DOWNLOADABLE COMPUTER SOFTWARE PREVENTING

Brand Owner (click to sort) Address Description
ANJUNA Anjuna Security, Inc. 380 Portage Ave. Palo Alto CA 94303 Downloadable computer software for preventing, inspecting, monitoring, detecting, responding to, and eliminating computer security and network security threats; Downloadable computer software for preventing malware; Downloadable computer software for encryption of computer data and memory; Downloadable computer software for protecting data on cryptographic key-management systems, servers and databases, microservices architecture, and cloud networks; Downloadable cloud-based computer software for monitoring and preventing security threats to enterprise IT infrastructure, business software, cloud networks, microservices architecture, and servers and databases;
CYBERRES MICRO FOCUS 2202 SOUTH 950 EAST PROVO UT 84606 Downloadable computer software for preventing, detecting, evaluating, reporting, and responding to threats and attacks on computer programs and networks; downloadable computer software for identifying, evaluating, reporting, and correcting computer security and software security vulnerabilities and defects; downloadable computer software for logging computer security events and then storing, searching, and reporting on same; downloadable computer software for use in managing risks to computers and computer networks; downloadable computer software for computer security testing; downloadable computer software for information security, namely, for detecting unauthorized access or data breach; downloadable computer software for authentication, encryption and tokenization of data; downloadable computer software to monitor and control the security of and the information technology infrastructure of servers, data storage, and networking hardware; downloadable computer software for secure messaging; downloadable computer utility programs for performing computer maintenance;CYBER RES;Technical support services, namely, technical consultation in the field of information security; design and development of information security hardware and software, information technology infrastructure of servers, data storage hardware, mobile devices, and networking hardware; maintenance, installation, updating, testing of information security software and data storage software; testing of computer hardware and software in the field of information security, information technology infrastructure of servers, data storage, mobile devices and networking hardware; monitoring of information security systems, information technology infrastructure of servers, data storage systems, mobile devices and networking hardware to detect breakdowns, to ensure proper functioning, detect unauthorized access or data breach; research, consultancy, testing, advisory services, in the field of information security, namely, design and development of information security systems, and technical support services thereto, namely, troubleshooting of computer software problems, providing backup computer programs, monitoring technological functions of computer network systems; consulting services in the field of software as a service (saas); software as a service (saas) services featuring software in the field of information security for detecting unauthorized access or data breach; design, development, installation and maintenance of computer software;
TURBOGUARD MITA EXPEDITIONS 3821 Bedford Ave BROOKLYN NY 11229 Downloadable computer software for preventing and protecting against input high-voltage, output high-voltage, input current regulation, output current regulation, automatic current matching, input short-circuit, out short-circuit, static resistance, device overcharge, battery over discharge, output temperature control sold as an integral component of charging devices;TURBO GUARD;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Systems and methods for preventing the unauthorized access to data stored on removable media, such as software, include storing a predetermined signature in the area of non-volatile memory in a computer system. Upon initialization of the computer system, a check is made to verify the signature. Only if the signature is verified will decoding software operate.