COMPUTER SECURITY SOFTWARE

Brand Owner (click to sort) Address Description
APOLYTA Apolyta Inc. 651 N Broad St, Ste 205 #4859 Middletown DE 19709 Computer security software; computer software for validating security controls of computer terminals, servers, endpoints and networks through simulating cyber-attacks in real world scenarios; downloadable software for measuring the security maturity level and improving security controls' efficacy of a given system, namely, personal computer, server, mobile, or IoT device through adaptive cyberattack simulations and emulations; downloadable software for measuring the security maturity level and improving security controls' efficacy of a group of systems, namely, a network or multiple networks, or entire organizations through adaptive cyberattack simulations and emulations; computer software for conducting adaptive penetration tests for computer terminals, servers, endpoints and networks for determining and identifying information security weaknesses, assessing security gaps and recommending plans for preventing cybersecurity attacks; downloadable software for proactively assuring security controls' effectiveness and preparedness against different types of cyber threats; downloadable software for continuously simulating adaptive cyber-security attacks and recommending practical mitigation strategies; downloadable software for predicting and preventing computer and electronics security issues prior to their occurring; downloadable software for adaptive attack emulation and/or simulation; downloadable software for measuring security controls' efficacy; downloadable software for security benchmarking; downloadable software for automated remediation of detected gaps; downloadable software for adaptive security validation;Providing online non-downloadable cloud-based security software; providing online non-downloadable cloud-based software for validating security controls of computer terminals, servers, endpoints and networks through simulating cyber-attacks in real world scenarios; providing online non-downloadable cloud-based software for measuring the security maturity level and improving security controls' efficacy of a given system, namely, personal computer, server, mobile, or IoT device through adaptive cyberattack simulations and emulations; providing online non-downloadable cloud-based software for measuring the security maturity level and improving security controls' efficacy of a group of systems, namely, a network or multiple networks, or entire organizations through adaptive cyberattack simulations and emulations; providing online non-downloadable cloud-based computer software for conducting adaptive penetration tests for computer terminals, servers, endpoints and networks for determining and identifying information security weaknesses, assessing security gaps and recommending plans for preventing cybersecurity attacks; providing online non-downloadable cloud-based software for proactively assuring security controls' effectiveness and preparedness against different types of cyber threats; providing online non-downloadable cloud-based software for continuously simulating adaptive cyber-security attacks and recommending practical mitigation strategies; providing online non-downloadable cloud-based software for predicting and preventing computer and electronics security issues prior to their occurring; providing online non-downloadable cloud-based software for adaptive attack emulation and/or simulation; providing online non-downloadable cloud-based software for measuring security controls' efficacy; providing online non-downloadable cloud-based software for security benchmarking; providing online non-downloadable cloud-based software for automated remediation of detected gaps; providing online non-downloadable cloud-based software for adaptive security validation; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security weaknesses, gaps, and security maturity level; monitoring and testing of computer terminals, servers, endpoints and networks directed toward the prevention, detection or other action with respect to security threats and malicious activities;
APPSOLID SEW, Inc. 530 Howard Street, Suite 300 San Francisco CA 94105 computer security software; computer software for use in detecting and preventing reverse engineering, modification, tampering, and hacking of computer software, embedded software, and firmware; computer software for use in big data analytics of hacking data; anti-decompile, anti-repackaging, and anti-memory hack software; computer software to detect unauthorized changes, or attempts at piracy of computer software, embedded software, and firmware; computer software to shut off access of other computer software to network-based resources; computer software to prevent unauthorized duplication of computer software, embedded software, and firmware; computer software for use in software and application development; downloadable electronic publications, namely, technical whitepapers and articles in the fields of computer and application security, and software development;APPLICATION SOLID;software as a service (SAAS) services featuring computer security software; providing temporary use of online, non-downloadable computer security software; software as a service (SAAS) services featuring software for providing an online dashboard of application usage and hacking data; providing temporary use of online, non-downloadable computer software for use in detecting and preventing reverse engineering, modification, tampering, and hacking of computer software, embedded software, and firmware; providing temporary use of online, non-downloadable computer software for use in big data analytics of hacking data; providing temporary use of online, non-downloadable computer antivirus software; providing temporary use of online, non-downloadable computer software for use in software and application development; providing temporary use of online, non-downloadable anti-decompile, anti-repackaging, and anti-memory hack software; providing temporary use of online, non-downloadable computer software to detect unauthorized changes, or attempts at piracy of computer software, embedded software, and firmware; providing temporary use of online, non-downloadable computer software to shut off access of other computer software, embedded software, and firmware to network-based resources; providing temporary use of online, non-downloadable computer software to prevent unauthorized duplication of computer software, embedded software, and firmware; computer services, namely, mobile application security services for protecting mobile applications from reverse engineering, modification, tampering, and hacking; computer services, namely, diagnosis of software application vulnerabilities via computer and communication networks ; computer services, namely, remediation of software application vulnerabilities via computer and communication networks by remotely disabling or blocking execution of mobile applications; consultation in the field of computer security;
ASSURED COMPLIANCE DYNETICS, INC. 1002 Explorer Boulevard Huntsville AL 35806 Computer security software, namely, software for determining the presence of malicious code on computers or whether hacking-type activities have been performed on a computer;
AUTOMATED SECURITY INTELLIGENCE NIPPON DENKI KABUSHIKI KAISHA 7-1, Shiba 5-Chome, Minato-ku Tokyo 108-8001 Japan computer security software; computer monitoring software; computer software for machine learning; computer software for learning computer system conditions using machine learning; computer software for detecting computer system failure and problems; computer software for comparative analysis; computer software for comparing and analyzing conditions of computer systems; computer analysis and detection software which automatically disconnect system from network when detecting system failure; cyber security software for protecting against cyber threats;installation, updating, maintenance, repair, and configuration of computer software; Installation, updating, maintenance, repair, and configuration of computer software for machine learning; computer software design; technical support and consulting services in the field of cyber security;
BAYSHORE OPSWAT INC. 5650 Breckenridge Park Dr #201 Tampa FL 33610 Computer security software;The drawing is amended to appear as follows: BAYSHORE In the statement, No claim is made to the exclusive right to use NETWORKapart from the mark as shown, is deleted.;BAY SHORE;
BAYSHORE Bayshore Networks Suite 203 88 New Dorp Plaza Staten Island NY 10306 Computer security software;The drawing is amended to appear as follows: BAYSHORE In the statement, No claim is made to the exclusive right to use NETWORKapart from the mark as shown, is deleted.;BAY SHORE;
BLOCKMASTER DATALOCKER INC. 7300 College Blvd. Suite 600 Overland Park KS 66210 Computer security software; computer memories; portable data memory units, namely, flash drives, usb-memory drives, external computer hard drives; blank magnetic and optical data carriers; computer software for management of flash drives, usb-memory drives, external hard drives and for management of content and features on such drives; computer software for encryption, for use in the safeguarding of digital files, for creating searchable databases of information and data, for use in computer memories and portable information storage device;BLOCK MASTER;Consultancy with regard to computer security and computer data security; design and development of computer hardware and software; computer programming; computer hardware and software consultancy services;
BONGOSOFT Kosco, Michael T 122 Avenida Santa Inez San Clemente CA 92672 computer security software;BONGO SOFT;
CENTENNIAL SOFTWARE Centennial Software Limited Wind River House 10 Viscount Way Swindon SN3 4TN United Kingdom Computer security software;SOFTWARE;
CIPHENT OPTIV FEDERAL INC. 1125 17TH STREET SUITE 1700 DENVER CO 80202 computer security software; computer software for use in ensuring the security of information processing, namely, software enabling the evaluation and enhancement of enterprise security, software evaluating security product policy configurations, software to convert product configurations from one vendor to another, and software for use in preventing web browser attack and intrusion;software design and consulting, consulting services in the field of design, selection, implementation and use of software systems for others in the fields of anti-virus, encryption, host intrusion prevention, data loss prevention, firewalls, network intrusion prevention, vulnerability management, cyber security assessments, application and software security and incident response;
CIPHENT ACCUVANT FEDERAL SOLUTIONS INC. 7467 RIDGE ROAD SUITE 100 HANOVER MD 21076 computer security software; computer software for use in ensuring the security of information processing, namely, software enabling the evaluation and enhancement of enterprise security, software evaluating security product policy configurations, software to convert product configurations from one vendor to another, and software for use in preventing web browser attack and intrusion;software design and consulting, consulting services in the field of design, selection, implementation and use of software systems for others in the fields of anti-virus, encryption, host intrusion prevention, data loss prevention, firewalls, network intrusion prevention, vulnerability management, cyber security assessments, application and software security and incident response;
CIPHENT Ciphent, Inc. 7467 Ridge Road Suite 100 Hanover MD 21076 computer security software; computer software for use in ensuring the security of information processing, namely, software enabling the evaluation and enhancement of enterprise security, software evaluating security product policy configurations, software to convert product configurations from one vendor to another, and software for use in preventing web browser attack and intrusion;software design and consulting, consulting services in the field of design, selection, implementation and use of software systems for others in the fields of anti-virus, encryption, host intrusion prevention, data loss prevention, firewalls, network intrusion prevention, vulnerability management, cyber security assessments, application and software security and incident response;
CIPHER LOGICS CIPHER LOGICS CORPORATION 220 North Adams Street Rockville MD 20850 computer security software, namely, software used to encrypt data and other computer storable information;
CLAMWIN CLAMWIN PTY LTD P.O. BOX 5421 MORDIALLOC 3195 Australia Computer security software, namely, anti-virus software, anti-spyware software, anti-malware software and computer software for filtering contents of electronic messages and Internet webpages; prerecorded digital data storage media featuring the aforementioned computer software;CLAM WIN;CLAMWIN has no meaning in a foreign language.;
CLOUDPASSAGE CloudPassage, Inc. 95 3rd Street San Francisco CA 94103 Computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments;CLOUD PASSAGE;Computer services, namely, ensuring computer security by restricting network access to computers, controlling computer operating system and application security configuration parameters, monitoring and managing access rights and privileges to computers, and monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; cloud computing services, namely, providing software as a service (SaaS) services, namely, hosting software for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments, and infrastructure-as-a-service (IaaS) services, namely, hosting one or more virtual computers for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments; computer consultation in the field of cloud computer security;
CORE ACCESS FORTRA Suite 100 11095 Viking Drive Eden Prairie MN 55344 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;ACCESS;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network;
CORE ACCESS INSIGHT FORTRA Suite 100 11095 Viking Drive Eden Prairie MN 55344 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;ACCESS;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network;
CORE COMPLIANCE FORTRA Suite 100 11095 Viking Drive Eden Prairie MN 55344 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;COMPLIANCE;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network;
CORE FORCE CORE SDI, Inc. 44 Wall Street, 12th Floor New York NY 10005 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network;
CORE IMPACT CORE SDI, Inc. 44 Wall Street, 12th Floor New York NY 10005 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network;
CORE IMPACT FORTRA Suite 100 11095 Viking Drive Eden Prairie MN 55344 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network;
CORE MOBILE RESET HELP/SYSTEMS 6455 City West Parkway Eden Prairie MN 55344 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;MOBILE RESET;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network;
CORE NETWORK INSIGHT FORTRA Suite 100 11095 Viking Drive Eden Prairie MN 55344 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; computer software for use to compile, manage, encrypt and store personal information; computer software for use to access, collect and modify network user identification; computer software for workflow, helpdesk and network security management; computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; computer software for registering and authenticating digital certificates; computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;NETWORK;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network;
CORE PASSWORD FORTRA Suite 100 11095 Viking Drive Eden Prairie MN 55344 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;PASSWORD;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network;
CORE PROVISIONING FORTRA Suite 100 11095 Viking Drive Eden Prairie MN 55344 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;PROVISIONING;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network;
CORE SDI CORE SDI S.A. Sarmiento 2544, piso 9 of B Capital Federal Argentina Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely encoding identification information on valuable documents and products;
CORE SECURITY FORTRA Suite 100 11095 Viking Drive Eden Prairie MN 55344 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;SECURITY;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network;
CORE SECURITY CORE SECURITY SDI CORPORATION 1000 Holcomb Woods Parkway, Suite 401 Rosewell GA 30076 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network;
CORE VULNERABILITY INSIGHT FORTRA Suite 100 11095 Viking Drive Eden Prairie MN 55344 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;VULNERABILITY;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network;
CORE WISDOM CORE SDI, Inc. 44 Wall Street, 12th Floor New York NY 10005 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within; computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network;
CRYPTLIB Gutmann, Peter 11 Standish Place, Bayview Auckland 0629 New Zealand Computer security software;
CYBERHAVEN CYBERHAVEN, INC. 745 Atlantic Avenue Boston MA 02211 computer security software; computer software for scanning, filtering, detecting, quarantining and eliminating of viruses, worms, spyware, adware, and malware from data and applications; computer software to enforce, restrict and control access privileges of users of servers for cloud, data center, desktop, mobile, or network resources based on physical identity, biometric characteristics, relationship to other individuals or organizations, assigned role or assigned credentials;CYBER HAVEN;providing temporary use of non-downloadable computer security software; computer services, namely, on-line scanning, filtering, detecting, quarantining and eliminating of viruses, worms, spyware, adware, and malware from data and applications; computer security services, namely, enforcing, restricting and controlling access privileges of users of servers for cloud, data center, desktop, mobile, or network resources based on physical identity, biometric characteristics, relationship to other individuals or organizations, assigned role or assigned credentials;
CYBERHAVEN CodeTickler, Inc. 340 S Lemon Ave., Suite 6033 Walnut CA 91789 computer security software; computer software for scanning, filtering, detecting, quarantining and eliminating of viruses, worms, spyware, adware, and malware from data and applications; computer software to enforce, restrict and control access privileges of users of servers for cloud, data center, desktop, mobile, or network resources based on physical identity, biometric characteristics, relationship to other individuals or organizations, assigned role or assigned credentials;CYBER HAVEN;providing temporary use of non-downloadable computer security software; computer services, namely, on-line scanning, filtering, detecting, quarantining and eliminating of viruses, worms, spyware, adware, and malware from data and applications; computer security services, namely, enforcing, restricting and controlling access privileges of users of servers for cloud, data center, desktop, mobile, or network resources based on physical identity, biometric characteristics, relationship to other individuals or organizations, assigned role or assigned credentials;
CYBOWALL CYBONET SECURITY TECHNOLOGIES LTD P.O.B. 15102 Matam Building 23 Haifa 3190501 Israel Computer security software, namely, anti-bot, anti-spam, anti-phishing, anti-pharming, and anti-spyware software; computer security software, namely, anti-bot sensors, anti-spam sensors, anti-phishing sensors, anti-pharming sensors - all to be used with said software; computer software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware; computer security software and hardware for protecting against advanced persistent threats (APT), botnets and the associated cybercriminal activity;Computer services, namely, filtering of unwanted e-mails and spam; computer e-mail virus protection services; providing information updates on security threats to computer networks; providing online, non-downloadable software for detecting computer security attacks, computer and email viruses, spam, spy ware, adware and malware; providing online, non-downloadable software for protecting computer networks from computer security attacks, advanced persistent threats (APT), computer and email viruses, spam, spyware, adware and malware; providing computer and information technology security services, namely, developing, updating, maintaining and providing online databases of illegitimate sources of electronic communications and sources of computer and email viruses, spam, spyware, adware and malware; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware adware and malware; computer and network security services, namely, securing computers, networks and data against threats; computer system access and security services, namely, remote and on-site monitoring of local area, wide area, and global computer network systems for security purposes, namely, monitoring for and protecting against spam, malware, viruses, intrusions; Computer security consultancy in the fields of advanced persistent threat (APT), botnet infection, and unauthorized web access in the areas of computer security, computer access control, information flow control, and computer connection security;
CYSIV CYSIV, INC. 225 E. JOHN CARPENTER FREEWAY, SUITE 1500 IRVING TX 75062 computer security software; computer utility software; computer software for use in collecting, filtering, normalizing, enriching, processing, and analyzing system, application and security event data from computers and computer networks; computer software for use in transmitting and receiving system, application and security event data from computers and computer networks for detecting, monitoring, reporting, analyzing and eliminating cyber security incidents, malware, unauthorized software and network attacks and breaches; computer software for monitoring, analyzing and reporting on event data from computers and computer networks for analysis and action by security administrators or security software; computer software for use in providing a secure connection for security log and event data between computers, mobile devices, computer networks and hosted security software; computer software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming event transmission;Software as a service (SAAS) services, namely, hosting computer security software; Software as a service (SAAS) services, namely, hosting computer software for use in securing, protecting and monitoring computers, computer networks and data; Software as a service, namely, hosting software for use by others in the field of computer network security; Providing on-line non-downloadable security software; Providing on-line non-downloadable software for use in data integration, correlation, querying, analysis, pattern identification, big data analytics, machine learning, user behavior analytics, modeling and visualization for the detection of cyber security threats and incident, espionage and network attacks; Application service provider, namely, hosting, managing, developing, analyzing, operating and maintaining applications, in the fields of computer, data and network security; Information technology professional and managed security services for securing and protecting computers, computer networks and data; Computer security consultancy; Internet security consultancy; Data and computer network security consultancy; Consulting services for others in the fields of computer, data and network security; Technical consultation in the field of computer software installation, operation and maintenance; Computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security and security operations; Developing and deploying customized software in the field of computer, data and network security for others; Computer programming services for others in the fields computer, data and network security; Installation, maintenance, and updating of computer software for others; Updating of computer software for others relating to computer security and prevention of computer and network risks; Notification and delivery of software updates; development, design, implementation, testing, operation, analysis, and consulting services in the fields of computer, data and network security; Computer services, namely, on-site and remote management of information technology (IT) systems of others; Maintenance of computer software relating to computer security and prevention of computer risks; Computer security threat analysis for protecting data; Providing information in the field of computer network, data and network security; Computer network protection and security services; Computer security consultancy in the field of risk assessment and information security; computer consultation in the field of managing security software; computer security consultancy in the field of cyber threat analysis, threat intelligence, security operations and incident response; Technical support, namely, monitoring, analyzing and reporting technological functions of computer network systems and software; Technical support services, namely, computer network security incident response and remediation services; Technical support services, namely, remote administration and management of in-house and hosted software applications; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of cloud computing IT and application systems; Technical support services, namely, troubleshooting of computer software problems; Cyber risk management as a service (MAAS) services and managed security service provider services (MSSP), namely, securing, protecting and monitoring computers, computer networks and data for others;
CYSIV Cysiv 225 E. John Carpenter Freeway, Ste. 1500 Irving TX 75062 computer security software; computer utility software; computer software for use in collecting, filtering, normalizing, enriching, processing, and analyzing system, application and security event data from computers and computer networks; computer software for use in transmitting and receiving system, application and security event data from computers and computer networks for detecting, monitoring, reporting, analyzing and eliminating cyber security incidents, malware, unauthorized software and network attacks and breaches; computer software for monitoring, analyzing and reporting on event data from computers and computer networks for analysis and action by security administrators or security software; computer software for use in providing a secure connection for security log and event data between computers, mobile devices, computer networks and hosted security software; computer software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming event transmission;Software as a service (SAAS) services, namely, hosting computer security software; Software as a service (SAAS) services, namely, hosting computer software for use in securing, protecting and monitoring computers, computer networks and data; Software as a service, namely, hosting software for use by others in the field of computer network security; Providing on-line non-downloadable security software; Providing on-line non-downloadable software for use in data integration, correlation, querying, analysis, pattern identification, big data analytics, machine learning, user behavior analytics, modeling and visualization for the detection of cyber security threats and incident, espionage and network attacks; Application service provider, namely, hosting, managing, developing, analyzing, operating and maintaining applications, in the fields of computer, data and network security; Information technology professional and managed security services for securing and protecting computers, computer networks and data; Computer security consultancy; Internet security consultancy; Data and computer network security consultancy; Consulting services for others in the fields of computer, data and network security; Technical consultation in the field of computer software installation, operation and maintenance; Computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security and security operations; Developing and deploying customized software in the field of computer, data and network security for others; Computer programming services for others in the fields computer, data and network security; Installation, maintenance, and updating of computer software for others; Updating of computer software for others relating to computer security and prevention of computer and network risks; Notification and delivery of software updates; development, design, implementation, testing, operation, analysis, and consulting services in the fields of computer, data and network security; Computer services, namely, on-site and remote management of information technology (IT) systems of others; Maintenance of computer software relating to computer security and prevention of computer risks; Computer security threat analysis for protecting data; Providing information in the field of computer network, data and network security; Computer network protection and security services; Computer security consultancy in the field of risk assessment and information security; computer consultation in the field of managing security software; computer security consultancy in the field of cyber threat analysis, threat intelligence, security operations and incident response; Technical support, namely, monitoring, analyzing and reporting technological functions of computer network systems and software; Technical support services, namely, computer network security incident response and remediation services; Technical support services, namely, remote administration and management of in-house and hosted software applications; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of cloud computing IT and application systems; Technical support services, namely, troubleshooting of computer software problems; Cyber risk management as a service (MAAS) services and managed security service provider services (MSSP), namely, securing, protecting and monitoring computers, computer networks and data for others;
DEEP INSTINCT DEEP INSTINCT LTD. Levinstein Tower, Israel Computer security software; computer security software applications; computer security software for personal computers, mobile devices, networks and servers;Design, development, implementation, installation, maintenance and updating of computer security software, including software for mobile devices, and network security software; computer software consultancy, namely, consulting services in the field of security software;
DEEP SECURITY APP PROTECT Trend Micro Kabushiki Kaisha Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan computer security software; computer software for use in the development and deployment of other computer software, applications, and container instances; computer software for runtime application self-protection (RASP); computer software for securing web applications, web application users, and network-based servers; computer software for monitoring, detecting, and responding to malicious inputs and attempted security exploits; computer software for viewing and analyzing security event data related to web applications, web application users, and network-based servers; computer software for monitoring the operation, activity, and status of other computer software; computer software providing application programming interfaces (APIs) for securing web applications, web application users, and network-based servers; computer software providing application programming interfaces (APIs) for viewing, analyzing and reporting security event data related to web applications, web application users, and network-based servers;DEEP SECURITY APPLICATION PROTECT;SECURITY APP PROTECT;computer security services, namely, restricting unauthorized access to computer networks; computer security services, namely, providing temporary use of non-downloadable computer security software; providing temporary use of non-downloadable computer software for use in the development and deployment of other computer software, applications, and container instances; providing temporary use of non-downloadable computer software for runtime application self-protection (RASP); providing temporary use of non-downloadable computer software for securing web applications, web application users, and network-based servers; providing temporary use of non-downloadable computer software for monitoring, detecting, and responding to malicious inputs and attempted security exploits; providing temporary use of non-downloadable computer software for viewing and analyzing security event data related to web applications, web application users, and network-based servers; providing temporary use of non-downloadable computer software for monitoring the operation, activity, and status of other computer software; providing temporary use of non-downloadable computer software, namely, providing application programming interfaces (APIs) via cloud-based software for securing web applications, web application users, and network-based servers; providing temporary use of non-downloadable computer software, namely, application programming interfaces (APIs) via cloud-based software for viewing, analyzing and reporting security event data related to web applications, web application users, and network-based servers;
DEFENSE BY OFFENSE XM CYBER LTD. 11 GALGALEI HAPLADA ST. HERZLIYA 4672211 Israel COMPUTER SECURITY SOFTWARE; COMPUTER SOFTWARE FOR CONDUCTING PENETRATION TESTS FOR COMPUTER TERMINALS, SERVERS, NETWORKS AND END POINTS FOR DETERMINING AND IDENTIFYING INFORMATION SECURITY EXPLOITS, ASSESSING INFORMATION SECURITY VULNERABILITY AND RECOMMENDING PLANS FOR PREVENTING SECURITY EXPLOITS; COMPUTER SOFTWARE FOR VALIDATING SECURITY CONTROLS OF COMPUTER TERMINALS, SERVERS, NETWORKS AND END POINTS THROUGH SIMULATING CYBER-ATTACKS IN REAL WORLD ENVIRONMENT;UPDATE, INSTALLATION AND MAINTENANCE OF COMPUTER SECURITY SOFTWARE; PROVIDING ONLINE NON-DOWNLOADABLE CLOUD-BASED SECURITY SOFTWARE; COMPUTER SECURITY CONSULTANCY IN THE FIELD OF SCANNING AND PENETRATION TESTING OF COMPUTERS AND NETWORKS TO ASSESS INFORMATION SECURITY VULNERABILITY; MONITORING AND TESTING OF COMPUTER TERMINALS, SERVERS, NETWORKS AND END POINTS DIRECTED TOWARD THE DETECTION OR OTHER ACTION WITH RESPECT TO SECURITY EXPLOITS AND INFORMATION SECURITY VULNERABILITY;
DR. ANTIVIRUS Trend Micro Kabushiki Kaisha Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan computer security software; computer anti-virus software; anti-spyware and anti-fraud software; malicious code and content screening and scanning software; computer software for use in detecting and removing adware, malware, spyware, malicious content and unauthorized software; computer software for securing and protecting data, computers, tablet computers, and mobile devices;
DR. SAFETY Trend Micro Kabushiki Kaisha Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan computer security software; computer anti-virus software; anti-spyware and anti-fraud software; malicious code and content screening software; computer software for use in detecting, blocking and removing malware, spyware, malicious content and unauthorized software; computer software for securing and protecting data, computers, tablet computers, and mobile devices; computer software for identifying and blocking unwanted communications and messages; computer software for identifying and blocking websites containing malicious, untrustworthy and unwanted content and programs; computer software for use in tracking, detecting and reporting locations of tablet computers and mobile devices; computer software to lock a mobile device or erase the memory of a mobile device upon receipt of a remote command; data privacy control software; computer software for detecting, monitoring and controlling data privacy settings for other software and services;
ELIGMA Apolyta Inc. 651 N Broad St, Ste 205 #4859 Middletown DE 19709 Computer security software; computer software for validating security controls of computer terminals, servers, endpoints and networks through simulating cyber-attacks in real world scenarios; downloadable software for measuring the security maturity level and improving security controls' efficacy of a given system, namely, personal computer, server, mobile, or IoT device through adaptive cyberattack simulations and emulations; downloadable software for measuring the security maturity level and improving security controls' efficacy of a group of systems, namely, a network or multiple networks, or entire organizations through adaptive cyberattack simulations and emulations; computer software for conducting adaptive penetration tests for computer terminals, servers, endpoints and networks for determining and identifying information security weaknesses, assessing security gaps and recommending plans for preventing cybersecurity attacks; downloadable software for proactively assuring security controls' effectiveness and preparedness against different types of cyber threats; downloadable software for continuously simulating adaptive cyber-security attacks and recommending practical mitigation strategies; downloadable software for predicting and preventing computer and electronics security issues prior to their occurring; downloadable software for adaptive attack emulation and/or simulation; downloadable software for measuring security controls' efficacy; downloadable software for security benchmarking; downloadable software for automated remediation of detected gaps; downloadable software for adaptive security validation;Providing online non-downloadable cloud-based security software; providing online non-downloadable cloud-based software for validating security controls of computer terminals, servers, endpoints and networks through simulating cyber-attacks in real world scenarios; providing online non-downloadable cloud-based software for measuring the security maturity level and improving security controls' efficacy of a given system, namely, personal computer, server, mobile, or IoT device through adaptive cyberattack simulations and emulations; providing online non-downloadable cloud-based software for measuring the security maturity level and improving security controls' efficacy of a group of systems, namely, a network or multiple networks, or entire organizations through adaptive cyberattack simulations and emulations; providing online non-downloadable cloud-based computer software for conducting adaptive penetration tests for computer terminals, servers, endpoints and networks for determining and identifying information security weaknesses, assessing security gaps and recommending plans for preventing cybersecurity attacks; providing online non-downloadable cloud-based software for proactively assuring security controls' effectiveness and preparedness against different types of cyber threats; providing online non-downloadable cloud-based software for continuously simulating adaptive cyber-security attacks and recommending practical mitigation strategies; providing online non-downloadable cloud-based software for predicting and preventing computer and electronics security issues prior to their occurring; providing online non-downloadable cloud-based software for adaptive attack emulation and/or simulation; providing online non-downloadable cloud-based software for measuring security controls' efficacy; providing online non-downloadable cloud-based software for security benchmarking; providing online non-downloadable cloud-based software for automated remediation of detected gaps; providing online non-downloadable cloud-based software for adaptive security validation; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security weaknesses, gaps, and security maturity level; monitoring and testing of computer terminals, servers, endpoints and networks directed toward the prevention, detection or other action with respect to security threats and malicious activities;
FB-4 ICE FB4, Inc. 1200 Old Henderson Road Columbus OH 43220 computer security software;FB-FOUR ICE;
GB-WARE Global Technology Associates, Inc. 3505 Lake Lynda Drive, Suite 109 Orlando FL 32817 Computer security software, namely, computer security firewall software for protecting computer networks;GLOBAL WARE;
GNAT BOX Global Technology Associates, Inc. 3505 Lake Lynda Drive, Suite 109 Orlando FL 32817 computer security software, namely, computer security firewall software for protecting computer networks;
HALO CloudPassage, Inc. 95 3rd Street San Francisco CA 94103 Computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments;
HAXM XM CYBER LTD. 11 GALGALEI HAPLADA ST. HERZLIYA 4672211 Israel Computer security software; computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment;Update, installation and maintenance of computer security software; providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability;
HAXM XM Ltd. 2 Sapir St. 4685206 Herzeliya Israel Computer security software; computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment;Update, installation and maintenance of computer security software; providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability;
INTERCLOUD Trend Micro Kabushiki Kaisha Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan computer security software; computer software, namely, anti-bot, anti-spam, anti-phishing, anti-pharming, and anti-spyware software; user manuals supplied as a unit with the foregoing goods;INTER CLOUD;computer and network security services, namely, securing computers, networks and data against threats;providing temporary use of non-downloadable software for securing computers, networks and data against threats; provision of information relating to computer software, computer and data security and computer system management via computer and communications networks; provision of information relating to bots, spam, phishing, pharming, spyware, malware and unauthorized data and programs on computers and electronic devices via computer and communications networks;
IRONCLAD SILVER OAK SYSTEMS 404 Vassar Avenue Swartmore PA 19081 computer security software;IRON CLAD;
KEYROM Digicert, Inc. 2801 NORTH THANKSGIVING WAY SUITE 500 LEHI UT 84043 Computer security software; Security software for mobile devices; Computer security software for securing ROM; embedded software in tablet computers, smart phones and computers for computer security;KEY ROM;
LEXSI LEXSI S.A.S. 40 rue Jean Jaurès Les Mercuriales, Tour Ponant F-93170 BAGNOLET France Computer security software; computer software for the detection and removal of malware, particularly viruses, worms, trojan horses, adware, spyware; computer software for providing secure online transactions; computer software for providing online identity protection; computer software for fraud protection; computer software to detect, prevent, diagnose, and repair computer security breaches; computer maintenance software; computer software for the backup, storage, restoration and retrieval of data; computer software, computer hardware, computer firmware and computer peripheral devices for the protection of data security, particularly against fraudulent access; computer software for the backup and recovery of computer data; computer software for measuring the use of other computer software; computer software used in the development of data analysis applications and other computer software; computer software for data communication applications, and for the encryption and authentication of electronic information; computer software for copying data from one electronic storage medium to another electronic storage medium; computer software for teaching and training users how to use computer software and/or hardware; computer software for the surveillance, evaluation, demonstration and remote monitoring of other computer programs and computer processes; computer hardware and software for authenticating users and for maintaining and managing access to computer data, computer content, electronic communications, and computer networks; privacy management computer software for preventing, monitoring, certifying, cross-checking and reporting on the distribution and use of personal identity information on computer systems and networks and on global communication networks; computer software in the field of cryptographic, data and network security functions; computer software used for automating an identity authentication process by means of existing databases in connection with issuing and managing digital certificates used for the authentication or encryption of digital communications or the authentication of a digital signature in an electronic transaction or communication on the Internet and other computer networks; encryption computer software to enable the secure transmission of digital information; identity fraud detection computer software; computer software for monitoring computers for security purposes; downloadable electronic publications in the nature of manuals and data sheets for use with computer software;Electronic transmission services of data and computer files; telecommunications services for providing multiple user access to a global computer network; electronic communication services, namely, communications by and between computers and computer terminals; electronic transmission of data and instant messages; provision of access to databases; electronic mail services, namely, electronic transmission of mail and messages; secure electronic mail services, namely, providing electronic transmission of secure e-mails; automatic transfer of digital data by means of telecommunication channels; electronic transmission of anti-virus computer software and other computer and network security software via a global computer network; electronic transmission of communications and data via e-mail to enable encryption and decryption by managing and filtering of emails sent over the global computer network; providing online forums for transmitting messages between computer users about computers, computer hardware, computer software, computer peripheral devices, computer systems, computer networks, computer equipment, computer security, information technology, ecommerce and global computer network technology, mobile computing, communications via networks and equipment and telecommunication devices; consultancy and information related to the aforesaid services;Computer system monitoring services for security purposes; identity verification services; consultancy in the field of security; licensing of technology, source codes, computer software and other intellectual property rights; licensing of computer software for the protection of computers, computer systems, computer networks and websites on the Internet against computer viruses, hackers, tampering, unauthorized entry and unauthorized manipulation of data; software licensing (legal services); licensing of databases (legal services); consultancy and information related to the aforesaid services;The wording LEXSI has no meaning in a foreign language.;Monitoring of computer systems and networks for computer security purposes for protecting data and information from unauthorized access; provision of security threat management systems, namely, surveillance and monitoring of security vulnerabilities and problems in software products, on the Internet, and on computer networks for protecting data and information from unauthorized access; auditing and computer security control services for protecting data and information from unauthorized access; detection of computer security breaches or malware; protection services against computer viruses, malware and fraudulent access; technical services and technical support services provided by consultants in the field of computer diagnostics, computer software and computer system integration; advice on the protection against computer viruses and other malware; technical support services relating to computer software, particularly computer security software for protecting data and information from unauthorized access; computer services relating to computer security on the Internet for protecting data and information from unauthorized access; consulting relating to computers, particularly relating to data security, computer systems and networks for protecting data and information from unauthorized access; consulting services in the field of software as a service (SaaS); consulting services in the field of cloud computing services; computer software rental; designing databases and computer services; hosting databases for others on a computer server for a global computer network; hosting of web sites for others that feature information, computer applications, files and data in the field of computer software design; design, installation, updating and maintenance of software; data recovery IT services; technical support IT services, namely, troubleshooting of computer software problems; consulting relating to the design, selection and implementation of computer systems; provision of computer software information in the field of network and Internet security; onsite or remote monitoring of computer systems to protect data and information from unauthorized access; provision of computer software information relating to the encryption and authentication of electronic data; technical support services, namely, providing technical advice in the fields of digital media, data encryption, computer security, communication and software security; design and development of communication networks and data encryption and decryption IT services; identity authentication IT services; IT services for issuing and managing digital certificates used for the authentication or encryption of digital communication, or the authentication of a digital signature; development, design, implementation, testing, analysis services and consulting in the field of security systems, access, authorization, authentication, encryption and identification for use with computers, computer hardware and computer networks; Internet and computer security consultancy in the field of computer network security management services; search engine services for obtaining data on a computer network; computer technical support services, namely, providing technical advice in the field of computer security; providing software technical support services for the development of software applications; provision of data conversion services; application service provision, namely, hosting application software for others for use in computer security for the protection of data and information from unauthorized access; services of an application service provider, namely, provision of online software, non-downloadable, for testing computer security in the fields of computer and Internet security for protecting data and information from unauthorized access; scientific and technological services, namely, technological support in the field of computing; services provided by IT project consultants, particularly relating to computer security; provision of technical information relating to information technology in the field of communication devices, computers, computer hardware, computer software, computer peripheral devices, computer networks, particularly relating to computer software and computer hardware to ensure computer security for protecting data and information from unauthorized access; consulting and information relating to computer software, consulting and information relating to the aforesaid services;
MICROSOFT SENTINEL Microsoft Corporation One Microsoft Way Redmond WA 98052 Computer security software, namely, downloadable computer software for security information and event management (SIEM) employing artificial intelligence and machine learning to enable automated responses in real time to security vulnerabilities, threats and events, and downloadable computer software for collection, storage, analysis and presentation of data for forensic analysis of security events and for security compliance; Excluding hardware and software for software copy protection and software license management, both locally and across a network, and computer software used to track, monitor, and manage application software usage in the field of software licensing management;Software as a service (SaaS) services featuring computer security software for security orchestration, automation and response (SOAR) employing artificial intelligence and machine learning to enable automated responses in real time to security vulnerabilities, threats and events, software as a service (SaaS) services featuring software for security information and event management (SIEM) employing artificial intelligence and machine learning to enable automated responses in real time to security vulnerabilities, threats and events, and providing temporary use of non-downloadable computer software for collection, storage, analysis and presentation of data for forensic analysis of security events and for security compliance; Excluding software as a service (SaaS) featuring software for software copy protection and software license management, and software as a service (SaaS) services featuring software used to track, monitor, and manage application software usage in the field of software licensing management;
MXSWEEP MXSweep Limited 42 The Paddocks Proudstown Road; Navan, Co. Meath Ireland Computer security software; intrusion detection software; fire wall software; privacy control software; content filtering software; computer software for synchronization of files through electronic mail; computer software for electronic mail filtering, intrusion alert, virus protection, and other security functions;X MX SWEEP;Color is not claimed as a feature of the mark.;Computer services namely network and Internet security services; computer consulting services; computer programming; computer software design for others;
NAID SYSTEMS Naid Systems Incorporated Suite 1620, 250-6 Avenue S.W. Calgary T2P 3H7 Canada COMPUTER SECURITY SOFTWARE, INCLUDING ANTI-VIRUS, ANTI-MALWARE, INTRUSION PREVENTION AND DATA SCANNING APPLICATIONS;DEVELOPMENT, MANUFACTURE, INSTALLATION, SALE AND DISTRIBUTION OF COMPUTER SECURITY SOFTWARE, INCLUDING ANTI-VIRUS, ANTI-MALWARE, INTRUSION PREVENTION AND DATA SCANNING APPLICATIONS;
NETFORCEFIELD.COM Netforcefield.com, Inc. 1434 Sugartown Road Berwyn PA 193121820 computer security software, namely software for managing, monitoring and controlling data access;NET FORCE FIELD;
NEVER LOST. ALWAYS REVIVED. HyperSphere Technologies, Inc. 980 Birmingham Road Ste 501 #262 Milton GA 30004 Computer security software, namely, downloadable security software for protecting data; Downloadable software for data protection;
NYOTRON ACRONIS INTERNATIONAL GMBH Rheinweg 9 Schaffhausen 8200 Switzerland Computer security software; computer software for managing, monitoring, detecting, analysis and display of security exploits, viruses, trojans and other security threats to computer terminals and end points;Color is not claimed as a feature of the mark.;Design and development of computer software; computer software consultancy; consulting services relating to security software; software maintenance services; information technology security operation control services for others; provision of information relating to the detection, analysis and display of security exploits, viruses, trojans and other security threats to computer terminals and networks; monitoring of computer servers and end points directed toward the detection, removal of or other action with respect to security exploits, viruses, trojans and other security threats; providing temporary use of online non-downloadable security software;
PARANOID ACRONIS INTERNATIONAL GMBH Rheinweg 9 Schaffhausen 8200 Switzerland Computer security software; computer software for managing, monitoring, detecting, analysis and display of security exploits, viruses, trojans and other security threats to computer terminals and end points;Provision of information relating to the detection, analysis and display of security exploits, viruses, trojans and other security threats to computer terminals and networks; monitoring of computer servers and end points directed toward the detection, removal of or other action with respect to security exploits, viruses, trojans and other security threats; providing temporary use of online non-downloadable security software;
PELICAN SECURITY PELICAN SECURITY LTD. 3 Tvuot Ha'aretz Street Tel Aviv 69546 Israel COMPUTER SECURITY SOFTWARE;SECURITY;
PELICAN WAVEBREAKER PELICAN SECURITY LTD. 3 Tvuot Ha'aretz Street Tel Aviv 69546 Israel COMPUTER SECURITY SOFTWARE, NAMELY FOR APPLYING BEHAVIOR MONITORING AND ACCESS CONTROL RULES ON INTERNET-FACING APPLICATIONS TO PROTECT THEM AGAINST ATTACKS DELIVERED OVER THE NETWORK;
PINEAPP MAIL SECURE CYBONET SECURITY TECHNOLOGIES LTD P.O.B. 15102 Matam Building 23 Haifa 3190501 Israel Computer security software, namely, anti-bot, anti-spam, anti-phishing, anti-pharming, and anti-spyware software; namely, computer software, namely, software that detects the use of bots, spam, phishing, and pharming attempts by computer hackers and third party computer security attacks to be used in conjunction with said software; computer software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware; computer software and hardware for protecting against botnets and the associated cybercrimal activity;PINEAPPLE MAIL SECURE; PINE APP MAIL SECURE;Computer and network security services, namely, securing computers, networks and data against threats; computer system access and security services, namely, remote and on-site monitoring of local area, wide area, and global computer network systems for security purposes, namely, monitoring for and protecting against spam, malware, viruses, intrusions, botnet infection, and unauthorized web access in the areas of computer security, computer access control, information flow control, and computer connection security;MAIL SECURE;Computer services, namely, filtering of unwanted e-mails and spam; computer email virus protection services; providing information updates on security threats to computer networks; providing online, non-downloadable software for detecting computer security attacks, computer and email viruses, spam, spyware, adware and malware; providing online, non-downloadable software for protecting computer networks from computer security attacks, computer and email viruses, spam, spyware, adware and malware; providing computer and information technology security services, namely, developing, updating, maintaining and providing online databases of illegitimate sources of electronic communications and sources of computer and email viruses, spam, spyware, adware and malware; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware;
PINEAPP MAIL SECURE Pineapp Ltd. Matam Building 23, P.O.B. 15102 Haifa 3190501 Israel Computer security software, namely, anti-bot, anti-spam, anti-phishing, anti-pharming, and anti-spyware software; namely, computer software, namely, software that detects the use of bots, spam, phishing, and pharming attempts by computer hackers and third party computer security attacks to be used in conjunction with said software; computer software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware; computer software and hardware for protecting against botnets and the associated cybercrimal activity;PINEAPPLE MAIL SECURE; PINE APP MAIL SECURE;Computer and network security services, namely, securing computers, networks and data against threats; computer system access and security services, namely, remote and on-site monitoring of local area, wide area, and global computer network systems for security purposes, namely, monitoring for and protecting against spam, malware, viruses, intrusions, botnet infection, and unauthorized web access in the areas of computer security, computer access control, information flow control, and computer connection security;MAIL SECURE;Computer services, namely, filtering of unwanted e-mails and spam; computer email virus protection services; providing information updates on security threats to computer networks; providing online, non-downloadable software for detecting computer security attacks, computer and email viruses, spam, spyware, adware and malware; providing online, non-downloadable software for protecting computer networks from computer security attacks, computer and email viruses, spam, spyware, adware and malware; providing computer and information technology security services, namely, developing, updating, maintaining and providing online databases of illegitimate sources of electronic communications and sources of computer and email viruses, spam, spyware, adware and malware; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware;
PRIVACY.LITE DIGITAL PRIVACY, INC. 7638 Washington Avenue South Eden Prairie MN 55344 computer security software; computer data file encryption and decryption security software;
PROCESS VAULT Harris Corporation 1025 West NASA Blvd. Melbourne FL 32919 Computer security software, namely, software used to securely load a hypervisor for the purpose of software protection;
SECURE@SOURCE INFORMATICA 2100 SEAPORT BOULEVARD REDWOOD CITY CA 94063 computer security software; computer programs for use in computer networking and secure networking; computer programs for use in computer security; software for use in storage, integration, management, analysis and optimization of data warehouses and databases; computer software for database management; computer programs used in accessing securely databases;SECURE AT SOURCE;
SECURECLOUD Trend Micro Kabushiki Kaisha Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan Computer security software; computer software for network security and network management; computer software for enforcing content policies for electronic mail, instant messaging, web usage, and other network communications;SECURE CLOUD;Color is not claimed as a feature of the mark.;Application service provider (ASP) services, namely, hosting computer software applications of others; application service provider (ASP) services featuring software for use in protecting the confidentiality, integrity and availability of computers, computer networks and electronic data; software as a service (SAAS) provider services featuring computer software for use in protecting the confidentiality, integrity and availability of computers, computer networks and electronic data; providing online non-downloadable computer and network security software; providing online non-downloadable computer software for enforcing content policies for electronic mail, instant messaging, web usage, and other network communications;
SECUREDOX Echoworx Corporation 708-4101 Yonge Street Toronto, ON M2N1P6 Canada computer security software; computer encryption software; computer software for protection and security of data, communications, emails, computer networks and applications; Public Key Infrastructure (PKI) software; server software for supporting, sending and receiving email with encryption and authentication; computer server software for administering the access of a plurality of users to email services featuring encryption and authentication; computer software for supporting, sending and receiving email with encryption and authentication; computer software for controlling and managing access by a plurality of users to email services featuring encryption and authentication; software for encrypting/decrypting data, applications, computer files; software for supporting, sending and receiving electronic messages, email, data forms with encryption, non-repudiation verification and authentication; server operating software for administering the secure delivery of electronic messages, email and data forms by a plurality of users;SECURED ECHOWORX;
SECUREOWL TECHNOLOGY CONCEPTS & DESIGN, INC. 4508 Weybridge Lane Greensboro NC 27407 Computer security software; Network security appliance in the nature of computer hardware used to aid in securing computer networks; Computer hardware and software used to aid in securing computer networks;SECURE OWL;
SECUREWIN CIPHER LOGICS CORPORATION 220 North Adams Street Rockville MD 20850 computer security software, namely, software used to encrypt data and other computer storable information;
SECURITY BLANKET FORCEPOINT Quarry Oaks 1, Suite 350 10900-A Stonelake Blvd. AUSTIN TX 78759 computer security software;Issue New Certificate to: Raytheon Trusted Computer Solutions, Inc. (Delaware, Corporation) 12950 Worldgate Drive, Suite 600 Herndon, Virginia 20170;
SEE ALL WAYS XM CYBER LTD. 11 GALGALEI HAPLADA ST. HERZLIYA 4672211 Israel Computer security software; computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment;SEE ALWAYS;Update, installation and maintenance of computer security software; providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability;
SIGMAGUARD SigmaSecurity, Inc. 73 Princeton Street North Chelmsford MA 01863 Computer security software; Internet security software; enterprise security software; internal and external intrusion detection software; anti-distributed denial of service (anti-DDoS) software; blended-threat defense software; antivirus software; vulnerability assessment software; intrusion detection system (IDS) software; intrusion prevention system (IPS) software; counter-cyber-terrorism software; firewall software; privacy control software; content filtering software; computer software for the creation of a virtual private network; security software for facilitating computer use at remote locations and for facilitating encrypted communications among mobile users over networks; computer software and downloadable computer software for use in updating other computer software; computer software for use in networking applications; computer software for sending and receiving encrypted transmissions from computers, notebook computers and personal digital assistant (PDA) devices over wired and wireless networks; computer software for connecting and managing remote computers, for communication, collaboration and for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for secure file management and transfer, for secure telecommuting, for secure mobile computing and for use with a home or remote office; computer software and databases for use in diagnosis, repair and configuration of network security appliances, computers, computer software and computer peripherals; user manuals supplied with all of the foregoing. Computer hardware; computer hardware appliances that provide blended threat defensive measures, vulnerability assessments, internal intrusion detection, firewall, content filtering, intrusion alert and defense, virus protection, virtual private networking and other security functions.;
SIGMASCAN SigmaSecurity, Inc. 73 Princeton Street North Chelmsford MA 01863 Computer security software; Internet security software; enterprise security software; internal and external intrusion detection software; anti-distributed denial of service (anti-DDoS) software; blended-threat defense software; antivirus software; vulnerability assessment software; intrusion detection system (IDS) software; intrusion prevention system (IPS) software; counter-cyber-terrorism software; firewall software; privacy control software; content filtering software; computer software for the creation of a virtual private network; security software for facilitating computer use at remote locations and for facilitating encrypted communications among mobile users over networks; computer software and downloadable computer software for use in updating other computer software; computer software for use in networking applications; computer software for sending and receiving encrypted transmissions from computers, notebook computers and personal digital assistant (PDA) devices over wired and wireless networks; computer software for connecting and managing remote computers, for communication, collaboration and for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for secure file management and transfer, for secure telecommuting, for secure mobile computing and for use with a home or remote office; computer software and databases for use in diagnosis, repair and configuration of network security appliances, computers, computer software and computer peripherals; user manuals supplied with all of the foregoing. Computer hardware; computer hardware appliances that provide blended threat defensive measures, vulnerability assessments, internal intrusion detection, firewall, content filtering, intrusion alert and defense, virus protection, virtual private networking and other security functions.;
SIGMASECURITY SigmSecurity, Inc. 73 Princeton Street North Chelmsford MA 01863 Computer security software; Internet security software; enterprise security software; internal and external intrusion detection software; anti-distributed denial of service (anti-DDoS) software; blended-threat defense software; antivirus software; vulnerability assessment software; intrusion detection system (IDS) software; intrusion prevention system (IPS) software; counter-cyber-terrorism software; firewall software; privacy control software; content filtering software; computer software for the creation of a virtual private network; security software for facilitating computer use at remote locations and for facilitating encrypted communications among mobile users over networks; computer software and downloadable computer software for use in updating other computer software; computer software for use in networking applications; computer software for sending and receiving encrypted transmissions from computers, notebook computers and personal digital assistant (PDA) devices over wired and wireless networks; computer software for connecting and managing remote computers, for communication, collaboration and for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for secure file management and transfer, for secure telecommuting, for secure mobile computing and for use with a home or remote office; computer software and databases for use in diagnosis, repair and configuration of network security appliances, computers, computer software and computer peripherals; user manuals supplied with all of the foregoing. Computer hardware; computer hardware appliances that provide blended threat defensive measures, vulnerability assessments, internal intrusion detection, firewall, content filtering, intrusion alert and defense, virus protection, virtual private networking and other security functions.;
SIGMAWATCH SigmaSecurity, Inc. 73 Princeton Street North Chelmsford MA 01863 Computer security software; Internet security software; enterprise security software; internal and external intrusion detection software; anti-distributed denial of service (anti-DDoS) software; blended-threat defense software; antivirus software; vulnerability assessment software; intrusion detection system (IDS) software; intrusion prevention system (IPS) software; counter-cyber-terrorism software; firewall software; privacy control software; content filtering software; computer software for the creation of a virtual private network; security software for facilitating computer use at remote locations and for facilitating encrypted communications among mobile users over networks; computer software and downloadable computer software for use in updating other computer software; computer software for use in networking applications; computer software for sending and receiving encrypted transmissions from computers, notebook computers and personal digital assistant (PDA) devices over wired and wireless networks; computer software for connecting and managing remote computers, for communication, collaboration and for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for secure file management and transfer, for secure telecommuting, for secure mobile computing and for use with a home or remote office; computer software and databases for use in diagnosis, repair and configuration of network security appliances, computers, computer software and computer peripherals; user manuals supplied with all of the foregoing. Computer hardware; computer hardware appliances that provide blended threat defensive measures, vulnerability assessments, internal intrusion detection, firewall, content filtering, intrusion alert and defense, virus protection, virtual private networking and other security functions.;
SPYSUBTRACT INTERMUTE, INC. 100 GROSSMAN DRIVE, SUITE 307 BRAINTREE MA 02109 Computer security software for the purpose of facilitating Internet security, namely, e-mail security; virus scanning, detection, and blocking; intrusion detection; privacy control; content filtering; firewall protection; encryption; spyware detection and removal; and network security measures;
STOP-SIGN EACCELERATION CORP. 1050 NE Hostmark Street, Suite 100B Poulsbo WA 98370 Computer security software, namely, Internet security, email security, and anti-virus software featuring virus scanner, virus blocker, virus definition update, intrusion detection, privacy control, content filtering, firewall protection, encryption, spyware detection and removal, network security measures, and Internet advertisement eliminator;STOP SIGN;Computer services, namely providing antivirus protection to computer users by means of advice delivered by telephone call; monitoring of network systems; providing virtual house calls to correct computer problems; and providing virus removal by remote access;
STOPSIGN EACCELERATION CORP. 1050 NE Hostmark Street, Suite 100B Poulsbo WA 98370 Computer security software, namely, Internet security, email security, and anti-virus software featuring virus scanner, virus blocker, virus definition update, intrusion detection, privacy control, content filtering, firewall protection, encryption, spyware detection and removal, network security measures, and Internet advertisement eliminator;STOP SIGN;Computer services, namely, computer virus protection services in the nature of providing virus removal for others via remote access; providing advice to computer users via telephone regarding the removal of computer viruses; Remote computer network technical monitoring and software maintenance;
STORE SECURE Netforcefield.com, Inc. 1434 Sugartown Road Berwyn PA 193121820 computer security software, namely software for managing, monitoring and controlling data access;SECURE;
STORMWINDOWS Wasti, Frederick A. Cetus Software P.O. Box 700 Carver MA 02330 computer security software, namely, software for hiding and protecting a desktop configuration from unauthorized alterations, including hiding desktop icons, preventing the saving of desktop changes, hiding menu subfolders, settings and control panel pages, disabling the running of various applications, preventing the merging of files, and preventing the addition or deletion of printers;
THINK LIKE AN ATTACKER HELP/SYSTEMS 6455 City West Parkway Eden Prairie MN 55344 Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network;Computer consultation services involving the creation and development of computer security software programs for others;
TIZER X-Wire Technology, Inc. Suite 140 501 Eastowne Drive Chapel Hill NC 27514 computer security software, namely, computer software for the detection and removal of computer viruses, rootkits, spyware, and adware; computer software for blocking malware infections, reporting potential malware for analysis, cleaning registry, cleaning privacy entries, shredding files, filtering websites for parental control, blocking botnets and denial of service attacks; computer software for blocking spam and protecting and securing computer networks and applications, and detecting and repairing computer operating system registry errors;
TIZER SECURE X-Wire Technology, Inc. Suite 140 501 Eastowne Drive Chapel Hill NC 27514 computer security software, namely, computer software for the detection and removal of computer viruses, rootkits, spyware, and adware; computer software for blocking malware infections, reporting potential malware for analysis, cleaning registry, cleaning privacy entries, shredding files, filtering websites for parental control, blocking botnets and denial of service attacks; computer software for blocking spam and protecting and securing computer networks and applications, and detecting and repairing computer operating system registry errors;SECURE;
TRAPIZE SONUS NETWORKS, INC. 4 TECHNOLOGY PARK DRIVE WESTFORD MA 01886 Computer security software; computer software for use in monitoring, protecting, controlling, and securing application programming interfaces (APIs) used by businesses; computer software for use in providing visibility and management of digital services and application programming interfaces (APIs) used by businesses; computer software for protecting and controlling access to digital assets, data, and digital services; computer software for enforcing data security policies, preventing data loss, and ensuring compliance with data security policies and procedures;TRAPEZE;
TREND Trend Micro Kabushiki Kaisha Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan computer security software; computer antivirus software; malicious code and malicious content screening software; firewall software; software for monitoring, filtering and modifying messages, files, programs and data retrieved or received from computer and communication networks; computer software for use in scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer software for use in repairing damage from viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer software for network security and network management; computer software for securing wireless computer networks; anti-spam, anti-fraud, and anti-phishing computer software; computer software for enforcing content policies for electronic mail, instant messaging, and web usage; computer utility software; electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of computer and network security, provided via computer and communication networks; computer hardware, not including ethernet cards or ethernet hubs; computer network security appliances not including ethernet cards or ethernet hubs, namely computer hardware preinstalled with security software, in Class 9;data sheets, quick start guides, installation instructions, troubleshooting guides, technical reference manuals, pamphlets, books, booklets, training manuals, instructional manuals, all in the fields of computers, computer hardware, computer software, information technology, computer programs, computer security, and information security;electronic mail management services for others;scanning and monitoring of computer systems for security purposes; providing information in the fields of global computer network and local area network security, preventing computer viruses, computer hardware and software applications in security; providing enterprise security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computers, computer data, software products and computer networks; computer security services, namely, intrusion detection services, intrusion prevention services, vulnerability assessment services; computer security services, namely services in the nature of detecting and removing computer viruses worms, trojans, spyware, adware, malware and unauthorized data and programs and threats;computer services, namely, online scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; providing temporary use of non-downloadable software for scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer virus protection services; providing online computer databases in the fields of computer software, computer and data security and computer system management; providing information relating to computer software, computer and data security and computer system management via the Internet and other computer and communications networks; provision of information relating to viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices via the Internet and other computer and communications networks; technical consultation in the field of computers, computer systems, computer software, and computer and communication networks; technical support services, namely, troubleshooting of computer hardware and software problems via telephone and electronic mail; computer programming for others; filtering electronic mail for others; provision of electronic mail security services for others, namely blocking, rejecting or quarantining spam and other unwanted messages, and cleaning messages of viruses, trojans, and malware; providing reputation services, namely information and databases regarding the association of sender identity information with network abuse, including the sending of spam electronic mail;
TREND MICRO APEX CENTRAL Trend Micro Kabushiki Kaisha Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan Computer security software; computer network security policy management software; web consoles; data encryption software; computer software for managing and updating other computer security software and hardware; computer software for use in computer and network security policy management and enforcement; computer software for use in coordinating, managing and tracking responses to computer network and data security breaches; computer software for monitoring of and reporting on computer security software and hardware; computer software for securing, monitoring and protecting data, computers, computer and communication networks, network endpoints, and mobile devices;Software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring computer software for use in computer network security policy management; providing on-line non-downloadable computer software for use in computer network security policy management; software as a service (SAAS) services featuring web consoles; providing on-line non-downloadable computer software, namely, hosting web consoles; software as a service (SAAS) services featuring computer software for managing and updating other computer security software and hardware; providing on-line non-downloadable computer software for managing and updating other computer security software and hardware; software as a service (SAAS) services featuring computer software for use in computer and network security policy management and enforcement; providing on-line non-downloadable computer software for use in computer and network security policy management and enforcement; software as a service (SAAS) services featuring computer software for use in coordinating, managing and tracking responses to computer network and data security breaches; providing on-line non-downloadable computer software for use in coordinating, managing and tracking responses to computer network and data security breaches; software as a service (SAAS) services featuring computer software for monitoring of and reporting on computer security software and hardware; providing on-line non-downloadable computer software for monitoring of and reporting on computer security software and hardware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing on-line non-downloadable computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints;
TREND MICRO APEX ONE Trend Micro Kabushiki Kaisha Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan computer security software; computer antivirus software; anti-spyware, anti-spam, and anti-fraud computer software; anti-malware and anti-ransomware software; firewall software; malicious code and malicious content screening software; data loss prevention (DLP) software; data encryption software; computer utility software; computer software for detecting and reporting malware, Trojans, worms, spyware, and ransomware; computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers;software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring computer antivirus software; providing on-line non-downloadable computer antivirus software; software as a service (SAAS) services featuring anti-spyware, anti-spam, and anti-fraud computer software; providing on-line non-downloadable anti-spyware, anti-spam, and anti-fraud software; software as a service (SAAS) services featuring anti-malware and anti-ransomware software; providing on-line non-downloadable anti-malware and anti-ransomware software; software as a service (SAAS) services featuring firewall software; providing on-line non-downloadable firewall software; software as a service (SAAS) services featuring malicious code and malicious content screening software; providing on-line non-downloadable malicious code and malicious content screening software; software as a service (SAAS) services featuring data loss prevention (DLP) software; providing on-line non-downloadable data loss prevention (DLP) software; software as a service (SAAS) services featuring data encryption software; providing on-line non-downloadable data encryption software; software as a service (SAAS) services featuring computer utility software; providing on-line non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for detecting and reporting malware, Trojans, worms, spyware, and ransomware; providing on-line non-downloadable software for detecting and reporting malware, Trojans, worms, spyware, and ransomware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing on-line non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; providing on-line non-downloadable software for detecting, analyzing, reporting and sharing computer, data and network security threats; software as a service (SAAS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; providing on-line non-downloadable software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers;
TRUSTED CLOUD FORCEPOINT FEDERAL 12950 WORLDGATE DRIVE, SUITE 600 HERNDON VA 20170 Computer security software;CLOUD;Design, development and implementation of software;
TRUSTED COMPUTER SOLUTIONS FORCEPOINT Quarry Oaks 1, Suite 350 10900-A Stonelake Blvd. AUSTIN TX 78759 Computer security software;COMPUTER;Design, development and implementation of software;
VIEWRIGHT Verimatrix, Inc. 6059 Cornerstone Court West San Diego CA 92121 Computer security software;VIEW RIGHT;
VIRTUAL PERIMETER ON DEMAND CloudPassage, Inc. 95 3rd Street San Francisco CA 94103 computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy, visualize and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments;Monitoring of computer systems for security purposes, namely, detection of anomalous system activity and third-party user behaviors based on computer network traffic;computer services, namely, ensuring computer security by restricting network access to computers, controlling computer operating system and application security configuration parameters, monitoring and managing access rights and privileges to computers, and monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; cloud computing services, namely, providing software as a service (SaaS) services, namely, hosting software for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments, and infrastructure-as-a-service (IaaS) services, namely, hosting one or more virtual computers for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments; computer consultation in the field of cloud computer security; analysis of computer network traffic; establishing computer network communications baselines for the purpose of detecting anomalies and unauthorized changes; computer services, namely, analysis of computer network traffic associated with malicious or fraudulent activity;
VPOD CloudPassage, Inc. 95 3rd Street San Francisco CA 94103 computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy, visualize and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments;computer services, namely, ensuring computer security by restricting network access to computers, controlling computer operating system and application security configuration parameters, monitoring and managing access rights and privileges to computers, and monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; cloud computing services, namely, providing software as a service (SaaS) services, namely, hosting software for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments, and infrastructure-as-a-service (IaaS) services, namely, hosting one or more virtual computers for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments; computer consultation in the field of cloud computer security; analysis of computer network traffic; establishing computer network communications baselines for the purpose of detecting anomalies and unauthorized changes; computer services, namely, analysis of computer network traffic associated with malicious or fraudulent activity;
WAR ROOM ACRONIS INTERNATIONAL GMBH Rheinweg 9 Schaffhausen 8200 Switzerland Computer security software; computer software for managing, monitoring, detecting, analysis and display of security exploits, viruses, trojans and other security threats to computer terminals and end points;Provision of information relating to the detection, analysis and display of security exploits, viruses, trojans and other security threats to computer terminals and networks; monitoring of computer servers and end points directed toward the detection, removal of or other action with respect to security exploits, viruses, trojans and other security threats; providing temporary use of online non-downloadable security software;
WAR ROOM Nyotron Information Security Ltd. 6 Galgaley Haplada St., 4672206 Herzeliya Israel Computer security software; computer software for managing, monitoring, detecting, analysis and display of security exploits, viruses, trojans and other security threats to computer terminals and end points;Provision of information relating to the detection, analysis and display of security exploits, viruses, trojans and other security threats to computer terminals and networks; monitoring of computer servers and end points directed toward the detection, removal of or other action with respect to security exploits, viruses, trojans and other security threats; providing temporary use of online non-downloadable security software;
XGEN Trend Micro Kabushiki Kaisha Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan Computer security software; computer antivirus software, anti-malware software and anti-ransomware software; computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; computer security software for data extraction and analysis used to identify and report malicious files; computer hardware and computer software for the protection, monitoring, authenticating, and securing of data, computers, computer networks, endpoints and mobile devices; computer security software and hardware, namely, intrusion prevention systems; computer security software for use in scanning for, preventing, identifying, assessing and reporting on threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; computer software for preventing unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets;
XM XM CYBER LTD. 11 GALGALEI HAPLADA ST. HERZLIYA 4672211 Israel Computer security software; computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment;Update, installation and maintenance of computer security software; providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.