COMPUTER SOFTWARE USED MAINTAIN

Brand Owner (click to sort) Address Description
C IMPERVA CAMOUFLAGE Imperva, Inc. 2400 Broadway St., Suite 220 Redwood City CA 94063 Computer software used to maintain security over or in computer networks, web applications and/or digital data; computer software, namely, a productivity tool software which uses proprietary code to select, mask, and scramble data from a database;CAMOUFLAGE IMPERVA CAMOUFLAGE;Color is not claimed as a feature of the mark.;
CEMETERY 2000 Municipal Associates Inc. 723 Conservation Drive Waterloo, Ontario N2J 324 Canada computer software used to maintain cemetery records, and to provide reporting, inquiry, and accounts receivable information to municipal governments and cemetery administrators;CEMETERY;
CLINICALPLUS+ Caregivers Inc. 6323 Seventh Avenue Brooklyn NY 112204711 computer software used to maintain clinical home care records and plans, and user manuals sold as a unit;
COFENSE COFENSE INC. 1608 Village Market Blvd., SE, #B-200 Leesburg VA 20175 computer software used to maintain security over or in computer networks, web applications and/or digital data; computer software for providing network, Internet, and computer security; computer software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; computer software for emulating attack methods used by computer hackers; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; computer software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; computer software for computer security risk and threat analysis, assessment, and management; computer software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management;CO FENCE;software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; application service provider featuring application programming interface (API) software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; online computer services, namely, scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; software as a service (SaaS), namely, providing temporary use of non-downloadable software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management;
COFENSE VALIDATOR COFENSE INC. 1608 Village Market Blvd., SE, #B-200 Leesburg VA 20175 computer software used to maintain security over or in computer networks, web applications and/or digital data; computer software for providing network, Internet, and computer security; computer software for emulating attack methods used by computer hackers over communications networks; computer software for computer security risk and threat analysis, assessment, and management; computer software for use in assessing deliverability of phishing attacks and other malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs through message gateways; computer software for emulating attack methods used by threat actors, and measuring the metrics and performance of software intended to prevent such attack methods;CO DEFENSE VALIDATOR;software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers over communications networks; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in assessing deliverability of phishing attacks and other malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs through message gateways; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by threat actors, and measuring the metrics and performance of software intended to prevent such attack methods;
COFENSE VISION COFENSE INC. 1608 Village Market Blvd., SE, #B-200 Leesburg VA 20175 computer software used to maintain security over or in computer networks, web applications and/or digital data; computer software for providing network, Internet, and computer security; computer software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; computer software for emulating attack methods used by computer hackers; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; computer software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; computer software for computer security risk and threat analysis, assessment, and management; computer software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; computer software for allowing search for, identification, and removal of specified emails;software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; application service provider featuring application programming interface (API) software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; online computer services, namely, scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; software as a service (SaaS), namely, providing temporary use of non-downloadable software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for allowing search for, identification, and removal of specified emails;
COUNTERBREACH Imperva, Inc. 2400 Broadway St., Suite 220 Redwood City CA 94063 Computer software used to maintain security over or in computer networks, web applications and/or digital data;COUNTER BREACH;Technical consulting and computer programming services to maintain security over computer networks, web applications and/or digital data; software as a service, namely, providing temporary use of non-downloadable computer software used to maintain security over or in computer networks, web applications and/or digital data;
DMS Transaction Tracking Technologies, Inc 209 10th Avenue South, Suite 536 Nashville TN 37203 Computer software used to maintain a database of detailed information concerning transaction specific money transmittal documents, namely, cashier's checks, gift certificates, money orders, and loan disbursement checks and the ability to track such issued documents from generation to presentment;
IMPERVA Imperva, Inc. 2400 Broadway St., Suite 220 Redwood City CA 94063 computer software used to maintain security over or in computer networks, web applications and/or digital data;
NOISE REDUCTION COFENSE INC. 1608 Village Market Blvd., SE, #B-200 Leesburg VA 20175 computer software used to maintain security over or in computer networks, web applications and/or digital data; computer software for providing network, Internet, and computer security; computer software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; computer software for emulating attack methods used by computer hackers; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; computer software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; computer software for computer security risk and threat analysis, assessment, and management; computer software for allowing search for, identification, and removal of specified emails;software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for allowing search for, identification, and removal of specified emails;
PHISHING MITIGATION ASSISTANT COFENSE INC. 1608 Village Market Blvd., SE, #B-200 Leesburg VA 20175 computer software used to maintain security over or in computer networks, web applications and/or digital data; computer software for providing network, Internet, and computer security; computer software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; computer software for emulating attack methods used by computer hackers; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; computer software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; computer software for computer security risk and threat analysis, assessment, and management; computer software for allowing search for, identification, and removal of specified emails;software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for allowing search for, identification, and removal of specified emails;
SECURESPHERE Imperva, Inc. 2400 Broadway St., Suite 220 Redwood City CA 94063 computer software used to maintain security over computer networks, web applications and digital data;SECURE SPHERE;
SECURESPHERE Webcohort Inc. 428 University Avenue Palo Alto CA 94301 computer software used to maintain security over computer networks, web applications and digital data;SECURE SPHERE;
WEB SITE GARAGE NETSCAPECOMMUNICATIONS CORPORATION 501 EAST MIDDLEFIELD ROAD MOUNTAIN VIEW CA 94043 computer software used to maintain web sites and used to track and measure information regarding web site visits and visitors;WEB SIGHT GARAGE;WEB SITE;
WEB SITE GARAGE AtWeb, Inc. 686 West Maude Avenue, Suite 103 Sunnyvale CA 94043 computer software used to maintain web sites and used to track and measure information regarding web site visits and visitors;WEB SIGHT GARAGE;WEB SITE;
WHO ELSE COFENSE INC. 1608 Village Market Blvd., SE, #B-200 Leesburg VA 20175 computer software used to maintain security over or in computer networks, web applications and/or digital data; computer software for providing network, Internet, and computer security; computer software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; computer software for emulating attack methods used by computer hackers; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; computer software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; computer software for computer security risk and threat analysis, assessment, and management; computer software for allowing search for, identification, and removal of specified emails;software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for allowing search for, identification, and removal of specified emails;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.