLD AS A UNIT THEREWITH;INTRUSION COM; |
LAPTOP RETRIEVER | Absolute Software Corporation | Suite 1400, 1055 Dunsmuir Street Vancouver, B.C. V7X1K8 Canada | Computer security software for use in computers to enable the monitoring of the computer's location, locating the computer if lost or stolen, and notification in the event of theft or loss of the computer; computer software instructional manuals recorded on computer disks or compact disks for computer security software for monitoring of the computer's location, locating the computer if lost or stolen, and notification in the event of theft or loss of the computer;LAP TOP RETRIEVER;Monitoring services for locating lost or stolen computers, namely, monitoring services wherein telecommunications equipment is maintained to receive internet or telephone calls originating with computers programmed with software designed to automatically connect to or dial the monitoring services in the event of theft or loss of the computers;LAPTOP; |
LEASHING | Venice Technologies, Inc. | 153 Upland Road Cambridge MA 02140 | computer security software for use by others in the control and protection of software and digital content;computer services, namely, providing on-line computer software security services over a global communication network for use by others to prevent unauthorized use of other computer software; |
PDA BOMB | Asynchrony.com, Inc. | 1709 Washington Ave Suite 200 St. Louis MO 63103 | Computer security software for use in securing and encrypting data stored on handheld devices, namely, personal digital assistants, handheld computers and cellular phones, that may be transferred via electronic media or downloaded from the internet;PDA; |
PDA DEFENSE | TX TECHNOLOGY ACQUISITION CORP. | 4250 BURTON DRIVE SANTA CLARA CA 95054 | Computer security software for use in securing and encrypting data stored on handheld devices, namely, personal digital assistants, handheld computers and cellular phones, that may be transferred via electronic media or downloaded from the internet;PDA; |
SECURENET PRO | INTRUSION.COM, INC. | 1101 Arapaho Road Richardson TX 75081 | COMPUTER SECURITY SOFTWARE FOR USE IN THE FIELD OF DATA AND NETWORK SECURITY NAMELY, COMPUTER SOFTWARE FOR USE IN DETECTING UNAUTHORIZED ACCESS OR ATTEMPTS TO ACCESS, OR MISUSE OR ATTACKS ON COMPUTER SYSTEMS AND NETWORKS, AND COMPUTER SOFTWARE FOR USE IN MONITORING AND MAINTAINING THE SAFETY AND DATA INTEGRITY OF A COMPUTER SYSTEM OR COMPUTER NETWORK, AND INSTRUCTION MANUALS SOLD AS A UNIT THEREWITH; |
SECURETRANSIT | Celiceo, Michael, R. | 1970 Woodglen Way El Cajon CA 92020 | Computer security Software for use in the field of data and network security while using the Internet; |
SECURITY OBJECTS | OPTIV FEDERAL INC. | 1125 17TH STREET SUITE 1700 DENVER CO 80202 | computer security software for use in securing data, networks, computers and online transactions; computer software for use in ensuring the security of information processing, namely, software enabling the evaluation and enhancement of enterprise security, software evaluating security product policy configurations, software to convert product configurations from one vendor to another, and software for use in preventing web browser attack and intrusion; |
SILENT DUNE | Lone Prairie | 1464 W 2375 S Syracuse UT 84075 | Computer security software for use in firewall management; |
VIRTUAL LEASHING | Venice Technologies, Inc. | 153 Upland Road Cambridge MA 02140 | computer security software for use by others in the control and protection of software and digital content;VIRTUAL;computer services, namely, providing on-line computer software security services over a global communication network for use by others to prevent unauthorized use of other computer software; |
WIDS | ODS Networks. Inc | 1101 E. Arapaho Road Richardson TX 75081 | COMPUTER SECURITY SOFTWARE FOR USE IN THE FIELD OF DATA AND NETWORK SECURITY; COMPUTER SOFTWARE FOR USE IN DETECTING UNAUTHORIZED ACCESS OR ATTEMPTS TO ACCESS, OR MISUSE COMPUTER SYSTEMS AND NETWORKS AND COMPUTER SOFTWARE FOR USE IN MONITORING THE SAFETY AND DATA INTEGRITY OF A COMPUTER SYSTEM OR COMPUTER NETWORK AND INSTRUCTION MANUALS SOLD AS A UNIT THEREWITH; |
Where the owner name is not linked, that owner no longer owns the brand |