COMPUTER SOFTWARE SECURITY

Brand Owner (click to sort) Address Description
AIRSCANNER Airscanner Corporation 3241 Purdue Ave. Dallas TX 75225 Computer software for security of mobile or wireless computing devices that may be downloaded from a global computer network;AIR SCANNER;
ARE YOU SECURE? Secure Origin 2030 Coffee Rd, Suite C Modesto CA 95355 computer software for security; internet services, network security services;
AS ANTI-HACKER AvailaSoft Corporation Limited 8/F, Bank of America Tower, 12 Harcourt Road Central Hong Kong Computer software for security;AVAILA SOFT ANTI-HACKER;
AT&T TOGGLE AT&T INTELLECTUAL PROPERTY II, L.P. 645 East Plumb Lane Reno NV 89502 Computer software for security, management, governance, data sharing, collaboration and access between enterprise systems and mobile devices, and for providing applications services to mobile devices;Providing computer and information technology services, namely, technical and support services for computer software for security, management, governance, data sharing, collaboration and access between enterprise systems and mobile devices, and for providing applications services to mobile devices; software as a service (SAAS) services, namely, hosting software for use by others for security, management, governance, data sharing, collaboration and access between enterprise systems and mobile devices, and for providing applications services to mobile devices;
CCURITY NETWORK SOLUTIONS Dennis Klinkott Bethelstr. 1B Lippstadt 59555 Germany computer software for security and administration; computer aided design; symbol libraries for computer drawings, designs, and layouts; forms design for automating and managing information; clip art; image processing; computer software training; organizational chart making; legal forms, letters, and contracts; CD-ROM utilities;
CENTRAX CENTRAX 10245 W. Summerwind Dr Boise ID 83704 Computer software for the security of networked computers and for detecting computer network security problems and instructional and user manuals provided in connection therewith;
CENTRAX AUDIT STRATEGY TOOL CENTRAX 10245 W. Summerwind Dr Boise ID 83704 Computer software for the security of networked computers and for detecting computer network security problems, and instruction and user manuals sold as a unit;AUDIT and TOOL;
CERTES TRUSTNET MANAGER CERTES NETWORKS, INC. 300 Corporate Center Drive, Suite 140 Pittsburgh PA 15108 Computer software for security and encryption functions over computer and communications networks;CERTES TRUST NET MANAGER;MANAGER;
CIPHERENGINE CERTES NETWORKS, INC. 300 Corporate Center Drive, Suite 140 Pittsburgh PA 15108 Computer software for security and encryption functions over computer and communications networks; Computer hardware for security and encryption functions over computer and communications networks;
CIPHERVIEW CERTES NETWORKS, INC. 300 Corporate Center Drive, Suite 140 Pittsburgh PA 15108 Computer software for security and encryption over computer and communications networks; Computer hardware for security and encryption functions over computer and communications networks;CIPHER VIEW;
CLEARSHIELD SKYRECON SYSTEMS SA 8, rue La Fayette F-75009 PARIS France computer software for the security of computers;communication by computer terminals or via fiber-optic networks;CLEAR SHIELD;design and development of computers and software; development, design, installation, maintenance, updating and rental of software; computer programming;
CLOUDSPLOIT AQUA SECURITY SOFTWARD LTD. 40 TUVAL ST. SAPIR TOWER, 35TH FLOOR RAMAT GAN 5252247 Israel Computer software for security and monitoring of configurations for web-based services that may be downloaded from a global computer network; Computer software for data security management that may be downloaded from a global computer network; Computer software platforms, downloadable, for security and monitoring of configurations for web-based services;In the statement, line 1, Maryland should be deleted, and New York should be inserted.;CLOUD SPLOIT; CLOUD EXPLOIT;
CODEPROOF CODEPROOF TECHNOLOGIES, INC. 3505 La Castellet CT San Jose CA 95148 Computer software for security and device management of various mobile devices and operating systems;CODE PROOF;
CODEPROOF Shetty, Satish 17371 NE 119th Way Redmond WA 98052 Computer software for security and device management of various mobile devices and operating systems;CODE PROOF;
COMPLIANCE-GRADE cipherOptics, Inc. Suite 125 701 Corporate Center Drive Raleigh NC 27607 Computer software for security and encryption functions over computer and communications networks; Computer hardware for security and encryption functions over computer and communications networks;
CRYPTO-SIGN Transaction Security, Inc. 2 Franklin Tree Ct Catonsville MD 21228 Computer software for the security and encryption of messages and data;CRYPTO SIGN;
CRYPTO-SIGN CyberSIGN Incorporated c/o Transaction Security, Inc. 373 STONEHOUSE DRIVE SEVERNA PARK MD 21146 Computer software for the security and encryption of messages and data;CRYPTO SIGN;
CYTLOK CYTWARE CORPORATION 4913 Cockrell Ave. Ft. Worth TX 76133 computer software for a security program for computers;CITY LOCK;
CYTLOK PRO CYTWARE CORPORATION 4913 Cockrell Ave. Ft. Worth TX 76133 computer software for a security program for computers;CITY LOCK PRO;
DIGITALDOORS DigitalDoors Inc. 4201 Collins Ave # 2103 Miami Beach FL 33140 Computer software for security, privacy, confidentially, and survivability of digital information and for data mining and knowledge management of digital information;DIGITAL DOORS;
DIVIDE GOOGLE INC. 1600 Amphitheatre Parkway Mountain View CA 94043 Computer software for security, management, governance, data sharing, collaboration, and access between enterprise systems and mobile devices, and for providing applications services to mobile devices;Providing use of non-downloadable computer software for security, management, governance, data sharing, collaboration, and access between enterprise systems and mobile devices, and for providing applications services to mobile devices. Providing computer and information technology services, namely, technical and support services for computer software for security, management, governance, data sharing, collaboration, and access between enterprise systems and mobile devices, and for providing applications services to mobile devices;
DOTFUSCATOR PREEMPTIVE SOLUTIONS 767 Beta Drive Mayfield Village OH 44143 computer software for the security of on-line code;
DOTFUSCATOR Preemptive Solutions 26250 Euclid Avenue Suite 503 Euclid OH 441323602 computer software for the security of on-line code;
ENTERPROID GOOGLE INC. 1600 Amphitheatre Parkway Mountain View CA 94043 Computer software for security, management, governance, data sharing, collaboration, and access between enterprise systems and mobile devices, and for providing applications services to mobile devices;Providing use of non-downloadable computer software for security, management, governance, data sharing, collaboration, and access between enterprise systems and mobile devices, and for providing applications services to mobile devices. Providing computer and information technology services, namely, technical and support services for computer software for security, management, governance, data sharing, collaboration, and access between enterprise systems and mobile devices, and for providing applications services to mobile devices;
ENTRAX Mesa Development Group 6540 Luke Boulevard, Suite C-212 San Diego CA 92121 Computer software for the security of networked computers and for detecting computer network security problems and instructional and user manuals provided in connection therewith;
HACKERTRAP HACKERTRAP.COM HACKERTRAPS HACKERTRAPS.COM Andrew H. Sinnickson 1002 Moss Haven Ct. Annapolis MD 21403 COMPUTER SOFTWARE FOR SECURITY AND OR ACCOUNTING SERVICES ON THE INTERNET (EG,INTERNET SERVICES);HACKER TRAP HACKER TRAP COM;
HOMEFEED Tenable Network Security, Inc. 6100 Merriweather Drive, 12th Floor Columbia MD 20144 Computer software for security, configuration auditing, and vulnerability scanning of computer networks;HOME FEED;
INTERNETBANKINGPROTECTOR AvailaSoft Corporation Limited 8/F, Bank of America Tower, 12 Harcourt Road Central Hong Kong Computer software for security;INTERNET BANKING PROTECTOR;
INTERNETPAYMENTPROTECTOR AvailaSoft Corporation Limited 8/F, Bank of America Tower, 12 Harcourt Road Central Hong Kong Computer software for security;INTERNET PAYMENT PROTECTOR;
INTERNETSHOPPINGPROTECTOR AvailaSoft Corporation Limited 8/F, Bank of America Tower, 12 Harcourt Road Central Hong Kong Computer software for security;INTERNET SHOPPING PROTECTOR;
INTERNETTRANSACTIONPROTECTOR AvailaSoft Corporation Limited 8/F, Bank of America Tower, 12 Harcourt Road Central Hong Kong Computer software for security;INTERNET TRANSACTION PROTECTOR;
IWDL AvailaSoft Corporation Limited 8/F, Bank of America Tower, 12 Harcourt Road Central Hong Kong Computer software for security;
NESSUS TENABLE, INC. 6100 Merriweather Drive, 12th Floor Columbia MD 21046 Computer software for security, configuration auditing, and vulnerability scanning of computer networks;
NETSNAPPER NETSNAPPER TECHNOLOGIES S.A.R.L. 75, Parc d'Activités L-8308 Capellen Luxembourg Computer software for security and optimization of data transmission via computer and telecommunications networks, namely for data encryption, data compression and enhancement of connectivity persistence, software for use in data entry, data compilation, data assembly and data transmission for computer networks; recorded computer programs, namely, communication software to access data stored on a mobile computer and transfer data to a business network; programming languages in the nature of recorded computer operating programs containing programming languages; computer software recorded magnetically, electronically, and optically on data media for accessing data stored on a mobile computer and transferring data to a business network; downloadable instructional materials concerning computers and data in the nature of operating computer programs, recorded electronically, optically, and magnetically for instructional purposes; equipment for magnetic, optical and electronic recording of data, namely, electronic data recorders and containers and receptacles intended for these products, namely, carrying cases specially adapted for electronic data recorders; all the foregoing excluding transmission of video images over a global computer network;NET SNAPPER;
ONLINEBANKINGPROTECTOR AvailaSoft Corporation Limited 8/F, Bank of America Tower, 12 Harcourt Road Central Hong Kong Computer software for security;ON LINE BANKING PROTECTOR;
ONLINEPAYMENTPROTECTOR AvailaSoft Corporation Limited 8/F, Bank of America Tower, 12 Harcourt Road Central Hong Kong Computer software for security;ON LINE PAYMENT PROTECTOR;
ONLINESHOPPINGPROTECTOR AvailaSoft Corporation Limited 8/F, Bank of America Tower, 12 Harcourt Road Central Hong Kong Computer software for Security;ON LINE SHOPPING PROTECTOR;
ONLINETRANSACTIONPROTECTOR AvailaSoft Corporation Limited 8/F, Bank of America Tower, 12 Harcourt Road Central Hong Kong Computer software for security;ON LINE TRANSACTION PROTECTOR;
PARAMOUNT DEFENSES Paramount Defenses Inc Suite 1100 620 Newport Center Dr. Newport Beach CA 92660 Computer software for security and access audit in a computer system or network; computer software for analyzing and auditing access in a computer system or network; computer software for automating a process to assess access entitlements of an entity in a system; computer software for access and effective access assessment, analysis and audit in a computer system or network; computer software for information security reconnaissance; computer software for security and access assessment, monitoring and management in a computer system or network;DEFENSES;Computer security consultancy; computer security consultancy in the field of computer and cyber security; computer security consultancy in the field of access control, access audit, effective access audit, security assessment, vulnerability assessment, risk assessment and risk mitigation; computer security consultancy for the prevention of computer and cyber security risks and breaches, hacking, cyber-attacks, insider-threats, white-collar crimes, and computer crimes; consultation in the fields of computer security, network security, information technology and data security;
PEPG AvailaSoft Corporation Limited 8/F, Bank of America Tower, 12 Harcourt Road Central Hong Kong Computer software for security;
PKMA cipherOptics, Inc. Suite 125 701 Corporate Center Drive Raleigh NC 27607 Computer software for security and encryption over computer and communications networks; Computer hardware for security and encryption functions over computer and communications networks;
POLICY KEY MANAGEMENT ARCHITECTURE CERTES NETWORKS, INC. 300 Corporate Center Drive, Suite 140 Pittsburgh PA 15108 Computer software for security and encryption over computer and communications networks; Computer hardware for security and encryption functions over computer and communications networks;MANAGEMENT ARCHITECTURE;
PROFESSIONALFEED Tenable Network Security, Inc. 6100 Merriweather Drive, 12th Floor Columbia MD 20144 Computer software for security, configuration auditing, and vulnerability scanning of computer networks;PROFESSIONAL FEED;
S-DOC Securit-E-Doc Corporation 515 N. Flagler Drive, Suite 203 West Palm Beach FL 33401 COMPUTER SOFTWARE FOR SECURITY OF ELECTRONIC DOCUMENTS;SECURITY DOCUMENT;
SAFE PASSAGE CERTES NETWORKS, INC. 300 Corporate Center Drive, Suite 140 Pittsburgh PA 15108 Computer software for security and encryption over computer and communications networks; Computer hardware for security and encryption functions over computer and communications networks;
SECURITY WITHOUT COMPROMISE cipherOptics, Inc. Suite 125 701 Corporate Center Drive Raleigh NC 27607 Computer software for security and encryption over computer and communications networks; Computer hardware for security and encryption functions over computer and communications networks;SECURITY;
SIMPLY SECURE cipherOptics, Inc. Suite 125 701 Corporate Center Drive Raleigh NC 27607 Computer software for security and encryption over computer and communications networks; Computer hardware for security and encryption functions over computer and communications networks;SECURE;
SITEADMINISTRATOR Granger, Ted N. Jr. 321 So. 93rd Street Omaha NE 681143945 COMPUTER SOFTWARE FOR THE SECURITY AND ADMINISTRATION OF WEBSITE E-COMMERCE AND CONTENT;SITE ADMINISTRATOR;
SMARTCLOSE Expeditrix Corporation 1101 S. Capital of TX Hwy. Bldg. H, Suite 105 Austin TX 78746 computer software for security of real estate transaction documents and document management; computer software for communication of transaction status by telephone, facsimile, electronic mail, pager, personal digital assistant or electronic communication network;ONLINE ELECTRONIC PROCESSING OF REAL ESTATE TRANSACTIONS AND MORTGAGE APPLICATIONS; ONLINE ELECTRONIC REAL ESTATE BROKERAGE SERVICES; REAL ESTATE ESCROW SERVICES;SMART CLOSE;
SPAMTRAQ MX Logic, Inc. Suite 400 9781 S. Meridian Blvd. Denver CO 80112 computer software for security, authentication and virus and spam detection, prevention and removal for electronic mail, instant messaging, internet-based voice mail and fax communications, and electronic files attached to such messages;SPAM TRACK;
SYSDIG SYSDIG, INC. 21st Floor 135 Main Street San Francisco CA 94105 Computer software for security, monitoring, troubleshooting and forensics for containers and microservices that may be downloaded from a global computer network; Computer software platforms, downloadable, for security, monitoring, troubleshooting and forensics for containers and microservices; Computer software platforms, recorded, for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable software for processing images, graphics and text; Downloadable software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable cloud-based software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks; Downloadable computer software for application and database integration; Downloadable computer software for authorizing access to data bases; Downloadable computer software for database management; Downloadable computer software for document management; Downloadable computer software for encryption; Downloadable computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Downloadable computer software for use in computer access control; Downloadable computer software for use in database management; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for wireless content delivery; Downloadable computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Downloadable computer software programs for spreadsheet management; Downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Downloadable computer software to automate data warehousing; Downloadable computer software to maintain and operate computer system; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Downloadable computer operating software; Downloadable industrial process control software; Recorded computer software and hardware for security, monitoring, troubleshooting and forensics for containers and microservices sold as a unit; Recorded computer software for database management; Recorded computer software for use in database management; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software platforms for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded database management software for security, monitoring, troubleshooting and forensics for containers and microservices;
SYSDIG INSPECT SYSDIG, INC. 21st Floor 135 Main Street San Francisco CA 94105 Computer software for security, monitoring, troubleshooting and forensics for containers and microservices that may be downloaded from a global computer network; Computer software platforms, downloadable, for security, monitoring, troubleshooting and forensics for containers and microservices; Computer software platforms, recorded, for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable software for ensuring the security of electronic mail; Downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable software for processing images, graphics and text; Downloadable cloud-based software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable cloud-computing software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks; Downloadable computer software for application and database integration; Downloadable computer software for authorizing access to data bases; Downloadable computer software for database management; Downloadable computer software for document management; Downloadable computer software for encryption; Downloadable computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Downloadable computer software for use in computer access control; Downloadable computer software for use in database management; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for wireless content delivery; Downloadable computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Downloadable computer software programs for spreadsheet management; Downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Downloadable computer software to automate data warehousing; Downloadable computer software to maintain and operate computer system; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Downloadable computer operating software; Downloadable database management software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable industrial process control software; Downloadable middleware for software application integration; Recorded software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software and hardware for security, monitoring, troubleshooting and forensics for containers and microservices sold as a unit; Recorded computer software for database management; Recorded computer software for use in database management; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software platforms for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded database management software for security, monitoring, troubleshooting and forensics for containers and microservices;INSPECT;
SYSDIG MONITOR SYSDIG, INC. 21st Floor 135 Main Street San Francisco CA 94105 Computer software for security, monitoring, troubleshooting and forensics for containers and microservices that may be downloaded from a global computer network; Computer software platforms, downloadable, for security, monitoring, troubleshooting and forensics for containers and microservices; Computer software platforms, recorded, for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable software for ensuring the security of electronic mail; Downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable software for processing images, graphics and text; Downloadable software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable cloud-computing software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks; Downloadable computer software for application and database integration; Downloadable computer software for authorizing access to data bases; Downloadable computer software for database management; Downloadable computer software for document management; Downloadable computer software for encryption; Downloadable computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Downloadable computer software for use in computer access control; Downloadable computer software for use in database management; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for wireless content delivery; Downloadable computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Downloadable computer software platforms for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable computer software programs for spreadsheet management; Downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Downloadable computer software to automate data warehousing; Downloadable computer software to maintain and operate computer system; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Downloadable computer operating software; Downloadable database management software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable industrial process control software; Downloadable middleware for software application integration; Recorded software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software and hardware for security, monitoring, troubleshooting and forensics for containers and microservices sold as a unit; Recorded computer software for database management; Recorded computer software for use in database management; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software platforms for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded database management software for security, monitoring, troubleshooting and forensics for containers and microservices;MONITOR;
SYSDIG SECURE SYSDIG, INC. 21st Floor 135 Main Street San Francisco CA 94105 Computer software for security, monitoring, troubleshooting and forensics for containers and microservices that may be downloaded from a global computer network; Computer software platforms, downloadable, for security, monitoring, troubleshooting and forensics for containers and microservices; Computer software platforms, recorded, for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable software for ensuring the security of electronic mail; Downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable software for processing images, graphics and text; Downloadable software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable cloud-based software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable cloud-computing software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks; Downloadable computer software for application and database integration; Downloadable computer software for authorizing access to data bases; Downloadable computer software for database management; Downloadable computer software for document management; Downloadable computer software for encryption; Downloadable computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Downloadable computer software for use in computer access control; Downloadable computer software for use in database management; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for wireless content delivery; Downloadable computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Downloadable computer software programs for spreadsheet management; Downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Downloadable computer software to automate data warehousing; Downloadable computer software to maintain and operate computer system; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Downloadable computer operating software; Downloadable database management software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable industrial process control software; Downloadable middleware for software application integration; Recorded software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software and hardware for security, monitoring, troubleshooting and forensics for containers and microservices sold as a unit; Recorded computer software for database management; Recorded computer software for use in database management; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software platforms for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded database management software for security, monitoring, troubleshooting and forensics for containers and microservices;SECURE;
THERE'S MORE TO BE SEEN PC Open Inc 23221 E. Knox Ave Liberty Lake WA 99019 Computer software for security and system health monitoring, namely, network video recording software for IP surveillance;
TOGGLE AT&T INTELLECTUAL PROPERTY II, L.P. 645 East Plumb Lane Reno NV 89502 Computer software for security, management, governance, data sharing, collaboration and access between enterprise systems and mobile devices, and for providing applications services to mobile devices;
TRUSONA Trusona, Inc. 8767 E. Via de Ventura, Suite 275 Scottsdale AZ 852583383 Computer software for security, encryption, digital signatures, authentication, fraud detection, and secure socket layer (SSL) certificate management across operating environments, multiple platforms and net protocols, websites and mobile devices; computer software for designing, customizing and personalizing financial cards, identification cards, smart cards, loyalty cards, transportation cards, secure credentials, passports, and delivery forms and carriers; computer software for real-time monitoring of network, fraud detection management, fraud detection analytics and reporting, and fraud intelligence; computer software for capturing electronic signatures; computer hardware;Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; providing in-person registration services in the nature of personal identification information; identification verification services, namely, providing authentication of personal identification information, user authentication services in e-commerce transactions, and fraud detection services for electronic funds transfer financial card and electronic check transactions via a global computer network; consultation services in the fields of authentication, identification verification, data theft and identity theft;The wording TRUSONA has no meaning in a foreign language.;Providing temporary use of nondownloadable software for security, encryption, digital signatures, authentication, fraud detection, and secure socket layer (SSL) certificate management across operating environments, multiple platforms and net protocols, websites and mobile devices; providing temporary use of nondownloadable software for designing, customizing and personalizing financial cards, identification cards, smart cards, loyalty cards, transportation cards, secure credentials, passports, and delivery forms and carriers; providing temporary use of nondownloadable software for real-time monitoring of network, fraud detection management, fraud detection analytics and reporting, and fraud intelligence; providing temporary use of nondownloadable software for capturing electronic signatures;
TRUSTEDVIDEO DIALOGIC CORPORATION Suite 100 6700 Cote-de-Liesse Road Saint-Laurent, Quebec H4T2B5 Canada Computer software for security, quality measurement and analysis, image analysis, authentication, tamper detection and analysis, and image inspection and investigation applications;TRUSTED VIDEO;
TRUSTNET MANAGER CERTES NETWORKS, INC. 300 Corporate Center Drive, Suite 140 Pittsburgh PA 15108 Computer software for security and encryption functions over computer and communications networks; Computer hardware for security and encryption functions over computer and communications networks;MANAGER;
VIDEO SENTINEL Innovation Institute, Inc. Road #156, Caguas West Industrial Park Bldg. 39 Caguas 00725 Puerto Rico Computer software for a security and surveillance system utilizing Lan, Wan and the global computer network;VIDEO;
WORMTRAQ MX Logic, Inc. Suite 400 9781 S. Meridian Blvd. Denver CO 80112 computer software for security, authentication and virus and spam detection, prevention and removal for electronic mail, instant messaging, internet-based voice mail and fax communications, and electronic files attached to such messages;WORM TRACK;
WYLDFIRE ISPI 1302 Farley Court South Arnold MD 21012 computer software for security;WILD FIRE;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.