DOWNLOADABLE COMPUTER SECURITY SOFTWARE

Brand Owner (click to sort) Address Description
AD-SHIELD Adshield, Inc. 302ho, 3F, 125 Wangsimni-ro, Seongdong-gu Seoul 04766 Republic of Korea downloadable computer security software; downloadable and recorded computer software for encryption; downloadable and recorded computer software to maintain and operate computer systems; downloadable and recorded computer programs for network management; downloadable and recorded database management software; network servers; computer database servers; downloadable and recorded software for disabling ad blocking;advertising; online advertising and marketing services; intermediary services relating to advertising; advertising and marketing; advertising agency services; mediation of advertising; advertising on the internet for others; advertising for others on the internet; publicity agency services; advertising planning; compilation, production and disseminating of advertising matter; advertising consultation; research services relating to advertising and marketing; analysis of advertising response and market research; preparing and placing advertisements for others; rental of advertisement space and advertising material; provision of advertising space; rental of billboards; rental of advertising space on-line; dissemination of advertising for others via the internet;
AGNOSTIQ Agnostiq Inc 180 Dundas St W, Suite 2500 Toronto, ON M5G1Z8 Canada Downloadable computer security software;
APEX ONE Trend Micro Kabushiki Kaisha Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan downloadable computer security software; downloadable computer antivirus software; downloadable anti-spyware, anti-spam, and anti-fraud computer software; downloadable anti-malware and anti-ransomware software; downloadable firewall software; downloadable malicious code and malicious content screening software; downloadable data loss prevention (DLP) software; downloadable data encryption software; downloadable computer utility software; downloadable computer software for detecting and reporting malware, trojans, worms, spyware, and ransomware; downloadable computer software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; downloadable computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; downloadable computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers;software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring computer antivirus software; providing on-line non-downloadable computer antivirus software; software as a service (SAAS) services featuring anti-spyware, anti-spam, and anti-fraud computer software; providing on-line non-downloadable anti-spyware, anti-spam, and anti-fraud software; software as a service (SAAS) services featuring anti-malware and anti-ransomware software; providing on-line non-downloadable anti-malware and anti-ransomware software; software as a service (SAAS) services featuring firewall software; providing on-line non-downloadable firewall software; software as a service (SAAS) services featuring malicious code and malicious content screening software; providing on-line non-downloadable malicious code and malicious content screening software; software as a service (SAAS) services featuring data loss prevention (DLP) software; providing on-line non-downloadable data loss prevention (DLP) software; software as a service (SAAS) services featuring data encryption software; providing on-line non-downloadable data encryption software; software as a service (SAAS) services featuring computer utility software; providing on-line non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for detecting and reporting malware, trojans, worms, spyware, and ransomware; providing on-line non-downloadable software for detecting and reporting malware, trojans, worms, spyware, and ransomware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; providing on-line non-downloadable software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; providing on-line non-downloadable software for detecting, analyzing, reporting and sharing computer, data and network security threats; software as a service (SAAS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; providing on-line non-downloadable software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers;
BIDIKEY ALTER CORE, S.L. C/ Luis de Salazar, 12 2°C E-28002 Madrid Spain Downloadable computer security software, namely, encryption software; Downloadable computer software for authentication, encryption and identification in financial transactions; Downloadable computer software to insure the security of businesses and computer networks and to provide security and access control, namely, software for use in the encryption of files, software for use in the encryption and decryption of data, software for use in authentication of data; Downloadable computer software for financial transactions on computer networks, namely, software for trading securities; Prerecorded computer software recorded on data media for use in database management, in electronic secure financial transactions, namely, software used for electronic signature of documents, use for certification, authentication and cryptology of digital files and data; Computers; Downloadable computer software for use in chips, integrated circuits, personal electronic devices and microcircuits for memory cards all for use in certification, authentication, cryptology and time-stamping; Computer software particularly in connection with finance, telecommunications, identity, access control, payment, security, electronic signature and electronic forms and information technologies all for use in financial transactions, namely, software for use in personal authentication in online and onsite environments;
BINARYKNIGHT ARRIS ENTERPRISES 1100 CommScope Place SE Hickory NC 28602 Downloadable computer security software to protect software's intellectual property, business logic and data against reverse-engineering, debugging and tampering attacks;BINARY KNIGHT;Cloud-based, software-as-a-service (SAAS) for security protection of software's intellectual property, business logic and data against reverse-engineering, debugging and tampering attacks;
CIPHERKNIGHT ARRIS ENTERPRISES 1100 CommScope Place SE Hickory NC 28602 Downloadable computer security software to protect security keys and cryptographic algorithms;CIPHER KNIGHT;
CRYPSIS Crypsis Group Holdings 1410 Spring Hill Road McLean VA 22102 Downloadable computer security software for endpoint detection and response and computer forensics; Downloadable computer security software for use in detecting, identifying, analyzing, and reporting on threats to, and security vulnerabilities in, computers, computer networks, and endpoints; Downloadable endpoint detection and response software;Expert witness services in legal matters in the field of cybersecurity, data breach and network forensics; Litigation support services;Cybersecurity risk management, governance, and operations consultancy services; Cybersecurity risk and resilience management services; Computer and computer network consulting services in the field of cybersecurity, namely, cybersecurity assessment, penetration testing, incident response and forensics, cybersecurity policy and procedure documentation; Data breach response services, namely, threat assessment and simulation, vulnerability analysis and mitigation, and emergency response; Forensic data recovery services; Managed security services in the fields of computer security, Internet security, data security, and cybersecurity; Software as a service featuring software for endpoint detection and response and computer forensics; Software as a service featuring software for use in detecting, identifying, analyzing, and reporting on threats to, and security vulnerabilities in, computers, computer networks, and endpoints; Security operations center services, namely, remote services for computer and computer network threat detection, monitoring, and response;
CYBER 2.0 Cyber 2.0 (2015) LTD. 19 Agmon St. Yavne Israel Downloadable computer security software, namely, computer security software implementing scrambling of ports to facilitate secure communications over a network; software for creating, facilitating, and managing remote access to and communication with local area networks and global networks, namely, software implementing scrambling of ports to facilitate secure communications over a network; computer software for controlling and managing access server applications, namely, software for managing credentials of device in a computer network implementing port scrambling; virtual private network (VPN) operating software, namely, operating software implementing scrambling of ports to facilitate the virtual private network; local area network (LAN) operating software, namely, operating software implementing scrambling of ports within the local area network; computer software for encryption, namely, computer software for encryption used to encrypt communications within a network implementing port scrambling; computer firewall software, namely, computer software for implementing a firewall using scrambling of ports;CYBER TWO.0;2.0;Computer security consultancy; diagnosis of computer software security problems, namely, diagnosis of security problems using port scrambling; encryption of data, namely, data encryption of data communicated over a network implementing port scrambling; consultancy services relating to the design, development and secure use of computer hardware and software; providing temporary use of on-line applications and software tools, namely, providing temporary use of tools and applications for monitoring and managing a network implementing port scrambling; server administration, namely, administration of a server distributing certificates used by software agents for selectively implementing port scrambling; computer security services for protection against illegal network access, namely, provisioning of software agents in computer networks for implementing selective port scrambling;
CYBERHAVEN LIGHTBEAM CYBERHAVEN, INC. 745 Atlantic Avenue Boston MA 02211 Downloadable computer security software; Downloadable computer software for automatically monitoring and protecting enterprise, user, and individual data, reducing privacy and data security risks, implementing enterprise security and privacy policies, detecting and preventing data exfiltration, automating data flow mapping, providing data analytics and query capabilities for infrastructure security, data security and privacy information;CYBER HAVEN LIGHT BEAM;Software as a service (SAAS) services featuring software for automatically monitoring and protecting enterprise, user, and individual data, reducing privacy and data security risks, implementing enterprise security and privacy policies, detecting and preventing data exfiltration, automating data flow mapping, providing data analytics and query capabilities for infrastructure security, data security and privacy information; Providing temporary use of non-downloadable computer security software for automatically monitoring and protecting enterprise, user, and individual data, reducing privacy and data security risks, implementing enterprise security and privacy policies, detecting and preventing data exfiltration, automating data flow mapping, providing data analytics and query capabilities for infrastructure security, data security and privacy information; Computer security consultancy services for automatically monitoring and protecting enterprise, user, and individual data, reducing privacy and data security risks, implementing enterprise security and privacy policies, detecting and preventing data exfiltration, automating data flow mapping, providing data analytics and query capabilities for infrastructure security, data security and privacy information;
GNOSIS SAFE Gnosis Limited World Trade Center, 6 Bayside Road Gibraltar GX11 1AA United Kingdom Downloadable computer security software; interactive computer software; computer software; communication software for connecting global computer networks; computer software applications; computer software for business purposes; computer operating system software; computer software for mobile phones; computer software to maintain and operate computer systems; computer software for accessing computer networks; computer application software; computer software for encryption; computer software for accessing, browsing and searching online databases; computer software downloadable from global computer information networks; cryptography software; computer software development tools; computer software downloaded from the Internet; computer software supplied on the Internet; computer software applications, downloadable; simulation software for use in digital computers; downloadable computer software; computer application software for use in implementing the Internet of things [IoT]; computer software platforms; software for tablet computers; computer operating software; computer software to enable browsing on global computer networks; educational computer software;Telecommunications access services; communication by electronic means; voice and data transmission services; telecommunications consultancy; telecommunication of information (including web pages); communication of information by electronic means; telecommunication services; data transmission for others; providing access to telecommunication networks; communications services; data communication services accessible by password; information, consultancy and advisory services relating to telecommunications; transmission of information for domestic purposes; transmission of information via national and international networks; transmission of encrypted communications; cable transmission of sounds, images, signals and data; data communication by electronic means; electronic communication services for preparing financial information; digital transmission services; electronic transmission of messages and data; automatic transfer of digital data using telecommunications channels; transmission of messages, data and content via the Internet and other communications networks; electronic network communications; information services relating to electronic communication networks; secure transmission of data, sound or images; communications services for the exchange of data in electronic form; network transmission of sounds, images, signals and data; electronic and telecommunication transmission services; communications via multinational telecommunication networks; consulting services in the field of electronic communications; digital communications services; data transmission; providing access to electronic communications networks and electronic databases; information transmission services via digital networks; digital network telecommunications services; computer communication and Internet access; telephone and mobile telephone services; communication services for the transmission of information; communication services provided electronically; transmission of information on optical telecommunication networks; digital transmission of data via the Internet; transmission of information for business purposes; communication services for the electronic transmission of data; electronic communication services for financial institutions; transmission of coded messages and images; data transmission and reception services via telecommunication means; consultancy services relating to data communications;Auction services; arranging and conducting of auctions and reverse auctions via mobile telephones;Computer system design; research in the field of communications technology; creating, designing and maintaining web sites; research to develop new products; testing, analysis and evaluation of the goods of others for the purpose of certification; analysis and evaluation of product design; design and development of new products; database design and development; design of mathematical models; product research and development services; scientific technological services; IT programming services; computer design and programming services; research relating to data processing; design of data storage systems; creation of Internet web sites; research relating to the computerised automation of administrative processes; testing services for the certification of quality or standards; IT security services in the nature of protection and recovery of computer data; research relating to the computerised automation of technical processes; advisory and information services relating to the design and development of computer peripherals; planning, design, development and maintenance of online websites for third parties; scientific research and analysis; consultancy services for designing information systems; scientific and industrial research; design of computer databases; scientific research conducted using databases; preparation of computer programs for data processing; Internet security consultancy; design and development of electronic data security systems; technical research; creation of computing platforms for third parties; creating of home pages for computer networks; research in the field of data processing technology; development of systems for the transmission of data; computer design services; research and development of new products; providing quality assurance services; design and development of new technology for others; quality control relating to computer software; providing on-line information in the field of technological research from a computer database or the Internet; scientific and technological design; design of communication systems; development and testing of computing methods, algorithms and software; testing of computer programs; providing user authentication services using biometric hardware and software technology for e-commerce transactions; computer system design and development; research relating to security; providing science technology information; maintenance of data processing software; product quality control testing; quality control relating to computer systems; development of computer systems; computer research services; development, design and updating of home pages; advisory services relating to computer systems design; IT project management; design and development of systems for data input, output, processing, display and storage; providing information about the design and development of computer software, systems and networks; design and development of data display systems; development of systems for the processing of data; provision of information relating to scientific research; technical writing; consumer product safety testing and consultation; providing information in the field of product design; IT consultancy, advisory and information services; design of information systems relating to finance; mathematical research services; design and development of consumer products; testing, analysis and evaluation of the services of others for the purpose of certification; analysis and evaluation of product development; integration of computer systems and networks; computer services for the analysis of data; product research; design services; technological consultancy; design and testing of new products; design services relating to computer hardware and to computer programmes; providing temporary use of on-line non-downloadable software development tools; constructing an Internet platform for electronic commerce; design and development of data storage systems; scientific testing services; design, creation and programming of web pages; design and development of electronic database software; design services for data processing systems; product development; data duplication and conversion services, data coding services; product design; design of home pages; design and testing for new product development; administration of user rights in computer networks; research in the field of information technology; design and development of data processing apparatus; product quality testing; provision of information relating to technological research; design and development of data entry systems; providing information in the field of product development; design of homepages and websites; hosting services, software as a service, and rental of software; design and development of data processing systems; testing, analysis and evaluation of the goods and services of others for the purpose of certification; development of computer based networks; product quality evaluation; software development, programming and implementation; monitoring of computer systems by remote access; technical consultancy services relating to computer programming; computer network services; telecommunications technology consultancy; research relating to computers; design services relating to data processing test tools; development of systems for the storage of data; creating and maintaining websites for cellular phones; quality testing of products for certification purposes; consultancy services relating to quality control; designing and developing webpages on the Internet; research relating to technology;
GUARDRAILS GuardRails PTe, Ltd. 531A Upper Cross Street #04-95 Singapore 051531 Singapore Downloadable computer security software for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects;Software as a service (SaaS) services featuring software for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Software as a service (SaaS) featuring software platforms for artificial intelligence for the use of analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Providing online, non-downloadable software for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Providing temporary use of online, non-downloadable software for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application related security aspects; Rental of Internet security computer programs; Software as a Service (SaaS) services featuring software for machine learning, deep learning and deep neural networks for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Software as a Service (SaaS) services featuring software for deep neural networks for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Software as a Service (SaaS) services featuring software for deep learning for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Software as a Service (SaaS) services featuring software for machine learning for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; computer security services for protecting data and information from unauthorized access; Consultancy and information services relating to the design, programming, and maintenance of computer software for others; Quality control testing for others; Conducting of quality control tests for others; Scientific testing services in the field of software, application and network security; Technical testing services in the field of software, application and network security; Quality control for others relating to computer software; Quality control for others relating to computer systems; Advisory services relating to the use of computer software; advisory services relating to computer programming; software development in the field of software, application and network security; preparation of data processing computer programmes; installation and maintenance of computer programs; software engineering; technical consultancy services relating to computer programming; updating of computer software relating to computer security and prevention of computer risks; testing of computer software; testing of computer programs; maintenance of computer software relating to computer security and prevention of computer risks; Design and development of Internet security computer programs; Computer programming of Internet security computer programs; Development of testing methods for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Preparation of data processing computer programs; Software development in the field of software, application and network security; Cloud computing featuring software for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Provision of online non-downloadable computer security risk management computer programs;
GUARDRAILS Mag. C. Dominik Niedersüß, Rechtsanwalt pA Polak & Partner Rechtsanwälte GmbH Am Getreidemarkt 1 A-1060 Wien Austria Downloadable computer security software for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects;Software as a service (SaaS) services featuring software for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Software as a service (SaaS) featuring software platforms for artificial intelligence for the use of analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Providing online, non-downloadable software for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Providing temporary use of online, non-downloadable software for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application related security aspects; Rental of Internet security computer programs; Software as a Service (SaaS) services featuring software for machine learning, deep learning and deep neural networks for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Software as a Service (SaaS) services featuring software for deep neural networks for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Software as a Service (SaaS) services featuring software for deep learning for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Software as a Service (SaaS) services featuring software for machine learning for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; computer security services for protecting data and information from unauthorized access; Consultancy and information services relating to the design, programming, and maintenance of computer software for others; Quality control testing for others; Conducting of quality control tests for others; Scientific testing services in the field of software, application and network security; Technical testing services in the field of software, application and network security; Quality control for others relating to computer software; Quality control for others relating to computer systems; Advisory services relating to the use of computer software; advisory services relating to computer programming; software development in the field of software, application and network security; preparation of data processing computer programmes; installation and maintenance of computer programs; software engineering; technical consultancy services relating to computer programming; updating of computer software relating to computer security and prevention of computer risks; testing of computer software; testing of computer programs; maintenance of computer software relating to computer security and prevention of computer risks; Design and development of Internet security computer programs; Computer programming of Internet security computer programs; Development of testing methods for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Preparation of data processing computer programs; Software development in the field of software, application and network security; Cloud computing featuring software for analysis of source code, applications at runtime, software libraries, containers, infrastructure, cloud platforms and other application and network related security aspects; Provision of online non-downloadable computer security risk management computer programs;
HADRON Crypsis Group Holdings 1410 Spring Hill Road McLean VA 22102 Downloadable computer security software for endpoint detection and response and computer forensics; downloadable computer cybersecurity software for endpoint detection and response and computer forensics; downloadable computer security software for use in detecting, identifying, analyzing, and reporting on threats to, and security vulnerabilities in, computers, computer networks, and endpoints; downloadable endpoint detection and response software;HAD RON;Software as a service featuring software for endpoint detection and response and computer forensics; software as a service featuring software for use in detecting, identifying, analyzing, and reporting on threats to, and security vulnerabilities in, computers, computer networks, and endpoints; computer services, namely, information technology (IT) managed services in the nature of providing remote and on-site management of the information technology systems of others; computer forensics services; providing temporary use of online non-downloadable computer cybersecurity software for endpoint detection and response and computer forensics; providing temporary use of online non-downloadable computer security software for use in detecting, identifying, analyzing, and reporting on threats to, and security vulnerabilities in, computers, computer networks, and endpoints; providing temporary use of online non-downloadable endpoint detection and response software;
IDENTITY IMPACT ASSESSMENT Polyrize Security Ltd. HaArba'a 28 Tel Aviv 6473927 Israel Downloadable computer security software; downloadable computer software for protecting against computer viruses in the field of computer security; downloadable cybersecurity platform in the field of scanning and threat preventing of computers cloud infrastructure to access information security vulnerability;Providing temporary use of non-downloadable computer security software; providing temporary use of non-downloadable software for protecting against computer viruses in the field of computer security; providing temporary use of non-downloadable cybersecurity platform in the field of scanning and threat preventing of computers cloud infrastructure to assess information security vulnerability; monitoring of cloud systems for detecting unauthorized access or data breach; cloud computing forensic services; computer forensic services in the field of cyber security; computer services, namely, scanning, detecting, analyzing and eliminating of malware, trojans and insider threat to access unauthorized data and programs on cloud services from any device or location that also feature computer and network cybersecurity incident response services; Computer virus protection services, namely, hunting cyber threats in the nature of computer viruses; development of security systems and contingency planning for information systems; maintenance of computer software relating to computer security and prevention of computer risks; technical support services, namely, troubleshooting in the nature of diagnosing computer network misuse and abuse of access;
IDENTITY IMPACT MODEL Polyrize Security Ltd. HaArba'a 28 Tel Aviv 6473927 Israel Downloadable computer security software; downloadable computer software for protecting against computer viruses in the field of computer security; downloadable cybersecurity platform in the field of scanning and threat preventing of computers cloud infrastructure to access information security vulnerability;Providing temporary use of non-downloadable computer security software; providing temporary use of non-downloadable software for protecting against computer viruses in the field of computer security; providing temporary use of non-downloadable cybersecurity platform in the field of scanning and threat preventing of computers cloud infrastructure to assess information security vulnerability; monitoring of cloud systems for detecting unauthorized access or data breach; cloud computing forensic services; computer forensic services in the field of cyber security; computer services, namely, scanning, detecting, analyzing and eliminating of malware, trojans and insider threat to access unauthorized data and programs on cloud services from any device or location that also feature computer and network cybersecurity incident response services; Computer virus protection services, namely, hunting cyber threats in the nature of computer viruses; development of security systems and contingency planning for information systems; maintenance of computer software relating to computer security and prevention of computer risks; technical support services, namely, troubleshooting in the nature of diagnosing computer network misuse and abuse of access;
INTENT CLUSTERING Netacea Limited 4th Floor Maybrook House, Blackfriars St Manchester M32EG United Kingdom Downloadable computer security software; downloadable artificial intelligence software; downloadable computer software for use as an application programming interface (API);Computer security software as a service in the nature of providing temporary use of non-downloadable computer anti-malware software; software as a service featuring software for identifying and managing bots and malicious software; software as a service featuring software for monitoring internet traffic and websites to identify and manage bots and malicious software; computer security in the nature of computer security threat analysis for protecting data;
INTENT PATHWAYS Netacea Limited 4th Floor Maybrook House, Blackfriars St Manchester M32EG United Kingdom Downloadable computer security software; downloadable artificial intelligence software; downloadable computer software for use as an application programming interface (API);Computer security software as a service; software as a service featuring software for identifying and managing bots and malicious software; software as a service featuring software for monitoring internet traffic and websites to identify and manage bots and malicious software; computer security in the nature of computer security threat analysis for protecting data;
LORA Warevalley Co., Ltd 22 Floor, 396, World Cup buk-ro, Mapo-gu; Seoul 03925 Republic of Korea Downloadable computer security software; downloadable computer software applications in the field of information security; downloadable computer software programs in the field of information security; downloadable computer programs in the field of information security; network operating system programs; computer software for database management; database management software; computer software for data processing; data processing software; computer software programs for database management; computer programs for data processing; data processing programs; computer programs for processing data;Next to gray color word Lora, there is a parrot with gray mouth, black and white eye, red and burgundy feather, and light-gray body.;The color(s) gray, white, black, red, burgundy, and light gray is/are claimed as a feature of the mark.;
MAINTEGRITY FIM+ MainTegrity Inc. 2716 Signal Ridge View SW Calgary T3H2J6 Canada Downloadable computer security software, namely, software for providing cyber security monitoring, cyber security compliance namely monitoring for and detecting unauthorized changes to files on mainframe computers, change monitoring and detection, data backup and recovery, data forensics, and security event record creation for mainframe computers;
MALICIOUS INTENT DETECTION Netacea Limited 4th Floor Maybrook House, Blackfriars St Manchester M32EG United Kingdom Downloadable computer security software; downloadable artificial intelligence software; downloadable computer software for use as an application programming interface (API);Computer security software as a service; software as a service featuring software for identifying and managing bots and malicious software; software as a service featuring software for monitoring internet traffic and websites to identify and manage bots and malicious software; computer software security IT services; computer software consultancy services; design and development of computer software; rental of computer software;
NETACEA Netacea Limited 4th Floor Maybrook House, Blackfriars St Manchester M32EG United Kingdom Downloadable computer security software; Downloadable computer software using artificial intelligence for the protection of websites, computer accounts from fraudulent and malicious attacks from unauthorised third parties; downloadable computer software for use as an application programming interface (API);Computer security software as a service; software as a service featuring software for identifying and managing bots and malicious software; software as a service featuring software for monitoring internet traffic and websites to identify and manage bots and malicious software; computer software security IT services; computer software consultancy services; design and development of computer software; rental of computer software;
NETWORK ONE Trend Micro Kabushiki Kaisha Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan downloadable computer security software; downloadable anti-malware software; downloadable intrusion detection and prevention software; downloadable advanced threat protection software; downloadable computer software and computer hardware for use in securing, monitoring and protecting data, computers, and mobile devices; downloadable computer software for detecting and responding to advanced persistent threats and targeted security attacks; downloadable computer software and computer hardware for scanning for, identifying, patching and repairing security breaches in data, computers and mobile devices; downloadable computer software for use in scanning for, identifying, reporting and removing malware and viruses; downloadable computer software and hardware for monitoring, segmenting and locking down data and computers; downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; downloadable IOT security software; downloadable security software for Industrial Control Systems (ICS); downloadable computer software for application whitelisting and blacklisting; downloadable computer software for providing virus and malware pattern updates;NETWORK;software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring anti-malware software; providing on-line non-downloadable anti-malware software; software as a service (SAAS) services featuring intrusion detection and prevention software; providing on-line non-downloadable intrusion detection and prevention software; software as a service (SAAS) services featuring advanced threat protection software; providing on-line non-downloadable advanced threat protection software; software as a service (SAAS) services featuring computer software for use in securing, monitoring and protecting data, computers, and mobile devices; providing on-line non-downloadable computer software for use in securing, monitoring and protecting data, computers, and mobile devices; software as a service (SAAS) services featuring computer software for detecting and responding to advanced persistent threats and targeted security attacks; providing on-line non-downloadable computer software for detecting and responding to advanced persistent threats and targeted security attacks; software as a service (SAAS) services featuring computer software for scanning for, identifying, patching and repairing security breaches in data, computers and mobile devices; providing on-line non-downloadable computer software for scanning for, identifying, patching and repairing security breaches in data, computers and mobile devices; software as a service (SAAS) services featuring computer software for use in scanning for, identifying, reporting and removing malware and viruses; providing on-line non-downloadable containing computer software for use in scanning for, identifying, reporting and removing malware, viruses; software as a service (SAAS) services featuring computer software for monitoring, segmenting and locking down data and computers; providing on-line non-downloadable computer software for monitoring, segmenting and locking down data and computers; software as a service (SAAS) services featuring computer software for securing industrial machinery, industrial control systems and manufacturing; providing on-line non-downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; software as a service (SAAS) services featuring IOT security software; providing on-line non-downloadable IOT security software; software as a service (SAAS) services featuring security software for Industrial Control Systems (ICS); providing on-line non-downloadable security software for Industrial Control Systems (ICS); software as a service (SAAS) services featuring computer software for application whitelisting and blacklisting; providing on-line non-downloadable computer software for application whitelisting and blacklisting; software as a service (SAAS) services featuring computer software for providing virus and malware pattern updates; providing on-line non-downloadable computer software for providing virus and malware pattern updates;
NOVASHIELD Novashield, Inc. 918 Deming Way, Suite 300 Madison WI 53717 Downloadable computer security software; anti-malware software; anti-virus software; anti-spyware software;NOVA SHIELD;
NOVOSHIELD Novoshield Ltd 20 Raoul Wallenberg Street Tel Aviv-Yafo 6971916 Israel Downloadable computer security software and software application, namely, cybersecurity software for identification of cyber threats and protection from cyber-attacks; Downloadable computer security software and software application, namely, cybersecurity software for mobile devices and personal computers; Downloadable computer software and software application for ensuring the security of text messages, mobile applications and internet browsers; Browser extension being downloadable software, namely, cybersecurity software for identification of cyber threats and protection from cyber-attacks;NOVO SHIELD;Software as a service, namely, cybersecurity software for identification of cyber threats and protection from cyber-attacks; Software as a service, namely, cybersecurity software for mobile devices and personal computers; Software as a service, namely, software for ensuring the security of text messages, mobile applications and internet browsers;
NOZOMI NETWORKS Nozomi Networks Sagl Via Penate 4 CH-6850 Mendrisio Switzerland Downloadable computer security software for protection of wireless networks, securing computer networks, protection against computer network intrusions, protection of peripherals and other computer devices connected to a computer network, and protection of peripherals and other computer devices using a wireless connection to a computer network; downloadable computer software for ensuring the security of electronic mail; downloadable computer software for the remote control of safety apparatus; materials for use in connection with computer security software, namely, computer hardware for use in connection with computer security software; downloadable computer software for computer network monitoring and intrusion detection systems; downloadable computer software for detecting viruses, malware, spyware and unauthorized access; downloadable computer software for the extraction and analysis of data used to identify and report malicious files; downloadable computer software for detecting, identifying, monitoring, reporting and analyzing incidents involving cybersecurity, threats, malicious software, unauthorized software, network attacks and breaches in computer networks; downloadable computer software for detecting and warning in real time of cyber threats and system alterations; downloadable computer software for real-time goods inventories and network monitoring; downloadable computer software enabling use of machine learning to detect network baseline discrepancies, anomalies and functions; downloadable computer software for using machine intelligence learning of goods to detect non-standard operation of operational technology, interconnected devices on a computer network and devices that connect to the Internet and that may be discovered on a computer network;NETWORKS;updating of computer software relating to computer security and the prevention of computer risks; maintenance of computer software relating to computer security and the prevention of computer risks; design and development of electronic data security systems; data security consultancy; Internet security consultancy; computer security services for protection against illegal access to networks; consultancy in the field of security software; rental of Internet security computer software programs; software as a service (SAAS) services featuring Internet security programs for protection of wireless networks, securing computer networks, protection against computer network intrusions, protection of peripherals and other computer devices connected to a computer network, and protection of peripherals and other computer devices using a wireless connection to a computer network; software as a service (SAAS) services featuring Internet security programs for ensuring the security of electronic mail; software as a service (SAAS) services featuring Internet security programs for the remote control of safety apparatus; software as a service (SAAS) services featuring Internet security programs for computer network monitoring and intrusion detection systems; software as a service (SAAS) services featuring Internet security programs for detecting viruses, malware, spyware and unauthorized access; software as a service (SAAS) services featuring Internet security programs for the extraction and analysis of data used to identify and report malicious files; software as a service (SAAS) services featuring Internet security programs for detecting, identifying, monitoring, reporting and analyzing incidents involving cybersecurity, threats, malicious software, unauthorized software, network attacks and breaches in computer networks; software as a service (SAAS) services featuring Internet security programs for detecting and warning in real time of cyber threats and system alterations; software as a service (SAAS) services featuring Internet security programs for real-time goods inventories and network monitoring; downloadable computer software enabling use of machine learning to detect network baseline discrepancies, anomalies and functions; software as a service (SAAS) services featuring Internet security programs for using machine intelligence learning of goods to detect non-standard operation of operational technology, interconnected devices on a computer network and devices that connect to the Internet and that may be discovered on a computer network; programming of Internet security software; design and development of Internet security programs; consultancy in the field of computer security; computer security technical advice services; professional technical advice with respect to computer security; computer programming services for electronic data security; technical support services for computer software, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; development of software for secure network operation; computer network vulnerability assessment with respect to information security; computer consulting with respect to computer system security, namely, consulting concerning the maintenance and updating of computer security software;
OLERIA Roanoke Data Security Corporation 117 East Louisa Street, #209 Seattle WA 98102 Downloadable computer security software; Downloadable user authentication software; Downloadable computer software for identity management, verification, authentication and governance; Downloadable software for identity and access management; Downloadable software for presence detection and management; Downloadable password management software; Downloadable computer software for the encryption and authentication of electronic and digital information and data; Downloadable unified authentication software; Downloadable application programming interface (API) software; Downloadable computer software development tools and libraries; Downloadable software for monitoring computer systems and networks; Downloadable software for managing the internet of things; Downloadable software in the fields of artificial intelligence, machine learning, deep learning, high performance computing, distributed computing, virtualization, statistical learning, supervised learning, un-supervised learning, data mining, predictive analytics and business intelligence; Downloadable software for business and security decision-making and risk management;Monitoring services; Monitoring and tracking of identity security vulnerabilities; Investigation services; Investigation of security threats to identity security; Investigation of identity security vulnerabilities;Providing online non-downloadable software; Software as a Service (SaaS) services; Platform as a Service (PaaS) services; Non-downloadable software for identity management, verification, authentication and governance; Providing online non-downloadable computer security software; Providing online non-downloadable user authentication software; Providing online non-downloadable software for identity and access management; Providing online non-downloadable software for presence detection and management; Providing online non-downloadable password management software; Providing online non-downloadable software for the encryption and authentication of electronic and digital information and data; Providing online non-downloadable unified authentication software; Providing online non-downloadable application programming interface (API) software; Providing online non-downloadable computer software development tools and libraries; Providing online non-downloadable software for monitoring computer systems and networks; Providing online non-downloadable software for managing the internet of things; Providing online non-downloadable software in the fields of artificial intelligence, machine learning, deep learning, high performance computing, distributed computing, virtualization, statistical learning, supervised learning, un-supervised learning, data mining, predictive analytics and business intelligence; Providing online non-downloadable software for business and security decision-making and risk management; Information technology consulting services; Computer security consultancy; Computer security services; Network security services; Technical support services, namely, services for the installation, updating, repair, maintenance, and customization of computer software, and for troubleshooting computer software problems; Computer security threat analysis; User authentication services; Computer and network security evaluation and testing;
ON-DEMAND PRIVILEGES MANAGER Cyber-Ark Software, Ltd. Park Azorim, P. O. Box 3143 94 Em-Ha'moshavot Road Petach-Tikva 49130 Israel Downloadable computer security software for sharing and storing sensitive information over an enterprise network and over the Internet;
PACKETGO PRIBIT Ventures, Inc. 298, Beotkkot-ro, Geumcheon-gu Seoul Republic of Korea Downloadable computer security software; downloadable software for creating and maintaining network firewalls; downloadable computer software for providing security to networks; downloadable security software, namely, software for providing network security; downloadable industrial process control software; downloadable computer programs for connecting to remote computers and computer networks; process computers; computer controllers, namely, computer power controllers, computer electrical controllers, process control digital controllers, process control electrical controllers; secure microprocessors; remote control apparatus, namely, remote controls for computers;PACKET GO;Data security services, namely, data security consultancy in the fields of firewalls and computer network security; computer firewall services, namely, computer security consultancy in the field of firewalls; development of software for data and multimedia content conversion from and to different protocols; development of IT security software; data security consultancy; design and development of electronic data security systems; provision of security services for computer networks, computer access and computerized transactions, namely, computer security services in the nature of administering digital keys, restricting access to computer network servers, hard drives, computer networks, and websites; monitoring of computer systems by remote access to ensure proper functioning and security;
PORTBLOCKER DATALOCKER INC. 7300 College Blvd. Suite 600 Overland Park KS 66210 Downloadable computer security software; Recorded computer security software; Downloadable software for management of USB ports and USB storage devices;PORT BLOCKER;
QUAXAR S2W INC. 3Fl., 12, Pangyoyeok-ro 192beon-gil, Republic of Korea Downloadable computer security software; downloadable application software for computer security; computer software for providing security to networks; computer software for data processing; security software; computer software for use in secure electronic transactions; computer software for monitoring internet websites; computer software for computer security;Development of IT security software; data security consultancy; data security services; updating and rental of software for data processing; development of systems for the processing of data; database design and development; development of computer software for security management; software as a service [SaaS]; platform as a service [PaaS]; software design and development; software customisation services; design and development of Internet security programs; internet security consultancy; information services relating to the application of computer networks; computer security system monitoring services; updating of computer software; computer programming; computer security consultancy;
SECURE RESET HELP/SYSTEMS 6455 City West Parkway Eden Prairie MN 55344 Downloadable computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; Downloadable computer software for authentication and access control within computer networks and through external connections; Downloadable computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Downloadable computer software for use to compile, manage, encrypt and store personal information; Downloadable computer software for use to access, collect and modify network user identification; Downloadable computer software for workflow, helpdesk and network security management; Downloadable computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Downloadable computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Downloadable computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; Downloadable computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; Downloadable computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Downloadable computer software for registering and authenticating digital certificates; Downloadable computer software for accessing, creating and modifying network user identification information; Downloadable computer software for workflow management, help desk management, and network security; Downloadable computer software which provides analysis of data being accessed within a network; Downloadable computer software which enables users of other computer products to access and use customer help and customer support functions;
STELLARENFORCE TXONE NETWORKS INC. 5 F., No. 6, Lixing 6th Rd., East Dist., Hsinchu City 300096 Taiwan Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things (IOT) security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable computer software for whitelisting, approving and trusting other software, hardware and peripherals; downloadable computer software for blocking and blacklisting other software, hardware and peripherals; downloadable computer software for scanning, monitoring, verifying and permitting or blocking other computer software, hardware and peripherals; downloadable computer software for monitoring, segmenting and locking down data, computers, computer hardware, and network endpoints;STELLAR ENFORCE;
STELLARONE TXONE NETWORKS INC. 5 F., No. 6, Lixing 6th Rd., East Dist., Hsinchu City 300096 Taiwan Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things (IOT) security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable anti-virus software; downloadable anti-malware software; downloadable computer software for Industrial Control Systems (ICS) application inventory monitoring and management; downloadable computer software for scanning for, detecting, identifying, and blocking malware, security threats and security breaches; downloadable computer software for patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software for providing virus and malware pattern updates; downloadable computer software for whitelisting, approving and trusting other software, hardware and peripherals; downloadable computer software for blocking and blacklisting other software, hardware and peripherals; downloadable computer software for scanning, monitoring, verifying and permitting or blocking other computer software, hardware and peripherals; downloadable computer software for monitoring, segmenting and locking down data, computers, computer hardware, and network endpoints;STELLAR ONE;
STELLARPROTECT TXONE NETWORKS INC. 5 F., No. 6, Lixing 6th Rd., East Dist., Hsinchu City 300096 Taiwan Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things (IOT) security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable anti-virus software; downloadable anti-malware software; downloadable computer software for Industrial Control Systems (ICS) application inventory monitoring and management; downloadable computer software for scanning for, detecting, identifying, and blocking malware, security threats and security breaches; downloadable computer software for patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software for providing virus and malware pattern updates;STELLAR PROTECT;
TEEGRIS Samsung Electronics Co., Ltd. 129, Samsung-ro, Yeongtong-gu Suwon-si, Gyeonggi-do 16677 Republic of Korea Downloadable computer security software, namely, network security software, security software for creating and managing secure application domains; downloadable computer security software for communicating online in a secure environment, downloadable computer security software for viewing, displaying, caching, isolating the operation of software in a separate secure environment; downloadable computer security software for use in creating, managing, and sharing application programming interfaces in a secure environment; Computer software for providing security to network; Computer application software for security for mobile phone, tablet computers, portable media players and handheld computer;Maintenance of computer software relating to computer security and prevention of computer risks; Development of information technology security software; Providing temporary use of non-downloadable internet security software, namely, software for network security; Providing temporary use of online non-downloadable Internet security programs; Development of software for secure network operations; Updating of computer software relating to computer security and prevention of computer risks; Data security services, namely, design and development of data security systems and monitoring computer systems for data security purposes; Electronic data security services in the nature of back-up services, namely, remote online backup of computer data, and data security consulting;
THE BLADE FRAMEWORK Netacea Limited 4th Floor Maybrook House, Blackfriars St Manchester M32EG United Kingdom Downloadable computer security software; downloadable artificial intelligence software; downloadable computer software for use as an application programming interface (API);Computer security software as a service; artificial intelligence software as a service; software as a service featuring software for identifying and managing bots and malicious software; software as a service featuring software for monitoring internet traffic and websites to identify and manage bots and malicious software; computer security IT services; computer consultancy services; design and development of computer software; rental of computer software;
TRACKD trackd, inc. 2145 Whisper Way Reston VA 20191 Downloadable computer security software; Downloadable computer software for protecting businesses and customers devices from vulnerabilities and hackers; Downloadable computer software for Internet security, computer security, computer management, and compliance tracking; Downloadable computer software for use in inventorying, managing, reporting, analyzing, processing, and enriching system, application, firmware, and hardware data from computers and computer networks; Downloadable computer software for use in transmitting and receiving system, application, firmware, and hardware data from computers and computer networks for detecting, monitoring, reporting, analyzing, and remediating vulnerabilities in computer systems; Downloadable computer software for monitoring, analyzing, and reporting on system event data from computers and computer networks, and enabling analysis and action by security administrators or intelligent security software; Downloadable computer software for use in providing a secure connection for transmittal of computer security event data between computers and hosted security software; Downloadable computer software for use in retrieving and applying system and software updates, downgrades, installs, removal, retrieving and installing updates, and generating and reporting telemetry data for said actions; Downloadable computer application software for mobile phones, portable media players, handheld computers, tablet computers, mobile computing devices, and wearable computing devices, namely, software Internet security, computer security, computer management, and compliance tracking; Downloadable mobile applications for monitoring, analyzing, and reporting on system event data from computer systems and computer networks for others in the fields of network security, Internet security, and security vulnerability assessment;TRACKED;Computer security services, namely, providing computer network, cloud, and endpoint security for others; Cybersecurity and Internet security services; Online non-downloadable software and software as a service (SaaS) services for use in detecting, monitoring, reporting, analyzing, and remediating vulnerabilities in computers and computer networks; Online non-downloadable software and software as a service (SaaS) services for use in the maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Maintenance of computer software relating to computer security and prevention of computer risks; Computer security services, namely, securing, protecting, and monitoring computers, computer networks, and data for others; Technical and analytical services in the fields of cybersecurity and information security; Computer security threat analysis for protecting data; Computer network and data security services, namely, computer network vulnerability assessment and restricting unauthorized access to computer systems and networks; Providing online non-downloadable computer security software; Providing online non-downloadable computer software for protecting businesses and customer data from malware and hackers; Providing online non-downloadable computer software for Internet security, security vulnerability assessment, compliance monitoring, compliance tracking, and managing security solutions; Providing online non-downloadable computer software for use in inventorying, managing, reporting, analyzing, processing, and enriching system, application, firmware, and hardware data from computers and computer networks; Providing online non-downloadable computer software for use in transmitting and receiving system, application, firmware, and hardware data from computers and computer networks for detecting, monitoring, reporting, analyzing, and remediating vulnerabilities in computer systems; Providing online non-downloadable computer software for monitoring, analyzing, and reporting on system event data from computers and computer networks for analysis and action by security administrators or intelligent security software; Providing online non-downloadable computer software for use in providing a secure connection for transmittal of computer security event data between computers and hosted security software; Providing online non-downloadable computer software for use in retrieving and applying system and software updates, downgrades, installs, removal, retrieving and installing updates, and generating and reporting telemetry data for said actions; Software as a service (SaaS) services in the fields of information technology, cybersecurity, and Internet enabled devices in the Internet of Things (IOT), namely, hosting software for use by others in predicting, preventing, detecting, and responding to computer vulnerabilities, viruses, and threats, and providing protection from computer network intrusions; Computer systems and network management for others in the fields of Internet security, and security vulnerability assessment; Security monitoring services, namely, monitoring of computer systems and networks for others to ensure Internet security and protection from vulnerability from viruses, malware, and hackers; Conducting security analytics of computer network systems for others in the nature of monitoring technological functions of computer network systems to assess computer security vulnerability, vulnerability and threat detection analysis, monitoring of computer systems and computer networks for computer security purposes, computer network traffic monitoring and analysis, computer network identity monitoring and management, and computer network access and authentication monitoring and management; Providing information to others on computer network and data security; Monitoring of computer systems for the presence of vulnerabilities and malicious cyber activities for the benefit of others;
TREND MICRO NETWORK ONE Trend Micro Kabushiki Kaisha Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo 151-0053 Japan downloadable computer security software; downloadable anti-malware software; downloadable intrusion detection and prevention software; downloadable advanced threat protection software; downloadable computer software and computer hardware for use in securing, monitoring and protecting data, computers, and mobile devices; downloadable computer software for detecting and responding to advanced persistent threats and targeted security attacks; downloadable computer software and computer hardware for scanning for, identifying, patching and repairing security breaches in data, computers and mobile devices; downloadable computer software for use in scanning for, identifying, reporting and removing malware and viruses; downloadable computer software and hardware for monitoring, segmenting and locking down data and computers; downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; downloadable IOT security software; downloadable security software for Industrial Control Systems (ICS); downloadable computer software for application whitelisting and blacklisting; downloadable computer software for providing virus and malware pattern updates;NETWORK;software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring anti-malware software; providing on-line non-downloadable anti-malware software; software as a service (SAAS) services featuring intrusion detection and prevention software; providing on-line non-downloadable intrusion detection and prevention software; software as a service (SAAS) services featuring advanced threat protection software; providing on-line non-downloadable advanced threat protection software; software as a service (SAAS) services featuring computer software for use in securing, monitoring and protecting data, computers, and mobile devices; providing on-line non-downloadable computer software for use in securing, monitoring and protecting data, computers, and mobile devices; software as a service (SAAS) services featuring computer software for detecting and responding to advanced persistent threats and targeted security attacks; providing on-line non-downloadable computer software for detecting and responding to advanced persistent threats and targeted security attacks; software as a service (SAAS) services featuring computer software for scanning for, identifying, patching and repairing security breaches in data, computers and mobile devices; providing on-line non-downloadable computer software for scanning for, identifying, patching and repairing security breaches in data, computers and mobile devices; software as a service (SAAS) services featuring computer software for use in scanning for, identifying, reporting and removing malware and viruses; providing on-line non-downloadable containing computer software for use in scanning for, identifying, reporting and removing malware, viruses; software as a service (SAAS) services featuring computer software for monitoring, segmenting and locking down data and computers; providing on-line non-downloadable computer software for monitoring, segmenting and locking down data and computers; software as a service (SAAS) services featuring computer software for securing industrial machinery, industrial control systems and manufacturing; providing on-line non-downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; software as a service (SAAS) services featuring IOT security software; providing on-line non-downloadable IOT security software; software as a service (SAAS) services featuring security software for Industrial Control Systems (ICS); providing on-line non-downloadable security software for Industrial Control Systems (ICS); software as a service (SAAS) services featuring computer software for application whitelisting and blacklisting; providing on-line non-downloadable computer software for application whitelisting and blacklisting; software as a service (SAAS) services featuring computer software for providing virus and malware pattern updates; providing on-line non-downloadable computer software for providing virus and malware pattern updates;
UWSS F1 SECURITY INC. 1402, 234, Beotkkot-ro, Geumcheon-gu Seoul 08513 Republic of Korea Downloadable computer security software for enterprise to protect web servers and websites; downloadable computer software for detecting and removing malicious code, virus, and worms; downloadable computer anti-virus software; downloadable computer security software for web application firewall and anti-webshell; downloadable computer security software for protecting server; downloadable computer software and application for detecting and protecting malicious code, and malicious script; downloadable computer software for detection, analysis and curing malicious code; downloadable computer software for detection and removal of malware; downloadable computer software for screening malicious code and content; downloadable computer software for detection and removal of website malicious code and script; downloadable malicious code protection software for websites; downloadable data encryption and user identity authentication software; downloadable computer software for secure network operation to protect data and digital information from unauthorized access; downloadable computer software for the creation of firewall;Providing online non-downloadable computer security software for enterprises to protect web servers and websites; Providing online non-downloadable computer software for detecting and removing malicious code, virus, and worms; Providing online non-downloadable computer anti-virus software; Providing online non-downloadable computer security software for detecting web malicious code distribution and web forgery; Providing online non-downloadable computer security software for protecting server; Providing online non-downloadable downloadable computer software and application for detecting and protecting malicious code, and malicious script; Providing online non-downloadable computer software for detection, analysis and curing malicious code; Providing online non-downloadable computer software for detection and removal of malware; Providing online non-downloadable computer software for screening malicious code and content; Providing online non-downloadable computer software for detection and removal of website malicious code and script; Providing online non-downloadable malicious code protection software for websites; Providing online non-downloadable data encryption and user identity authentication software; Providing online non-downloadable computer software for secure network operation to protect data and digital information from unauthorized access; Providing online non-downloadable computer software for the creation of firewall;
WISS WAREVALLEY INFORMATION SECURITY SUITE Warevalley Co., Ltd. 22 Floor, 396, World Cup buk-ro, Mapo-gu; Seoul 03925 Republic of Korea Downloadable computer security software; downloadable computer software applications for managing databases, monitoring and controlling network access for use in the field of information security; downloadable computer software programs for managing databases, monitoring and controlling network access for use in the field of information security; downloadable computer programs for managing databases, monitoring and controlling network access for use in the field of information security; downloadable cloud computing software for managing databases, monitoring and controlling network access for use in the field of information security; computer hardware and software for providing secure remote access to computer and communication networks; software for creating, facilitating, and managing remote access to and communication with local area networks and global networks; network operating system programs; database management software; communication software for providing network connectivity and providing VOIP calling capability and email software for use in the field of information security; computer software for database management; computer software for data processing for managing databases and performing statistical analysis for use in the field of information security; computer programs for data processing for managing databases and performing statistical analysis for use in the field of information security; data processing programs for managing databases and performing statistical analysis for use in the field of information security; integrated software packages for managing databases, monitoring and controlling network access for use in the field of information security;Above big, bold, and dark brown word WISS, there are purple, yellow, green, sky blue, and pink small circles; on the right side of the word WISS, there are small and dark brown color words, which are Warevalley, Information, Security, and Suite.;WISS WARE VALLEY INFORMATION SECURITY SUITE;The color(s) purple, yellow, green, sky blue, pink and dark brown is/are claimed as a feature of the mark.;INFORMATION SECURITY SUITE;
WMDS F1 SECURITY INC. 1402, 234, Beotkkot-ro, Geumcheon-gu Seoul 08513 Republic of Korea Downloadable computer security software for enterprise; recorded computer security software for enterprise; downloadable malware detection and removal software; recorded malware detection and removal software; downloadable computer software for detecting and removing malicious code, virus, and worms; recorded computer software for detecting and removing malicious code, virus, and worms; downloadable computer software for screening malicious code and content; recorded computer software for screening malicious code and content; downloadable computer anti-virus software; recorded computer anti-virus software; downloadable computer security software; recorded computer security software;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.