DOWNLOADABLE RECORDED SECURITY SOFTWARE

Brand Owner (click to sort) Address Description
QOHASH Qohash Inc. 394 rue de Sainte-Hélène Québec, QC G1K3L7 Canada Downloadable and recorded security software for computer security and prevention of computer risks; Downloadable and recorded software for maintaining data security; Downloadable and recorded software for conducting tamper-proof digital logs, digital audit trails and forensic analysis of data ; Downloadable and recorded software for detecting unauthorized data access and data breach;Software as a service (SAAS) services featuring security software for computer security and prevention of computer risks; Software as a service (SAAS) services featuring software in the field of maintaining data security; Software as a service (SAAS) services featuring software in the field of conducting tamper-proof digital logs, digital audit trails and forensic analysis of data ; Software as a service (SAAS) services featuring software for detecting unauthorized data access and data breach of computers, computer data and computer networks; Maintenance, development and updating of aforementioned computers, computer data and data security software;
WE PROTECT THE THINGS THAT PROTECT HUMAN LIVES. CYBERMDX 1216 Broadway New York NY 10001 Downloadable and recorded security software designed to protect IoT and medical devices across clinical networks; Computer security hardware being sensors for sending anomaly detection alerts and medical device classification updates to a central cloud-based cybersecurity system for protecting medical devices across clinical networks; Downloadable and recorded security software for sending anomaly detection alerts and medical device classification updates to a central cloud-based cybersecurity system for protecting medical devices across clinical networks; Providing non-downloadable security software designed to protect IoT and medical devices across clinical networks; Provision of a website for allowing customers to check the cybersecurity status of medical devices and clinical networks; Software as Service (SAAS) services featuring security software for protecting IoT and medical devices across clinical networks;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A storage device includes a tamper-resistant module and a flash memory. In correspondence with a command, a CPU inside the tamper-resistant module judges the security of data received from the outside, then recording the data as follows: High-security and small-capacity data is recorded into a memory inside the tamper-resistant module. High-security and large-capacity data is encrypted, then being recorded into the flash memory. Low-security data is recorded as it is into the flash memory. This recording method permits large-capacity data to be stored while ensuring a security (i.e., a security level) corresponding thereto.