DOWNLOADABLE COMPUTER SOFTWARE SECURITY

Brand Owner (click to sort) Address Description
AUTOELEVATE SuperUser Software, Inc. #500-9319 777 Brickell Avenue Miami FL 33131 Downloadable computer software for security and privilege management for computer operating systems, communication protocols and software applications, for systems administration and security on operating systems for server computers, desktop computers, portable computers, workstation computers and network devices, for centralized management and reporting, and for integration of host credentials into directory services; Downloadable computer application software for server computers, desktop computers, portable computers, workstation computers, and network devices, namely, downloadable software for support of remote access protocols;AUTO ELEVATE;Software as a service (SAAS) services featuring software for security and privilege management for computer operating systems, communication protocols and software applications, for systems administration and security on operating systems for server computers, desktop computers, portable computers, workstation computers and network devices, for centralized management and reporting, and for integration of host credentials into directory services; Software as a service (SAAS) services, namely, hosting software for use by others for use in security and privilege management for computer operating systems, communication protocols and software applications, for systems administration and security on operating systems for server computers, desktop computers, portable computers, workstation computers and network devices for centralized management and reporting, and for integration of host credentials into directory services;
HERDDEFENSE TECHNOLOGY Atomic Corporate Industries Suite 220 14121 Parke-Long Court Chantilly VA 20151 Downloadable computer software for security management to provide a complete level of protection from the software environment;TECHNOLOGY;Software as a service (SAAS) services featuring software for security management to provide a complete level of protection from the software environment;
HEXNODE Mitsogo Inc. 111 PINE ST. #1225 SAN FRANCISCO CA 94111 Downloadable computer software for security and systems management; Downloadable computer software for data collection; Downloadable computer software for updating computer networks; Downloadable computer software for IT organization and management; Downloadable computer software for data and information protection and security; Downloadable computer software for security management, incident response, unmanaged assets, patch management, continuous monitoring, network access control, detection and remediation of malware; Downloadable computer software for systems management, asset management, file distribution, software metering, software license management, audit and compliance, configuration management; downloadable computer software for automatically detecting failures and their root causes; Downloadable computer software for integrity monitoring, data discovery and protection, performance monitoring, dependency mapping, and for automatically implementing predefined actions in order to remediate detected conditions or change the state of systems; Downloadable computer security and systems management software for use with containers, virtual machines, cloud computing infrastructure and related computing environments and devices; Downloadable computer software for database management, data storage, data mining, data access and reporting, scheduling, data migration, data administration, and data analysis; Downloadable computer software for use in business data integration, business data processing, business data analysis; Downloadable software for enterprise automation and AI, namely, using artificial intelligence for speech recognition knowledge reasoning, machine learning and computer vision; downloadable computer programs for controlling access to and use of stand-alone computers, namely, network access server hardware and operating programs for use with stand-alone kiosk computers; Downloadable computer software for processing and analyzing real-time data for use in the field of device management; Downloadable computer software to deliver, cache and display digital content on computers for use in the field of device management;Communication via analogue and digital computer terminals; Communication via mobile networks; Communication via computer networks; Communication via data networks; Communication via the Internet by means of computers; Communication via digital transmission by computer terminals;HEX NODE;Computer services, namely, allowing computer software vendors to market software to others via an on-line marketplace in which such vendors can showcase products that are compatible with products and services provided in the marketplace, and providing consumer advice to companies to analyze and select appropriate computer software products;Computer services, namely, remote and on-site management of computer software, software systems and information technology systems of others; Computer and technological services, namely, computer software and system integration, information technology integration, computer software and hardware installation, IT infrastructure migration, and data integration; Consulting services in the field of design, selection, implementation, and use of computer software and software systems for others; Consulting services in the fields of computer software, information technology, electronic data processing, information systems, telecommunications technology, IT project management, security and systems management, computer networks, IT organization and management, and information and data protection; Consulting services on the planning, installation, testing, transition, migration, configuration, documentation, operation and supervision of computer software and software systems, computer networks, IT infrastructure and information systems; Consulting services related to the use of software products and systems, namely, software and software systems integration services, project management, infrastructure migration, and software analytics; Consulting services in the field of computer security and systems management software; Consulting services regarding computer software for updating computer networks; Computer project management services, namely, information systems, computer software and infrastructure project management; Planning, design and management of information technology systems and computer software and software systems; Design and development of computer security and systems management software for use with containers, virtual machines, cloud computing infrastructure and related computing environments and devices; Design and development of computer software for updating computer networks; Technical consultancy services and support in the field of computer software, information technology, electronic data processing, information systems, telecommunications technology, IT project management, data collection, security management, incident response, unmanaged assets, patch management, continuous monitoring, network access control, detection and remediation malware, systems management, asset management, file distribution, software metering, software license management, audit and compliance, configuration management, integrity monitoring, data discovery and protection, performance monitoring, dependency mapping, and for automatically implementing predefined actions in order to remediate detected conditions or change the state of systems; Technical support services, namely, administration, installation and troubleshooting of computer software, software system and network problems; Technical support of IT hardware and software systems for businesses, automation of IT processes and operations for businesses; Providing technology information, namely, developing digital solutions in the nature of digital software platforms for the purpose of improving business management, revenue growth, operational and administrative efficiency, costs, customer service, and compliance with regulations; Software as a service (SAAS) services featuring software for deploying, managing, and securing the computer hardware, mobile devices, and computer software of others; Computer software design and development; Maintenance of computer software; Updating computer software; Technical support for software; Installation of computer software; Leasing software to deliver, cache and display digital content on computers, digital screens and mobile devices; Evaluation of computer software; Computer software consultation, namely, assisting others in selecting appropriate software to meet their needs;
MIMIQ HUB MIMIQ, INC. Suite 403 355 Bryant Street San Francisco CA 94107 Downloadable computer software for security connecting multiple devices around the home, campus, or neighborhoods and the cloud using multiple protocols via low power wide area networks (LoRaWAN), near field communication (NFC) technology-enabled devices, and local area network (LAN) hardware to send, extend, translate signals received from one protocol to another and hosting applications that provide value-added applications; Environmental monitoring system comprised of meters and sensors that measure pressure, humidity, temperature and includes alarm and reporting functions for detection of environmental changes and using interfaces for actuating temperature and other environmental controls;Telecommunications gateway services providing access to global computer communications networks, electronic transmission of data, sound, tests, images, and messages; Wireless broadband computer communication services via low power wide area networks (LoRaWAN), near field communication (NFC) technology-enabled devices, and local area network (LAN) hardware; Transmission and delivery of security and environmental data via low power wide area network (LoRaWAN) services, near field communication (NFC) technology-enabled devices, and local area network (LAN) hardware;MIMIC HUB;HUB;Software as a Service (SAAS) services featuring software for home security and other applications connecting the cloud and devices in the home, neighborhood, or campus;
MITSOGO Mitsogo Inc. 111 PINE ST. #1225 SAN FRANCISCO CA 94111 Downloadable computer software for security and systems management; Downloadable computer software for data collection; Downloadable computer software for updating computer networks; Downloadable computer software for IT organization and management; Downloadable computer software for data and information protection and security; Downloadable computer software for security management, incident response, unmanaged assets, patch management, continuous monitoring, network access control, detection and remediation of malware; Downloadable computer software for systems management, asset management, file distribution, software metering, software license management, audit and compliance, configuration management; downloadable computer software for automatically detecting failures and their root causes; Downloadable computer software for integrity monitoring, data discovery and protection, performance monitoring, dependency mapping, and for automatically implementing predefined actions in order to remediate detected conditions or change the state of systems; Downloadable computer security and systems management software for use with containers, virtual machines, cloud computing infrastructure and related computing environments and devices; Downloadable computer software for database management, data storage, data mining, data access and reporting, scheduling, data migration, data administration, and data analysis; Downloadable computer software for use in business data integration, business data processing, business data analysis; Downloadable software for enterprise automation and AI, namely, using artificial intelligence for speech recognition knowledge reasoning, machine learning and computer vision; downloadable computer programs for controlling access to and use of stand-alone computers, namely, network access server hardware and operating programs for use with stand-alone kiosk computers; Downloadable computer software for processing and analyzing real-time data for use in the field of device management; Downloadable computer software to deliver, cache and display digital content on computers for use in the field of device management;Communication via analogue and digital computer terminals; Communication via mobile networks; Communication via computer networks; Communication via data networks; Communication via the Internet by means of computers; Communication via digital transmission by computer terminals;MIT SOGO;Computer services, namely, allowing computer software vendors to market software to others via an on-line marketplace in which such vendors can showcase products that are compatible with products and services provided in the marketplace, and providing consumer advice to companies to analyze and select appropriate computer software products;Computer services, namely, remote and on-site management of computer software, software systems and information technology systems of others; Computer and technological services, namely, computer software and system integration, information technology integration, computer software and hardware installation, IT infrastructure migration, and data integration; Consulting services in the field of design, selection, implementation, and use of computer software and software systems for others; Consulting services in the fields of computer software, information technology, electronic data processing, information systems, telecommunications technology, IT project management, security and systems management, computer networks, IT organization and management, and information and data protection; Consulting services on the planning, installation, testing, transition, migration, configuration, documentation, operation and supervision of computer software and software systems, computer networks, IT infrastructure and information systems; Consulting services related to the use of software products and systems, namely, software and software systems integration services, project management, infrastructure migration, and software analytics; Consulting services in the field of computer security and systems management software; Consulting services regarding computer software for updating computer networks; Computer project management services, namely, information systems, computer software and infrastructure project management; Planning, design and management of information technology systems and computer software and software systems; Design and development of computer security and systems management software for use with containers, virtual machines, cloud computing infrastructure and related computing environments and devices; Design and development of computer software for updating computer networks; Technical consultancy services and support in the field of computer software, information technology, electronic data processing, information systems, telecommunications technology, IT project management, data collection, security management, incident response, unmanaged assets, patch management, continuous monitoring, network access control, detection and remediation malware, systems management, asset management, file distribution, software metering, software license management, audit and compliance, configuration management, integrity monitoring, data discovery and protection, performance monitoring, dependency mapping, and for automatically implementing predefined actions in order to remediate detected conditions or change the state of systems; Technical support services, namely, administration, installation and troubleshooting of computer software, software system and network problems; Technical support of IT hardware and software systems for businesses, automation of IT processes and operations for businesses; Providing technology information, namely, developing digital solutions in the nature of digital software platforms for the purpose of improving business management, revenue growth, operational and administrative efficiency, costs, customer service, and compliance with regulations; Software as a service (SAAS) services featuring software for deploying, managing, and securing the computer hardware, mobile devices, and computer software of others; Computer software design and development; Maintenance of computer software; Updating computer software; Technical support for software; Installation of computer software; Leasing software to deliver, cache and display digital content on computers, digital screens and mobile devices; Evaluation of computer software; Computer software consultation, namely, assisting others in selecting appropriate software to meet their needs;
S2-EYEZ S2W INC. 3Fl., 12, Pangyoyeok-ro 192beon-gil, Republic of Korea Downloadable computer software for security of network, the internet and computer; Recorded computer software for security of network, the internet and computer; Downloadable computer software for data processing; Recorded computer software for data processing; Downloadable and recorded computer software for security of network, the internet and computer to prevent suspicious crypto transactions from both potential threats from dark webs and already known threats from the internet for use on cellular phones and tablet computers; Downloadable computer software for security of online trading; Recorded computer software for security of online trading; Downloadable computer software for internet web site monitoring; Recorded computer software for internet web site monitoring; Downloadable and recorded computer software for security of network, the internet and computer to prevent suspicious crypto transactions from both potential threats from dark webs and already known threats from the internet;S TWO-EYES; S TO-EYES;
S2-EYEZ S2W LAB Inc. 901, F9, 225-18, Pangyoyeok-ro, Bundang-gu,Seongnam-si Gyeonggi-do Republic of Korea Downloadable computer software for security of network, the internet and computer; Recorded computer software for security of network, the internet and computer; Downloadable computer software for data processing; Recorded computer software for data processing; Downloadable and recorded computer software for security of network, the internet and computer to prevent suspicious crypto transactions from both potential threats from dark webs and already known threats from the internet for use on cellular phones and tablet computers; Downloadable computer software for security of online trading; Recorded computer software for security of online trading; Downloadable computer software for internet web site monitoring; Recorded computer software for internet web site monitoring; Downloadable and recorded computer software for security of network, the internet and computer to prevent suspicious crypto transactions from both potential threats from dark webs and already known threats from the internet;S TWO-EYES; S TO-EYES;
S2-XARVIS S2W INC. 3Fl., 12, Pangyoyeok-ro 192beon-gil, Republic of Korea Downloadable computer software for security of network, the internet and computer; Recorded computer software for security of network, the internet and computer; Downloadable computer software for data processing; Recorded computer software for data processing; Downloadable and recorded computer software platforms for security of network, the internet and computer to provide users with up-to-date analytic information on potential threats from hidden channels, dark webs, deep webs, and social media for use of cellular phones and tablet computers; Downloadable computer software for security of online trading; Recorded computer software for security of online trading; Downloadable computer software for internet web site monitoring; Recorded computer software for internet web site monitoring; Downloadable and recorded computer software platforms for security of network, the internet and computer to provide users with up-to-date analytic information on potential threats from hidden channels, dark webs, deep webs, and social media;S TWO-XARVIS;
TANIUM Tanium Inc. 2100 Powell Street, Suite 1600 Emeryville CA 94608 Downloadable computer software for security and systems management; downloadable computer software for data collection; downloadable computer software for updating computer networks; downloadable computer software for IT organization and management; downloadable computer software for data and information protection and security; downloadable computer software for security management, incident response, unmanaged assets, patch management, continuous monitoring, network access control, detection and remediation of malware; downloadable computer software for systems management, asset management, file distribution, software metering, software license management, audit and compliance, configuration management; downloadable computer software for automatically detecting failures and their root causes; downloadable computer software for integrity monitoring, data discovery and protection, performance monitoring, dependency mapping, and for automatically implementing predefined actions in order to remediate detected conditions or change the state of systems; downloadable computer security and systems management software for use with containers, virtual machines, cloud computing infrastructure and related computing environments and devices;
THE POWER OF CERTAINTY Tanium Inc. 2100 Powell Street, Suite 1600 Emeryville CA 94608 Downloadable computer software for security and systems management; downloadable computer software for data collection; downloadable computer software for updating computer networks; downloadable computer software for IT organization and management; downloadable computer software for data and information protection and security; downloadable computer software for security management, incident response, unmanaged assets, thin client devices, internet of things (IOT) devices, patch management, continuous monitoring, network access control, detection and remediation of malware; downloadable computer software for systems management, asset management, management of thin client devices, management of internet of things (IOT) devices, file distribution, software metering, software license management, audit and compliance, configuration management; downloadable computer software for automatically detecting failures and their root causes; downloadable computer software for integrity monitoring, data discovery and protection, performance monitoring, dependency mapping, and for automatically implementing predefined actions in order to remediate detected conditions or change the state of systems; downloadable computer security and systems management software for use with containers, virtual machines, cloud environments, cloud computing infrastructure, and related computing environments and devices; downloadable computer security and systems management software for managing software running on containers, virtual machines, cloud environments, cloud computing infrastructure, and related computing environments and devices; downloadable application programming interface (API) software; downloadable computer software in the field of mobile device management (MDM); downloadable software for risk assessment, classification, quantification and management; downloadable software for use in tracking, detecting and remediation of the state of systems; downloadable software for use in enterprise service management, customer service management, service desk operations and information technology consulting services; downloadable software for consolidating and managing networks, accounts, and connections to existing and emerging application programming interfaces (APIs); downloadable computer security and systems management software for use with thin client hardware and internet of things (IOT) hardware; downloadable software for managing cloud environments;Application service provider featuring application programming interface (API) software; computer services, namely, providing an interactive website featuring technology that allows users to consolidate and manage networks, accounts, and connections to existing and emerging application programming interfaces (APIs); computer services, namely, cloud hosting provider services; providing virtual systems and environments through cloud computing; updating and maintaining cloud-based computer software through online updates; mobile device management services, namely, remote management of mobile devices' software applications, access and security; Software as a Service (SaaS) services featuring non-downloadable software mobile device management; application service provider, namely, hosting, managing, developing, analyzing and maintaining applications, software and websites in the field of risk management; development of software for use in risk assessment, classification, quantification and management; maintenance and updating software relating to risk assessment, management and prevention; Platform as a service (PAAS) featuring software for risk assessment, classification, quantification and management; Software as a service (SAAS) services featuring software for risk assessment, classification, quantification and management; Software as a service (SAAS) services featuring software for use in enterprise service management, customer service management, service desk operations and information technology consulting services; Software as a service (SAAS) services featuring software for use in tracking, detecting and remediation of the state of systems; application service provider featuring application programming interface (API) software for use in tracking, detecting and remediation of the state of systems; providing non-downloadable cloud-based software for tracking, detecting and remediation of the state of systems; Software as a service (SAAS) services featuring software for security and systems management; Software as a service (SAAS) services featuring software for data collection; Software as a service (SAAS) services featuring software for updating computer networks; Software as a service (SAAS) services featuring software for IT organization and management; Software as a service (SAAS) services featuring software for data and information protection and security; Software as a service (SAAS) services featuring software for security management, incident response, unmanaged assets, thin client devices, internet of things (IOT) devices, patch management, continuous monitoring, network access control, detection and remediation of malware; Software as a service (SAAS) services featuring software for systems management, asset management, management of thin client devices, management of internet of things (IOT) devices, file distribution, software metering, software license management, audit and compliance, configuration management; Software as a service (SAAS) services featuring software for automatically detecting failures and their root causes; Software as a service (SAAS) services featuring software for integrity monitoring, data discovery and protection, performance monitoring, dependency mapping, and for automatically implementing predefined actions in order to remediate detected conditions or change the state of systems; Software as a service (SAAS) services featuring computer security and systems management software for use with containers, virtual machines, cloud environments, cloud computing infrastructure and related computing environments and devices; Software as a service (SAAS) services featuring computer security and systems management software for management of software running on containers, virtual machines, cloud environments, cloud computing infrastructure and related computing environments and devices; computer services, namely, remote and on-site management of computer software, software systems and information technology systems of others; computer and technological services, namely, computer software and system integration, information technology integration, computer software and hardware installation, IT infrastructure migration, and data integration; consulting services in the field of design, selection, implementation, and use of computer software and software systems for others; consulting services in the fields of computer software, information technology, electronic data processing, information systems, telecommunications technology, IT project management, security and systems management, computer networks, IT organization and management, and information and data protection; consulting services on the planning, installation, testing, transition, migration, configuration, documentation, operation and supervision of computer software and software systems, computer networks, IT infrastructure and information systems; consulting and support services related to the use of software products and systems, namely, software and software systems integration services, project management, infrastructure migration, and software analytics; consulting services in the field of computer security and systems management software; consulting services regarding computer software for updating computer networks; computer project management services, namely, information systems, computer software and infrastructure project management; planning, design and management of information technology systems and computer software and software systems; design and development of computer security and systems management software for use with containers, virtual machines, cloud environments, cloud computing infrastructure and related computing environments and devices; design and development of computer security and systems management software for management of software running on containers, virtual machines, cloud environments, cloud computing infrastructure and related computing environments and devices; design and development of computer software for updating computer networks; technical consultancy services and support in the field of computer software, information technology, electronic data processing, information systems, telecommunications technology, IT project management, data collection, security management, incident response, unmanaged assets, thin client devices, internet of things (IOT) devices, patch management, continuous monitoring, network access control, detection and remediation malware, systems management, asset management, management of thin client devices, management of internet of things (IOT) devices, file distribution, software metering, software license management, audit and compliance, configuration management, integrity monitoring, data discovery and protection, performance monitoring, dependency mapping, and for automatically implementing predefined actions in order to remediate detected conditions or change the state of systems; technical support services, namely, administration, installation and troubleshooting of computer software, software system and network problems; technical support of IT hardware and software systems for businesses, automation of IT processes and operations for businesses; software as a service (SaaS) services featuring computer security and systems management software for use with thin client hardware and internet of things (IOT) hardware; design and development of computer security and systems management software for use with thin client hardware and internet of things (IOT) hardware; software as a service (SaaS) services featuring software for management of cloud environments; design and development of software for managing cloud environments;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.