CYBER SECURITY THREAT INTELLIGENCE SOFTWARE

Brand Owner (click to sort) Address Description
AUTOMATED SECURITY VALIDATION Prevailion, Inc. Suite 1325 9950 Woodloch Forest The Woodlands TX 77380 Cyber security threat intelligence software; cyber security threat intelligence software, namely, downloadable software for testing of client networks using live replicated malware and other software intended to open unauthorized egress points from the networks and providing detailed telemetry on needed security control adjustments;
CONTINUOUS SECURITY VALIDATION Prevailion, Inc. Suite 1325 9950 Woodloch Forest The Woodlands TX 77380 Cyber security threat intelligence software; cyber security threat intelligence software, namely, downloadable software for testing of client networks using live replicated malware and other software intended to open unauthorized egress points from the networks and providing detailed telemetry on needed security control adjustments;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method of active detection of at least one threat to the homeland security. Each such threat is either hidden inside at least one cargo container before transit, or is placed inside at least one cargo container while in transit; each such threat while interacting with its surrounding generates a unique threat signature. The method comprises the following steps: (A) substantially continuously probing each cargo container; (B) detecting at least one threat signature; (C) processing each detected threat signature to determine a likelihood of at least one threat to become a threat to the homeland security; (D) identifying at least one container that includes such threat to the homeland security; and (E) eliminating such threat to the homeland security.