Brands and Their Owners
Brand | Owner (click to sort) | Address | Description |
---|---|---|---|
24H-365D ANTIVIRUS INSURANCE | Panda Software, S.L. | Buenos Aires, 12 48001 Bilbao Spain | Computer software used to detect and prevent computer viruses;Installation, maintenance and repair services for computer software;24H 365D ANT VIRUS IN SURANCE;ANTIVIRUS; |
BRAVE | RISKSENSE, INC. | 4200 Osuna Rd. NE Suite 3-300 Albuquerque NM 87109 | Computer software used to detect malicious content over global computer networks;In the statement, line 1 CAANES, LLC should be deleted, and, COMPUTATIONAL ANALYSIS AND NETWORK ENTERPRISE SOLUTIONS, LLC should be inserted.; |
BREAKWATCH | NYFIX, INC. | Stamford Harbor Park 333 Ludlow Street Stamford CT 06902 | COMPUTER SOFTWARE USED TO DETECT INACCURACIES IN EQUITY ORDER PRICES FOR THE EQUITY MARKET PLACE;FINANCIAL TRADING SERVICES FOR OTHERS, NAMELY, UTILIZING HARDWARE AND SOFTWARE TO DETECT INADEQUACIES IN EQUITY ORDER PRICES FOR THE EQUITY MARKETPLACE;BREAK WATCH; |
CAD-BREAST | MEDIAN Technologies | Les Deux Arcs Sophia Antipolis 1800 Route des Crêtes 06560 VALBONNE - France | COMPUTER SOFTWARE USED TO DETECT, CHARACTERIZE, CLASSIFY, DISPLAY, AND COMPARE POTENTIAL ABNORMALITIES IN RADIOLOGICAL IMAGES TO ASSIST RADIOLOGISTS AND CLINICIANS IN THE DETECTION AND DIAGNOSIS OF BREAST CANCER AND OTHER BREAST ABNORMALITIES; |
CAD-COLON | MEDIAN Technologies | Les Deux Arcs Sophia Antipolis 1800 Route des Crêtes 06560 VALBONNE - France | COMPUTER SOFTWARE USED TO DETECT, CHARACTERIZE, CLASSIFY, DISPLAY, AND COMPARE POTENTIAL ABNORMALITIES IN ABDOMEN RADIOLOGICAL IMAGES TO ASSIST RADIOLOGISTS AND CLINICIANS IN THE DETECTION AND DIAGNOSIS OF COLORECTAL CANCER AND OTHER COLORECTAL ABNORMALITIES; |
|
|||
CAD-LUNG | MEDIAN Technologies | Les Deux Arcs Sophia Antipolis 1800 Route des Crêtes 06560 VALBONNE - France | COMPUTER SOFTWARE USED TO DETECT, CHARACTERIZE, CLASSIFY, DISPLAY, AND COMPARE POTENTIAL ABNORMALITIES IN CHEST RADIOLOGICAL IMAGES TO ASSIST RADIOLOGISTS AND CLINICIANS IN THE DETECTION AND DIAGNOSIS OF LUNG CANCER AND OTHER LUNG ABNORMALITIES; |
CPMS | HPR INC. | 245 FIRST STREET CAMBRIDGE MA 02142 | computer software used to detect and correct billing errors and to identify inappropriate or unnecessary care and in other ways to review payment of medically-related charges together with user manuals all sold as a unit; |
FAULTMANAGER | Go Ahead Software Inc. | 10900 NE 8th St Suite 750 Bellevue WA 980041455 | computer software used to detect, diagnose, and correct faults found in embedded systems and peripherals;FAULT MANAGER; |
INETCO BULLZAI | Inetco Systems Limited | 4664 Lougheed Highway, Suite 295 Burnaby, BC V5C5T5 Canada | Computer software used to detect and prevent payment fraud;Managing of computer software used to detect and prevent payment fraud;Fraud detection and prevention services in the field of banking;Software as a services (SAAS) services to detect and prevent payment fraud; cloud hosting provider services; |
RIDDING THE PLANET OF VIRUSES | Panda Software, S.L. | Buenos Aires, 12 48001 Bilbao Spain | Computer software used to detect and prevent viruses; |
SCPD | NEC Personal Products, Ltd. | 11-1, Osaki 1-Chome, Shinagawa-Ku Tokyo Japan | Computer software used to detect and protect against unauthorized access, modification, transfer or copying of digital media; computer software to identify and validate digital media; digital rights management software; computer software providing access control to digital media, defining and authenticating users and/or user computer hardware; computer hardware and software for copy protection security modification, anti-piracy rights management and electronic license management of audio, video and digital information; computers; integrated circuit chips which prevents illegal copying of digitized data; apparatus for the recording, transmission or reproduction of sound or images, namely, video cameras, photographic cameras, televisions, digital audio cassette players and recorders, compact disc players and recorders, video cassette players and recorders, video disc players and recorders, MD players and recorders, DVD players and recorders, headphones, earphones, microphones, audio speakers, radios and telephones, mobile telephones; facsimile machines, personal digital assistants (PDAs); |
SECURIFY | SECURIFY, INC. | Suite 200 20425 Stevens Creek Boulevard Cupertino CA 95014 | Computer software used to detect and respond to threats to computer network security; computer software used to manage, maintain and monitor computer network security, computer network management and computer network maintenance; computer software used to develop and analyze policies used for computer network security, management and maintenance and user manuals provided in connection therewith; |
SECURVANTAGE | SECURIFY, INC. | Suite 200 20425 Stevens Creek Boulevard Cupertino CA 95014 | Computer software used to detect and respond to threats to computer network security; computer software used to manage, maintain and monitor computer network security, computer network management and computer network maintenance; computer software used to develop and analyze policies used for computer network security, management and maintenance and user manuals provided in connection therewith;Maintenance of computer software for computer network management and security, computer network policies, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local computer networks; technical support services, namely, troubleshooting of computer hardware and software problems services in the fields of computer network management, computer network monitoring, computer network maintenance, and in the field of policies used for computer network security, management and maintenance and in the fields of computer software used to detect and respond to threats to computer network security, computer software products used to manage, maintain and monitor computer network security, computer network management and computer network maintenance, computer software products used to develop and analyze policies used for computer network security, management and maintenance and policies used for computer network security, maintenance and management; consulting services in the fields of computer network management, computer network monitoring, computer network maintenance, and in the field of policies used for computer network security, management and maintenance; consulting and development services in the fields of computer software used to detect and respond to threats to computer network security, computer software products used to manage, maintain and monitor computer network security, computer network management and computer network maintenance, computer software products used to develop and analyze policies used for computer network security, management and maintenance and policies used for computer network security, maintenance and management; security services, namely, computer security consulting, testing and monitoring of hardware and software in the fields of computer network management, development, security and maintenance, policies for computer network security, management and maintenance, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local and global computer networks; and design of computer software for others; |
SECURVANTAGE STUDIO | SECURIFY, INC. | Suite 200 20425 Stevens Creek Boulevard Cupertino CA 95014 | Computer software used to detect and respond to threats to computer network security; computer software used to manage, maintain and monitor computer network security, computer network management and computer network maintenance; computer software used to develop and analyze policies used for computer network security, management and maintenance and user manuals provided in connection therewith;Maintenance of computer hardware for computer network management and security, computer network policies, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local computer networks;Security services, namely, computer security consulting, and monitoring of hardware and software in the fields of computer network management, development, security and maintenance, policies for computer network security, management and maintenance, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local and global computer networks;Maintenance of computer software for computer network management and security, computer network policies, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local computer networks; technical support services, namely, troubleshooting of computer hardware and software problems services in the fields of computer network management, computer network monitoring, computer network maintenance, and in the field of policies used for computer network security, management and maintenance and in the fields of computer software used to detect and respond to threats to computer network security, computer software products used to manage, maintain and monitor computer network security, computer software products used to manage, maintain and monitor computer network security, computer network management and computer network maintenance, computer software products used to develop and analyze policies used for computer network security, management and maintenance and policies for computer network security, maintenance and management; consulting services in the fields of computer network management, computer network monitoring, computer network maintenance, and in the field of policies used for computer network security, management and maintenance; consulting and development services in the fields of computer software used to detect and respond to threats to computer network security, computer software products used to manage, maintain and monitor computer network security, computer network management and computer network maintenance, computer software products used to develop and analyze policies used for computer network security, management and maintenance and policies used for computer network security, maintenance and management; and design of computer software for others; |
STSC | NEC Personal Products, Ltd. | 11-1, Osaki 1-Chome, Shinagawa-Ku Tokyo Japan | Computer software used to detect and protect against unauthorized access, modification, transfer or copying of digital media; computer software to identify and validate digital media; digital rights management software; computer software providing access control to digital media, defining and authenticating users and/or user computer hardware; computer hardware and software for copy protection security modification, anti-piracy rights management and electronic license management of audio, video and digital information; computers; IC chips; integrated circuit chips which prevents illegal copying of digitized data; apparatus for the recording, transmission or reproduction of sound or images, namely, video cameras, photographic cameras, televisions, digital audio cassette players and recorders, compact disc players and recorders, video cassette players and recorders, video disc players and recorders, MD players and recorders, DVD players and recorders, headphones, earphones, microphones, audio speakers, radios and telephones, mobile telephones; facsimile machines, personal digital assistants (PDAs); |
TIPOFF | RECOURSE TECHNOLOGIES, INC. | 2450 El Camino Real, Suite 100 Palo Alto CA 94306 | computer software used to detect, locate, capture and prosecute hackers into computer systems;TIP OFF; |
V | Visual Computing Corporation | 615 SW 6th Ave, 2nd Floor Portland OR 97205 | Computer software used to detect whether computer data has been improperly modified;V; |
VISUAL COMPUTING CORPORATION | Visual Computing Corporation | 615 SW 6th Ave, 2nd Floor Portland OR 97205 | computer software used to detect whether computer data has been improperly modified;COMPUTING CORPORATION; |
Where the owner name is not linked, that owner no longer owns the brand |