DOWNLOADABLE SECURITY SOFTWARE USE

Brand Owner (click to sort) Address Description
QOSTODIAN PRIME Qohash Inc. 394 rue de Sainte-Hélène Québec, QC G1K3L7 Canada Downloadable security software for use in database management for quantifying organizational risk; downloadable software for maintaining data security; downloadable software for conducting tamper-proof digital logs, digital audit trails and forensic analysis of data; downloadable software for detecting unauthorized access and data breach; downloadable software to store, retrieve and detect data from computers and computer hardware; downloadable software for management, protection and monitoring of personal, health, corporate and financial data; downloadable software for eliminating duplicated personal, health, corporate and financial data;Software as a service (SaaS) services featuring security software for use in database management for quantifying organizational risk; Software as a service (SaaS) services featuring software for maintaining data security; Software as a service (SaaS) services featuring software for conducting tamper-proof digital logs, digital audit trails and forensic analysis of data; Software as a service (SaaS) services featuring software for detecting unauthorized access and data breach; Software as a service (SaaS) services featuring software to store, retrieve and detect data from computers and computer hardware; Software as a service (SaaS) services featuring software for management, protection and monitoring of personal, health, corporate and financial data; Software as a service (SaaS) services featuring software for eliminating duplicated personal, health, corporate and financial data;
QOSTODIAN RECON Qohash Inc. 394 rue de Sainte-Hélène Québec, QC G1K3L7 Canada Downloadable security software for use in database management of customer personal, health, corporate and financial data; downloadable software for maintaining data security; downloadable software for conducting tamper-proof digital logs, digital audit trails and forensic analysis of data; downloadable software for detecting unauthorized access and data breach; downloadable software to store, retrieve and detect data from computers and computer hardware; downloadable software for management, protection and monitoring of personal, health, corporate and financial data; downloadable software for eliminating duplicated personal, health, corporate and financial data;Software as a service (SaaS) services featuring security software for use in database management of customer personal, health, corporate and financial data; Software as a service (SaaS) services featuring software for maintaining data security; Software as a service (SaaS) services featuring software for conducting tamper-proof digital logs, digital audit trails and forensic analysis of data; Software as a service (SaaS) services featuring software for detecting unauthorized access and data breach; Software as a service (SaaS) services featuring software to store, retrieve and detect data from computers and computer hardware; Software as a service (SaaS) services featuring software for management, protection and monitoring of personal, health, corporate and financial data; Software as a service (SaaS) services featuring software for eliminating duplicated personal, health, corporate and financial data;
RUNTIME ENCRYPTION Fortanix, Inc. 444 Castro Street #702 Mountain View CA 94041 downloadable security software for use in applications, which uses cryptography to prevent infrastructure compromises;ENCRYPTION;
SMART SENTINEL Cyber Defence QCD Corporation #308 - 1505 Laperriere Avenue Ottawa, Ontario K1Z7T1 Canada downloadable security software for use to detect anomalous activity such as cyber attacks on end point devices;SMART;providing online and/or web-based non-downloadable security software for use to detect cyber attacks on the network, specifically end point devices; Monitoring of end point devices, specifically the detection and response of anomalous activity on end point devices; computer security threat analysis for protecting data; computer security consultancy;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. There is disclosed an apparatus for controlling a physical layer interface of a network interface card. The apparatus comprises: 1) a read only memory (ROM) for storing an embedded control program; 2) a random access memory for storing a downloadable software control program; and 3) a microcontroller for controlling the physical layer interface, wherein the microcontroller in a first operating mode executes the embedded control program to thereby control the physical layer interface, and wherein the microcontroller in a second operating mode downloads the downloadable software control program from an external processing system and executes the software control program in place of the embedded control program to thereby control the physical layer interface.