COMPUTER SOFTWARE NETWORK SECURITY

Brand Owner (click to sort) Address Description
AGNITUM YANDEX Leo Tolstoy Str., 16 RU-119021 Moscow Russian Federation Computer software for network security purposes, antivirus protection and local security purposes;
AGNITUM Agnitum Limited Acropoleos Avenue 8 Nicosia Cyprus Computer software for network security purposes, antivirus protection and local security purposes;
APPIRON Red Lambda, Inc. 400 Colonial Center Parkway, Suite 270 Lake Mary FL 32746 Computer software for network security, identity management, and network management; Computer software for application and database integration; Computer software for creating searchable databases of information and data; Computer software platforms for network security; Computer software for network traffic management and network-based storage; Enterprise software in the nature of a database for non-transactional data and a search engine for database content; Computer software for information and data caching and information and data management; Computer software for grid computing, namely, providing seamless access to computing power, memory and data storage capacity distributed across a multiple network-based computing devices;APPLICATION IRON;Cloud computing services in the field of network security, identity management, and network management; Computer services for others, namely, optimization of scalability and performance of web sites, remote and on-site management of cloud computing software and systems, computer network configuration, software maintenance; Computer software development services for others in the field of network traffic management; Consulting services in the fields of cloud computing and network security; Computer software development and programming services for others in the nature of network security programming and database content programming; Application service provider (ASP) featuring non-downloadable computer software for use in database management, network management and network security; Computer software as a service (SaaS) featuring software in the field of network security and network management and for use in database management;
APPIRON GRID PLATFORM Red Lambda, Inc. 400 Colonial Center Parkway, Suite 270 Lake Mary FL 32746 Computer software for network security, identity management, and network management; Computer software for application and database integration; Computer software for creating searchable databases of information and data; Computer software platforms for network security; Computer software for network traffic management and network-based storage; Enterprise software in the nature of a database for non-transactional data and a search engine for database content; Computer software for information and data caching and information and data management; Computer software for grid computing, namely, providing seamless access to computing power, memory and data storage capacity distributed across a multiple network-based computing devices;APPLICATION IRON GRID PLATFORM;GRID PLATFORM;Cloud computing services in the field of network security, identity management, and network management; Computer services for others, namely, optimization of scalability and performance of web sites, remote and on-site management of cloud computing software and systems, computer network configuration, software maintenance; Computer software development services for others in the field of network traffic management; Consulting services in the fields of cloud computing and network security; Computer software development and programming services for others in the nature of network security programming and database content programming; Application service provider (ASP) featuring non-downloadable computer software for use in database management, network management and network security; Computer software as a service (SaaS) featuring software in the field of network security and network management and for use in database management;
ASSURE6 Salient Federal-Command, Inc. 4000 Legato Road, Suite 600 Fairfax VA 22033 computer software for network security; computer software for administration and management of computer networks;ASSURE SIX;
ASSURE6 Command Information, Inc. 2034 Eisenhower Avenue, Suite 222 Alexandria VA 22314 computer software for network security; computer software for administration and management of computer networks;ASSURE SIX;
AUTHPOINT WATCHGUARD TECHNOLOGIES, INC. 505 5th Ave. S, Ste 500 Seattle WA 98104 Computer software for network security and authentication in the fields of security monitoring, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks; computer software for use in the field of network management, security and authentication; computer software for use with multi-factor authentication; downloadable computer software, namely, software used for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;AUTH POINT; AUTHENTICATION POINT;
BLOXONE INFOBLOX INC. 2390 Mission College Boulevard, Ste. 501 Santa Clara CA 95054 computer software for network security, namely, software for providing information regarding network security; computer software for providing security features to control access from malware or other unauthorized intrusion or vulnerabilities on a computer network, namely, on computer network infrastructure, namely, connections at the perimeter of the network; computer software for the administration of computer networks in the field of computer networks and network security;domain name system (DNS) management and maintenance services, namely, maintenance of computer hardware relating to domain name system server computer security and prevention of computer risks to domain name systems; providing technological consulting and assistance in the field of computer hardware, namely, providing advice about the repair and maintenance of computers and computer components via the internet;BLOX ONE; BLOCK ONE;computer security services, namely, restricting access to and by computer networks to and of undesired websites and media; domain name system (DNS) management and maintenance services, namely, maintenance of computer software relating to domain name system server computer security and prevention of computer risks to domain name systems; monitoring of computer systems, namely, domain name systems, by remote access to ensure proper functioning; technical support, namely, monitoring technological functions of computer domain name systems; computer software-as-a- service (SaaS) services featuring software that assists in cloud and virtualization monitoring and management;
BLOXONE SERVICE EDGE INFOBLOX INC. 2390 Mission College Boulevard, Ste. 501 Santa Clara CA 95054 computer software for network security, namely, software for providing information regarding network security; computer software for providing security features to control access from malware or other unauthorized intrusion or vulnerabilities on a computer network, namely, on computer network infrastructure, namely, connections at the perimeter of the network; computer software for the administration of computer networks in the field of computer networks and network security;domain name system (DNS) management and maintenance services, namely, maintenance of computer hardware relating to domain name system server computer security and prevention of computer risks to domain name systems; providing technological consulting and assistance in the field of computer hardware, namely, providing advice about the repair and maintenance of computers and computer components via the internet;SERVICE EDGE;computer security services, namely, restricting access to and by computer networks to and of undesired websites and media; domain name system (DNS) management and maintenance services, namely, maintenance of computer software relating to domain name system server computer security and prevention of computer risks to domain name systems; monitoring of computer systems, namely, domain name systems, by remote access to ensure proper functioning; technical support, namely, monitoring technological functions of computer domain name systems; computer software-as-a- service (SaaS) services featuring software that assists in cloud and virtualization monitoring and management;
CISCO FIREPOWER CISCO TECHNOLOGY, INC. 170 West Tasman Drive San Jose CA 95134 Computer software and network security hardware all for use in detection and prevention of network intrusions and malware and for controlling and managing network user access and for enforcement of network policies; computer software and network security hardware for monitoring, analyzing or reporting of network information, data and traffic; computer software and network security hardware for optimizing computer system resources and availability;CISCO FIRE POWER;
CISCO TRUSTSEC CISCO TECHNOLOGY, INC. 170 West Tasman Drive San Jose CA 95134 Computer software for network security; computer software for encrypting and authenticating data, preventing data-loss, recovering data, access control, network compliance, intrusion detection, intrusion prevention, and network policy enforcement;CISCO TRUST SECURITY;
CITADEL Lussier, Kyle 2504 Autumn Run Ct Powder Springs GA 30127 computer software for network security and operations management;
CONFINET Adams Business Software Inc. Suite 11600 1910 Pacific Avenue Dallas TX 75201 Computer software for network security;
CYBERFLAGE Cyberflage 30 Jasmine Court Newnan GA 30265 Computer software for network security intrusion deception systems;
DNS ADVISOR INFOBLOX, INC. 475 Potrero Avenue Sunnyvale CA 94085 computer software for network security testing; software for use in managing, tracking and auditing networks;
DYNAMIC DEFENSE LOOKINGGLASS CYBER SOLUTIONS, INC. 10740 Parkridge Blvd, Suite 200 Reston VA 20191 Computer software for network security;Monitoring of computer systems for security purposes;
EMPIRUM matrix42 AG Dornhofstrasse 34 63263 Neu-Isenburg Germany Computer software for network security, remote access, control, administration of computers, distribution and standardization of software across computer networks, network inventory, operating system installation, and data backups and restoration;
FINSIGHT FINCORP, Inc. 300 West Main Street Building A Northborough MA 01532 Computer software for network security auditing and reporting;FINISH SIGHT; FIN SIGHT;
FIRECARD Merilus Technologies Inc. #307 - 46165 Yale Road Chilliwack V2P 2P2 Computer software for network security management and firewall applications; Linux-based firewall applications embedded on PCI cards and other devices; embedded computers for firewall applications; Computer software for network security management and firewall applications; Linux-based firewall applications embedded on PCI cards and other devices;
FIREGRID Red Lambda, Inc. 400 Colonial Center Parkway, Suite 270 Lake Mary FL 32746 Computer software for network security, identity management, and network management; Computer software for application and database integration; Computer software for creating searchable databases of information and data; Computer software platforms for network security; Computer software for network traffic management and network-based storage; Enterprise software in the nature of a database for non-transactional data and a search engine for database content; Computer software for information and data caching and information and data management; Computer software for grid computing, namely, providing seamless access to computing power, memory and data storage capacity distributed across a multiple network-based computing devices;Cloud computing services in the field of network security, identity management, and network management; Computer services for others, namely, optimization of scalability and performance of web sites, remote and on-site management of cloud computing software and systems, computer network configuration, software maintenance; Computer software development services for others in the field of network traffic management; Consulting services in the fields of cloud computing and network security; Computer software development and programming services for others in the nature of network security programming and database content programming; Application service provider (ASP) featuring non-downloadable computer software for use in database management, network management and network security; Computer software as a service (SaaS) featuring software in the field of network security and network management and for use in database management;
FIREPOWER CISCO TECHNOLOGY, INC. 170 West Tasman Drive San Jose CA 95134 Computer software and network security hardware all for use in detection and prevention of network intrusions and malware and for controlling and managing network user access and for enforcement of network policies; computer software and network security hardware for monitoring, analyzing or reporting of network information, data and traffic; computer software and network security hardware for optimizing computer system resources and availability;
GLASSWIRE SecureMix Ste. 320 620 Congress Avenue Austin TX 78701 Computer software for network security, namely, visualizing network activity and blocking connections, as well as alerting users to potential security problems that may be downloaded from a global computer network;GLASS WIRE;
GLASSWIRE Free Firewall Antivirus Ste 320 620 Congress Avenue Austin TX 78701 Computer software for network security, namely, visualizing network activity and blocking connections, as well as alerting users to potential security problems that may be downloaded from a global computer network;GLASS WIRE;
GROUND-TRUTH SeQure, Inc. 109 Greene St., Suite 3C New York NY 10012 Computer software for network security and cyber threat detection and mitigation utilizing artificial intelligence, machine learning, next-generation (next-gen) computing, predictive computing, and high-performance computing (HPC); computer software utilizing artificial intelligence, machine learning, next-gen computing, predictive computing, and high-performance computing (HPC)for detecting, identifying, analyzing, correlating, managing and responding to cybersecurity threats; cybersecurity software for controlling and monitoring computer network system configurations utilizing artificial intelligence, HPC and quantum computing; software and mobile applications utilizing artificial intelligence and quantum computing for monitoring and protecting systems and networks in the fields of computer and network security and cybersecurity; software for detecting security breaches utilizing artificial intelligence, machine learning, next-gen computing, predictive computing, and high-performance computing (HPC) available through online and connected services;Software as a service (SAAS) services featuring software for network security and cyber threat detection and mitigation; software as a service (SAAS) services featuring software for detecting, identifying, analyzing, managing and responding to cybersecurity threats; development, installation, maintenance and updating of computer software relating to cybersecurity and cyber threat mitigation; computer security consultancy in the field of cybersecurity and cyber threat mitigation; computer security threat analysis for protecting computer networks; cybersecurity services, namely, cybersecurity threat analysis services utilizing artificial intelligence, machine learning, next-generation (next-gen) computing, predictive computing, and high-performance computing (HPC); software for cybersecurity utilizing artificial intelligence, machine learning, next-gen computing, predictive computing, and high-performance computing (HPC); providing computer cybersecurity software for controlling and monitoring computer network system configurations; software for use in detecting security breaches utilizing artificial intelligence, machine learning, next-gen computing, predictive computing, and high-performance computing (HPC) (utilizing high-performance computing architectures);
IDENTIFY WITH YOUR NETWORK SECURITY Red Lambda, Inc. 400 Colonial Center Parkway, Suite 270 Lake Mary FL 32746 Computer software for network security, identity management, and network management; Computer software for application and database integration; Computer software for creating searchable databases of information and data; Computer software platforms for network security; Computer software for network traffic management and network-based storage; Enterprise software in the nature of a database for non-transactional data and a search engine for database content; Computer software for information and data caching and information and data management; Computer software for grid computing, namely, providing seamless access to computing power, memory and data storage capacity distributed across a multiple network-based computing devices;NETWORK SECURITY;Cloud computing services in the field of network security, identity management, and network management; Computer services for others, namely, optimization of scalability and performance of web sites, remote and on-site management of cloud computing software and systems, computer network configuration, software maintenance; Computer software development services for others in the field of network traffic management; Consulting services in the fields of cloud computing and network security; Computer software development and programming services for others in the nature of network security programming and database content programming; Application service provider (ASP) featuring non-downloadable computer software for use in database management, network management and network security; Computer software as a service (SaaS) featuring software in the field of network security and network management and for use in database management;
INFOBLOX SERVICE EDGE INFOBLOX INC. 2390 Mission College Boulevard, Ste. 501 Santa Clara CA 95054 computer software for network security, namely, software for providing information regarding network security; computer software for providing security features to control access from malware or other unauthorized intrusion or vulnerabilities on a computer network, namely, on computer network infrastructure, namely, connections at the perimeter of the network; computer software for the administration of computer networks in the field of computer networks and network security;domain name system (DNS) management and maintenance services, namely, maintenance of computer hardware relating to domain name system server computer security and prevention of computer risks to domain name systems; providing technological consulting and assistance in the field of computer hardware, namely, providing advice about the repair and maintenance of computers and computer components via the internet;INFO BLOX SERVICE EDGE;SERVICE EDGE;computer security services, namely, restricting access to and by computer networks to and of undesired websites and media; domain name system (DNS) management and maintenance services, namely, maintenance of computer software relating to domain name system server computer security and prevention of computer risks to domain name systems; monitoring of computer systems, namely, domain name systems, by remote access to ensure proper functioning; technical support, namely, monitoring technological functions of computer domain name systems; computer software-as-a- service (SaaS) services featuring software that assists in cloud and virtualization monitoring and management;
INNUENDO Immunity, Inc. 2 Alhambra Plaza, Suite PH-1-B Coral Gables FL 33134 Computer software for network security assessment and testing;
IPMINI SHANGHAI UTT Technologies Co., Ltd. Room 102, Building 21 No.518 Xinzhuan Road Caohejing Songjia China Computer software for network security and operation, recorded on RAM and CD-ROM; computers; computer programs for network security and operation; computer programs for network security and operations, recorded on RAM and CD-ROM; computer peripheral devices; computer game software; data processing apparatus;IP MINI;Color is not claimed as a feature of the mark.;
LOGRHYTHM LogRhythm, Inc. 385 Interlocken Crescent, Suite 1050 Broomfield CO 80021 Computer software for network security, system security, file security, and data security; computer software for management and monitoring of computer networks, systems, files, and data; computer software for detection, analysis, reporting, and restoration of changes to computer networks, systems, applications, files, and data; computer software for managing and optimizing hardware and software in an information technology environment; computer software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; computer hardware;LOG RHYTHM;
MANA RESURGO 1613 KALANIUKA WAY HONOLULU HI 96821 Computer software for network security;
MATRIX42 matrix42 AG Dornhofstrasse 34 63263 Neu-Isenburg Germany Computer software for network security, remote access, control, and administration of computers, distribution and standardization of software across computer networks, network inventory, operating system installation, and data backups and restoration;MATRIX 42;
MCAFEE MOBILE NETWORKS ASSOCIATES, INC. 3965 FREEDOM CIRCLE SANTA CLARA CA 95054 computer software for network security, network management, network communications and virus protection;
MEDCOMMAND Cylera, Inc. 30 West 26th Street, Floor 7 New York NY 10010 Computer software for network security, system security, file security, and data security; computer software for management and monitoring of computer networks, systems, network connected devices, files, and data; computer software for detection, analysis, reporting, and restoration of changes to computer networks, network connected devices, systems, applications, files, and data; computer software for managing, analyzing, and optimizing hardware and software in an information technology environment; computer software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices;MED COMMAND;Software as Service (SAAS) services featuring software for network security, system security, file security, and data security; Software as Service (SAAS) services featuring software for management and monitoring of computer networks, systems, network connected devices, files, and data; Software as Service (SAAS) services featuring software for detection, analysis, reporting, and restoration of changes to computer networks, systems, network connected devices, applications, files, and data; Software as Service (SAAS) services featuring software for managing analyzing, and optimizing hardware and software in an information technology environment; technical support services, namely, troubleshooting of computer hardware and software problems; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices;
METAGRID Red Lambda, Inc. 400 Colonial Center Parkway, Suite 270 Lake Mary FL 32746 Computer software for network security, identity management, and network management; [ Computer software for application and database integration; Computer software for creating searchable databases of information and data; ] Computer software platforms for network security; [ Computer software for network traffic management and network-based storage; Enterprise software in the nature of a database for non-transactional data and a search engine for database content; ] Computer software for information and data caching and information and data management; Computer software for grid computing, namely, providing seamless access to computing power, memory and data storage capacity distributed across a multiple network-based computing devices;META GRID;[ Cloud computing services in the field of network security; Computer services for others, namely, optimization of scalability and performance of web sites, remote and on-site management of cloud computing software and systems, computer network configuration, software maintenance, and orchestration and execution of workflow and jobs on a grid-based platform; Software development services for others in the field of network traffic management; ] Consulting services in the fields of cloud computing and network security; Software development [ and programming ] services for others [ ; Application service provider (ASP) featuring non-downloadable software for use in database management and network security; Software as a service (SaaS) featuring software in the field of network security ];
NETSENTRY LOOKINGGLASS CYBER SOLUTIONS, INC. 10740 Parkridge Blvd, Suite 200 Reston VA 20191 computer software for network security;NET SENTRY;
NETSHIELD MCAFEE 6220 America Center Drive SAN JOSE CA 95002 computer software for network security management and printed users' manuals for use therewith sold as a unit;NETWORK SHIELD;
NEURAL FOAM Red Lambda, Inc. 400 Colonial Center Parkway, Suite 270 Lake Mary FL 32746 Computer software for network security, identity management, network management and operational intelligence; [ Computer software for application and database integration; Computer software for creating searchable databases of information and data; ] Computer software platforms for network security and operational intelligence; [ Computer software for network traffic management and network-based storage; Enterprise software in the nature of a database for non-transactional data and a search engine for database content; ] Computer software for information and data caching and information and data management; Computer software for grid computing, namely, providing seamless access to computing power, memory and data storage capacity distributed across a multiple network-based computing devices;[ Cloud computing services in the field of network security, identity management, network management and operational intelligence; ] Computer services for others in the field of network security and operational intelligence; [, namely, optimization of scalability and performance of web sites, remote and on-site management of cloud computing software and systems, computer network configuration, software maintenance, and operational data searching, manipulation and storage; ] Computer software development services for others in the field of network security, operational intelligence and traffic management; Consulting services in the fields of cloud computing, network security, and operational intelligence [; Computer software development and programming services for others in the nature of network security programming, operational intelligence programming, and database content programming; Application service provider (ASP) featuring non-downloadable computer software for use in database management, network management, operational intelligence, and network security; Computer software as a service (SaaS) featuring software in the field of network security, operational intelligence and network management ];
NIPPER Titania Limited 5 Beeches Walk, Tiddington, Stratford-upon-Avon CV377AT United Kingdom Computer software for network security and security threat management; Computer software for monitoring networks, software for security and systems vulnerability management purposes; computer software for performing network security audits; computer software for vulnerability testing, systems security testing and penetration testing; Computer software for network and device security management, audit management, computer systems management and analysis; downloadable computer software for network security and security threat management; Downloadable computer software for monitoring networks; computer software for security and systems vulnerability management purposes; downloadable computer software for performing network security audits; Downloadable computer software for vulnerability testing, network and device security management, audit management, systems security testing and penetration testing in International Class 9;Computer software consultancy; Computer software development; Design and development of computer software for network security, security threat management; monitoring networks; Design and development of software and devices for security and and systems vulnerability managemetn purposes; Design and development of computer software for network security audits; Design and development of computer software for vulnerability testing, systems security testing and penetration testing; Design and development of computer software for networkand device security management, audit management and systems management; Design and development of computer system reporting and management tools; Design, development, installation and maintenance of computer software; Design, maintenance, development and updating of computer software, in International class 42;
NIPPER STUDIO Titania Group Limited Security House, Barbourne Road Worcester WR1 1RS United Kingdom Computer software for network security and security threat management; computer software for monitoring networks and software for security; computer software for systems vulnerability management purposes; computer software for performing network security audits; computer software for vulnerability testing, systems security testing and penetration testing; computer software for network and device security management, audit management, computer systems management and analysis; software downloadable from the Internet for network security and security threat management; software downloadable from the Internet for monitoring networks; software downloadable from the Internet for performing network security audits; software downloadable from the Internet for vulnerability testing, network and device security management, audit management, systems security testing and penetration testing; downloadable electronic publications in the nature of security audits;STUDIO;Design and development of computer hardware and software; computer programming; installation, maintenance and repair of computer software; computer consultancy services;
NT OBJECTIVES, INC. NT OBJECTives, Inc. 2 San Bonifacio Rancho Santa Margarita CA 92688 Computer software for network security;INC.;
OUTPOST FIREWALL YANDEX Leo Tolstoy Str., 16 RU-119021 Moscow Russian Federation Computer software for network security purposes, antivirus protection and local security purposes for use on desktop and portable computers, namely computer antivirus software, computer utility software, firewall software for preventing intrusion and hacking, computer anti-trojan horse software, computer software for preventing network intrusion, computer software for blocking hostile computer code, computer software for protecting user privacy online, computer software for blocking unwanted web sites, computer software for interception, blocking, modifying and analyzing network activity, computer software for monitoring of network activity of the computer, and computer telecommunication software for use in transmitting and receiving information concerning computer viruses and trojan horses, computer security issues and updated versions of computer software via global computer networks;OUT POST FIRE WALL;FIREWALL;
OUTPOST NETWORK SECURITY YANDEX Leo Tolstoy Str., 16 RU-119021 Moscow Russian Federation Computer software for network security purposes, anti virus protection and local security purposes for use on desktop and portable computers, namely, computer anti virus software, computer utility software, firewall software for preventing intrusion and hacking, computer anti-trojan horse software, computer software for preventing network intrusion, computer software for blocking hostile computer code, computer software for protecting user privacy online, computer software for blocking unwanted web sites, computer software for interception, blocking, modifying and analyzing network activity, computer software for monitoring of network activity of the computer, and computer telecommunication software for use in transmitting and receiving information concerning computer viruses and trojan horses, computer security issues and updated versions of computer software via global computer networks;NETWORK SECURITY;
OUTPOST NETWORK SECURITY Agnitum Limited Acropoleos Avenue 8 Nicosia Cyprus Computer software for network security purposes, antivirus protection and local security purposes for use on desktop, servers and portable computers, namely computer antivirus software, computer utility software, firewall software for preventing intrusion and hacking, computer anti-trojan horse and anti-spyware software, computer software for preventing network intrusion, computer software for blocking hostile computer code, computer software for protecting user privacy online, computer software for blocking unwanted web sites, computer software for blocking spam messages, computer software for interception, blocking, modifying and analyzing network activity, computer software for monitoring of network activity of the computer, and computer telecommunication software for use in transmitting and receiving information concerning computer viruses, spyware and trojan horses, computer security issues and updated versions of computer software via global computer networks; Centralized deployment, management (using different security policy for different endpoints), monitoring and updating of such software;Outpost, Network, Security;
OUTPOST OFFICE FIREWALL Agnitum Limited Acropoleos Avenue 8 Nicosia Cyprus Computer software for network security purposes, antivirus protection and local security purposes for use on desktop and portable computers, namely computer antivirus software, computer utility software, firewall software for preventing intrusion and hacking, computer anti-trojan horse software, computer software for preventing network intrusion, computer software for blocking hostile computer code, computer software for protecting user privacy online, computer software for blocking unwanted web sites, computer software for interception, blocking, modifying and analyzing network activity, computer software for monitoring of network activity of the computer, and computer telecommunication software for use in transmitting and receiving information concerning computer viruses and trojan horses, computer security issues and updated versions of computer software via global computer networks;
OUTPOST SECURITY SUITE YANDEX Leo Tolstoy Str., 16 RU-119021 Moscow Russian Federation Computer software for network security purposes, anti virus protection and local security purposes for use on desktop and portable computers, namely, computer anti virus software, computer utility software, firewall software for preventing intrusion and hacking, computer anti-trojan horse software, computer software for preventing network intrusion, computer software for blocking hostile computer code, computer software for protecting user privacy online, computer software for blocking unwanted web sites, computer software for interception, blocking, modifying and analyzing network activity, computer software for monitoring of network activity of the computer, and computer telecommunication software for use in transmitting and receiving information concerning computer viruses and trojan horses, computer security issues and updated versions of computer software via global computer networks;SECURITY SUITE;
RED LAMBDA LAMBDA, INC. 2565 3RD STREET, SUITE 244 SAN FRANCISCO CA 94107 Computer software for network security, identity management, and network management; [ Computer software for application and database integration; Computer software for creating searchable databases of information and data; ] Computer software platforms for network security; [ Computer software for network traffic management and network-based storage; Enterprise software in the nature of a database for non-transactional data and a search engine for database content; ] Computer software for information and data caching and information and data management; Computer software for grid computing, namely, providing seamless access to computing power, memory and data storage capacity distributed across a multiple network-based computing devices;[ Cloud computing services in the field of network security, identity management, and network management; Computer services for others, namely, optimization of scalability and performance of web sites, remote and on-site management of cloud computing software and systems, computer network configuration, software maintenance; Computer software development services for others in the field of network traffic management; ] Consulting services in the fields of cloud computing and network security; Computer software development and programming services for others in the nature of network security programming [ and database content programming; Application service provider (ASP) featuring non-downloadable computer software for use in database management, network management and network security; Computer software as a service (SaaS) featuring software in the field of network security and network management and for use in database management ];
RED MIRA Red Mira 4741 Central, Suite 277 Kansas City MO 64112 computer software for network security and billing purposes;
SCOUTINTERXECT LOOKINGGLASS CYBER SOLUTIONS, INC. 10740 Parkridge Blvd, Suite 200 Reston VA 20191 Computer software for network security; computer software for identifying, correlating, and managing threat intelligence;SCOUT INTERSECT;Computer software consultation; computer systems integration services; software as a service (SAAS) services featuring software for identifying, correlating, and managing threat intelligence;
SCOUTPRIME LOOKINGGLASS CYBER SOLUTIONS, INC. 10740 Parkridge Blvd, Suite 200 Reston VA 20191 computer software for network security;SCOUT PRIME;
SCOUTVISION LOOKINGGLASS CYBER SOLUTIONS, INC. 10740 Parkridge Blvd, Suite 200 Reston VA 20191 Computer software for NETWORK SECURITY;SCOUT VISION;Computer software consultation; Computer software development; Computer systems integration services; Integration of computer systems and networks;
SECURE CONNECT Ascend Communications, Inc. 1701 Harbor Bay Parkway One Ascend Plaza Alameda CA 95402 computer software for network security, namely, software for providing dynamic firewall filtering, remote user authentication, data encryption, and surveillance and monitoring of access to a computer network;SECURE;
SECURENOC ODS NETWORKS, INC. 1101 E. Arapaho Road Richardson TX 75081 COMPUTER SOFTWARE FOR NETWORK SECURITY AND RELATED MANUALS SOLD AS A UNIT;SECURE NOC;
SECUREREMOTE ODS NETWORKS, INC. 1101 E. Arapaho Road Richardson TX 75081 COMPUTER SOFTWARE FOR NETWORK SECURITY AND RELATED MANUALS SOLD AS A UNIT;SECURE REMOTE;
SKYSECURE SkyRiver Communications, Inc. 4810 Eastgate Mall San Diego CA 92121 computer software for network security;SKY SECURE;
STREAM RECOVERY ODS NETWORKS, INC. 1101 E. Arapaho Road Richardson TX 75081 COMPUTER SOFTWARE FOR NETWORK SECURITY AND RELATED MANUAL SOLD AS A UNIT;
TOTAL VIRUS DEFENSE MCAFEE, INC. 2821 Mission College Blvd. Santa Clara CA 95054 computer software for network security and protection against infected computer applications;In the statement, Column 2, line 6, 3-24-2000 should be deleted, and, 3-29-2000 should be inserted.;VIRUS;
TREND MICRO TREND MICRO INCORPORATED 225 E. John Carpenter Freeway, Ste. 1500 Irving TX 75062 computer software for network security, network management, protection and recovery from computer viruses, [ copy protection, ] transferring data between portable computing devices and desktop and networked computers [ , and for linking text records with electronic images ] ; computer utility and antivirus software; computer software for monitoring and modifying messages, files, and data received over computer networks; user manuals supplied therewith;The drawing is amended to appear as follows: TREND MICRO;
TRIVALENT Cyber Reliant Corp. Suite 410 180 Admiral Cochrane Drive Annapolis MD 21401 Computer software for network security, system security, file security, and data security; computer software for providing secure access to, secure data transmission to and from, and secure data storage on mobile computing devices; computer software for identifying, installing, and removing user-specific collections of user applications and computer network communication protocols on users' computing devices; computer software for the encryption, file shredding, secure data storage, and reconstitution of data; computer software for detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, databases, and mobile devices;
WEBSHIELD MCAFEE 6220 America Center Drive SAN JOSE CA 95002 computer software for network security management and printed users' manuals for use therewith sold as a unit;In the statement, column 1, line 1, Network should be deleted, and, Networks should be inserted, and line 3, should be deleted, and 3965 Freedom Circle should be inserted, and line 4, 95051 should be deleted, and, 95054 should be inserted.;WEB SHIELD;
WEBWALL NETWORK ASSOCIATES, INC. 1100 E. Woodfield Road. Suite 200 Schaumburg IL 60173 computer software for network security management and printed users' manuals for use therewith sold as a unit;WEB WALL;
WORM VACCINE Arbor Networks, Inc. 310 Littleton Road Westford MA 01866 Computer software for network security, network integrity, data security, data integrity, and authentication;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. In one embodiment, the present invention provides for receiving security events from a network device by a distributed software agent of a network security system, determining a priority of each received security event, and storing the security events in a plurality of prioritized event buffers based on the determined priorities for a period of time determined by a timer. Upon expiration of the timer, a batch of security events for transport to a security event manager of the network security system can be created by including security events in the batch in order of priority until the batch is full.