COMPUTER SOFTWARE SECURING COMPUTER

Brand Owner (click to sort) Address Description
2084 Technolutions, Inc. 157 Church St 22nd Fl New Haven CT 06510 Computer software for securing computer networks access and facilitating remote security management;
ACCESSAGILITY AccessAgility 8609 Westwood Center Drive Suite 750 Vienna VA 22182 Computer software for securing computer networks against security risks; Computer software for assessing and protecting wireless and wired computer networks, servers, applications, and desktops against attack, intrusion, and misuse; Computer software for securing computer networks against security risks; Computer software for protecting data and information store on and/or transmitted across wireless and wired networks, servers, applications, and desktops against attack, intrusion and misuse;ACCESS AGILITY;Business consultation services; Business consulting and business information for enterprises; Business consulting services in the field of information assurance; Business management consultancy as well as development of processes for the analysis and the implementation of strategy plans and management projects;Information technology consulting services; Business technology software consultation services; Computer consultation; Computer consultation in the field of computer security; Computer hardware and software consulting services; Computer network design for others; Computer programming; Computer security consultancy; Computer software consulting; Computer software development; Computer software design; Consulting in the field of IT project management; Consulting in the field of virtualization technologies for enterprises and businesses; Consulting in the field of information technology; Consulting services in the field of software as a service (SAAS); Customized software development services; Customization of computer hardware and software; Integration of computer systems and networks; IT consulting services; IT integration services; Planning and development of electronic communications networks; Planning, design and implementation of virtualization technologies for enterprises and businesses; Professional computer services, namely, network analysis, LAN/WAN design, wireless engineering, virtualization and computer project management; Software design and development; Technical support, namely, monitoring of network systems; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical consulting and assistance with computer-based information systems and components; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services;
ACCESSAGILITY AccessAgility 8609 Westwood Center Drive Suite 750 Vienna VA 22182 Computer software for securing computer networks against security risks; Computer software for assessing and protecting wireless and wired computer networks, servers, applications, and desktops against attack, intrusion, and misuse; Computer software for securing computer networks against security risks; Computer software for protecting data and information stored on and/or transmitted across wireless and wired networks, servers, applications, and desktops against attack, intrusion and misuse;ACCESS AGILITY;Business consultation services; Business consulting and business information for enterprises; Business consulting services in the field of information assurance; Business management consultancy as well as development of processes for the analysis and the implementation of strategy plans and management projects;Information technology consulting services; Business technology software consultation services; Computer consultation; Computer consultation in the field of computer security; Consulting in the field of design, selection, implementation and use of computer hardware and software systems for others; Computer network design for others; Computer programming; Computer security consultancy; Computer software consulting; Computer software development; Computer software design; Consulting in the field of IT project management; Consulting in the field of virtualization technologies for enterprises and businesses; Consulting in the field of information technology; Consulting services in the field of software as a service (SAAS); Customized software development services; Customizing computer software; Integration of computer systems and networks; IT consulting services; IT integration services; Planning and development of electronic communications networks; Planning, design and implementation of virtualization technologies for enterprises and businesses; Professional computer services, namely, network analysis, LAN/WAN design, wireless engineering, virtualization and computer project management; Software design and development; Technical support, namely, monitoring technological functions of computer network systems; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical consulting and assistance in the design and implementation of computer-based information systems for businesses; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services;
ALERT360 HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP 11445 Compaq Center Drive West Houston TX 77070 Computer software for securing computer networks of enterprises and universities;ALERT 360;
CYBERANGEL Cyber Angel Security Solutions, Inc. Suite 104 475 Metroplex Drive Nashville TN 37211 Computer software for securing computer systems from tampering, theft, and use by unauthorized parties;
CYPHERPATH MANTECH COMMERCIAL SERVICES 2251 CORPORATE PARK DRIVE HERNDON VA 20171 Computer software for securing computer systems from unauthorized use;CYPHER PATH;
ENTITY360 HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP 11445 Compaq Center Drive West Houston TX 77070 Computer software for securing computer networks of enterprises and universities;ENTITY 360;
EXOBOX Exobox Technologies Corp. 6303 BEVERLY HILL SUITE 210 HOUSTON TX 77057 Computer software for securing computer data and files from intrusion;
EXOBOX ExoBox Technologies 6303 Beverly Hill, Suite 210 Houston TX 77057 Computer software for securing computer data and files from intrusion;
F-SECURE Data Fellows Oy c/o Data Fellows Inc. 675 North First Street, Suite 605 San Jose CA 95112 computer software for securing computer networks;F SECURE;
F-SECURE GATEKEEPER Data Fellows Oy c/o Data Fellows Inc. 675 North First Street, Suite 605 San Jose CA 95112 computer software for securing computer networks through anti-virus protection;F SECURE GATE KEEPER;
HEALTHWAVE TRADEWAVE CORPORATION 3500 West Balcones Center Drive Austin TX 787596509 computer software for securing computer networks;HEALTH WAVE;
PROTECT ME Drive Sentry, Inc. 339 N. Bernardo Ave. Suite 206 Mountain View CA 94043 Computer Software for securing computer systems and computer networks, namely software to prevent or control computer viruses, spy-ware, ad-ware or operation of any unauthorized or unintended software resident on, in or as part of a computer system;
SSH Data Fellows Oy c/o Data Fellows Inc. 675 North First Street, Suite 605 San Jose CA 95112 computer software for securing computer networks;
THE CYBERANGEL Computer Sentry Software, Inc. 377 Riverside Drive, Suite 111 Franklin TN 37064 computer software for securing computer systems from tampering, for securing computer systems from theft, and for securing computer systems from use by unauthorized parties;CYBER ANGEL;monitoring computer security systems;
THEFTGUARD Absolute Software Corporation Suite 1400, 1055 Dunsmuir Street Vancouver, B.C. V7X1K8 Canada Computer software for securing computer hardware and software from theft, provided in a hard disk or downloadable format; computer software for providing asset tracking and management of computer hardware and software, provided in a hard disk or downloadable format;THEFT GUARD;Monitoring of computer systems for security purposes related to the recovery or attempted recovery of lost or stolen computer hardware; and tracking services for retrieval of encoded computer hardware products;
TRUSTED LOGON COMMANDER Pinnacle Technology, Inc. 2721 Oregon St. Lawrence KS 66046 COMPUTER SOFTWARE FOR SECURING COMPUTER SYSTEMS, APPLICATIONS, AND FILES; ADMINISTERING OPERATING SYSTEMS AND NETWORK OPERATING SYSTEMS; AND FOR CREATING AND DEVELOPING SECURITY, AUTHENTICATION, AND ADMINISTRATION FUNCTIONS AND APPLICATIONS; AND MANUALS FOR THE FOREGOING ALL SOLD TOGETHER AS A UNIT;LOGON;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for identifying dependencies of a software program installed on a host computer prior to duplication of the software program from the host computer to a destination computer and for adapting the identified dependencies to the destination computer after duplication. An installed software program can be copied from a host computer to a destination computer without breaking portions of the image that rely on data unique to the computer context in which the software program is installed. Data structures store functionality exposed by a software program during installation of the software program that captures machine-specific data before duplication so that such machine-specific data can be restored properly after the duplication. Software of the invention processes the information in the data structures before and after the duplication process to identify and adapt, respectively, the dependencies.