DOWNLOADABLE SOFTWARE DATA SECURITY

Brand Owner (click to sort) Address Description
CROWNENCRYPT CROWN STERLING LIMITED Suite 310 4040 MacArthur Blvd. Newport Beach CA 92660 Downloadable software for data security and encryption; Downloadable software for the secure transmission of electronic data and information; Downloadable software for the decryption and encryption of electronic data in the field of cryptography; Downloadable software for use in identity and access management; Downloadable software for use in authentication and digital signatures; Downloadable software for use in cryptography key generation, distribution and management; Downloadable application programming interface (API) software;CROWN ENCRYPT;Software as a service (SAAS) services featuring software for data security and encryption; Software as a service (SAAS) services featuring software for the secure transmission of electronic data and information; Software as a service (SAAS) services featuring software for the decryption and encryption of electronic data in the field of cryptography; Software as a service (SAAS) services featuring software for use in identity and access management; Software as a service (SAAS) services featuring software for use in authentication and digital signatures; Software as a service (SAAS) services featuring software for use in cryptography key generation, distribution and management; Application service provider featuring application programming interface (API) software;
CROWNENCRYPTOTP CROWN STERLING LIMITED Suite 310 4040 MacArthur Blvd. Newport Beach CA 92660 Downloadable software for data security and encryption; Downloadable software for the secure transmission of electronic data and information; Downloadable software for the decryption and encryption of electronic data in the field of cryptography; Downloadable software for use in identity and access management; Downloadable software for use in authentication and digital signatures; Downloadable software for use in cryptography key generation, distribution and management; Downloadable application programming interface (API) software;CROWN ENCRYPT OTP;Software as a service (SAAS) services featuring software for data security and encryption; Software as a service (SAAS) services featuring software for the secure transmission of electronic data and information; Software as a service (SAAS) services featuring software for the decryption and encryption of electronic data in the field of cryptography; Software as a service (SAAS) services featuring software for use in identity and access management; Software as a service (SAAS) services featuring software for use in authentication and digital signatures; Software as a service (SAAS) services featuring software for use in cryptography key generation, distribution and management; Application service provider featuring application programming interface (API) software;
DRUVSTAR DATAVISION Arete Security Inc. 6671 S Las Vegas Blvd., #210 Las Vegas NV 89119 Downloadable software for data security, namely, user authentication and authorization, blocking of malware, data encryption, user access control, data access rights, data access flow, anomalous behavior detection, and cyber threat protection;Software as a service (SAAS) services featuring software for data security, namely, user authentication and authorization, blocking of malware, data encryption, user access control, data access rights, data access flow, anomalous behavior detection, and cyber threat protection; providing online non-downloadable software for data security, namely, user authentication and authorization, blocking of malware, data encryption, user access control, data access rights, data access flow, anomalous behavior detection, and cyber threat protection;
ENTANGLED TIME CROWN STERLING LIMITED Suite 310 4040 MacArthur Blvd. Newport Beach CA 92660 Downloadable software for data security and encryption; downloadable software for use in cryptography; downloadable software for use in identity and access management; downloadable software for use in authentication and digital signatures; downloadable software for use in cryptography key generation, distribution and management; downloadable software for the creation, development and maintenance of blockchain and cryptocurrencies;Software as a service (SAAS) services featuring software for data security and encryption; Software as a service (SAAS) services featuring software for use in cryptography; Software as a service (SAAS) services featuring software for use in identity and access management; Software as a service (SAAS) services featuring software for use in authentication and digital signatures; Software as a service (SAAS) services featuring software for use in cryptography key generation, distribution and management; Software as a service (SAAS) services featuring software for the creation, development and maintenance of blockchain and cryptocurrencies;
EUCLID CROWN STERLING LIMITED Suite 310 4040 MacArthur Blvd. Newport Beach CA 92660 Downloadable software for data security and encryption; Downloadable software for the secure transmission of electronic data and information; Downloadable software for the decryption and encryption of electronic data in the field of cryptography; Downloadable software for use in identity and access management; Downloadable software for use in authentication and digital signatures; Downloadable software for use in cryptography key generation, distribution and management; Downloadable application programming interface (API) software;Software as a service (SAAS) services featuring software for data security and encryption; Software as a service (SAAS) services featuring software for the secure transmission of electronic data and information; Software as a service (SAAS) services featuring software for the decryption and encryption of electronic data in the field of cryptography; Software as a service (SAAS) services featuring software for use in identity and access management; Software as a service (SAAS) services featuring software for use in authentication and digital signatures; Software as a service (SAAS) services featuring software for use in cryptography key generation, distribution and management; Application service provider featuring application programming interface (API) software;
KIQ KnectIQ Inc. Suite 1 724 Bielenberg Dr. Woodbury MN 55125 Downloadable software for data security and endpoint authentication;KNECT IQ; CONNECT IQ;Providing online nondownloadable software for data security and endpoint authentication; Infrastructure as a Service featuring software for data security and endpoint authentication; Software as a Service featuring software for data security and endpoint authentication; Design, development, and customization of computer software;
KIQ ASSURE KnectIQ Inc. Suite 1 724 Bielenberg Dr. Woodbury MN 55125 Downloadable software for data security and endpoint authentication;KNECT IQ ASSURE; CONNECT IQ ASSURE;Providing online nondownloadable software for data security and endpoint authentication; Infrastructure as a Service featuring software for data security and endpoint authentication; Software as a Service featuring software for data security and endpoint authentication; Design, development, and customization of computer software;
KNECTIQ KnectIQ Inc. Suite 1 724 Bielenberg Dr. Woodbury MN 55125 Downloadable software for data security and endpoint authentication;
SAFECONDUCT BACKOFFICE ASSOCIATES 115 4th Ave #205 Needham Heights MA 02494 downloadable software for data security and encryption;SAFE CONDUCT;
TIME CROWN STERLING LIMITED Suite 310 4040 MacArthur Blvd. Newport Beach CA 92660 Downloadable software for data security and encryption; downloadable software for use in cryptography; downloadable software for use in identity and access management; downloadable software for use in authentication and digital signatures; downloadable software for use in cryptography key generation, distribution and management; downloadable software for the creation, development and maintenance of blockchain and cryptocurrencies;Software as a service (SAAS) services featuring software for data security and encryption; Software as a service (SAAS) services featuring software for use in cryptography; Software as a service (SAAS) services featuring software for use in identity and access management; Software as a service (SAAS) services featuring software for use in authentication and digital signatures; Software as a service (SAAS) services featuring software for use in cryptography key generation, distribution and management; Software as a service (SAAS) services featuring software for the creation, development and maintenance of blockchain and cryptocurrencies;
TIME AI CROWN STERLING LIMITED Suite 310 4040 MacArthur Blvd. Newport Beach CA 92660 Downloadable software for data security and encryption; Downloadable software for the decryption and encryption of electronic data in the field of cryptography; Downloadable software for use in identity and access management; Downloadable software for use in authentication and digital signatures; Downloadable software for use in cryptography key generation, distribution and management; Downloadable software for the creation, development and maintenance of blockchain and cryptocurrencies;Software as a service (SAAS) services featuring software for data security and encryption; Software as a service (SAAS) services featuring software for the decryption and encryption of electronic data in the field of cryptography; Software as a service (SAAS) services featuring software for use in identity and access management; Software as a service (SAAS) services featuring software for use in authentication and digital signatures; Software as a service (SAAS) services featuring software for use in cryptography key generation, distribution and management; Software as a service (SAAS) services featuring software for the creation, development and maintenance of blockchain and cryptocurrencies;
TIME AI CROWN STERLING LIMITED Suite 310 4040 MacArthur Blvd. Newport Beach CA 92660 Downloadable software for data security and encryption; Downloadable software for the decryption and encryption of electronic data in the field of cryptography; Downloadable software for use in identity and access management; Downloadable software for use in authentication and digital signatures; Downloadable software for use in cryptography key generation, distribution and management; Downloadable software for the creation, development and maintenance of blockchain and cryptocurrencies; Downloadable software for the secure transmission of electronic data and information; Downloadable application programming interface (API) software;Software as a service (SAAS) services featuring software for data security and encryption; Software as a service (SAAS) services featuring software for the decryption and encryption of electronic data in the field of cryptography; Software as a service (SAAS) services featuring software for use in identity and access management; Software as a service (SAAS) services featuring software for use in authentication and digital signatures; Software as a service (SAAS) services featuring software for use in cryptography key generation, distribution and management; Software as a service (SAAS) services featuring software for the creation, development and maintenance of blockchain and cryptocurrencies; Software as a service (SAAS) services featuring software for the secure transmission of electronic data and information; Application service provider featuring application programming interface (API) software;
ZECTONAL DEEP DATA INSPECTION Zectonal 5th Floor 901 N. Glebe Road Arlington VA 22203 Downloadable software for data security, data content, data volume and data service level monitoring and for analyzing data for data quality and security threats;DEEP DATA INSPECTION;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A virtual security server enabling a set of applications to access a plurality of security services. In response to a service request from a software application, the virtual security server receive service determines which of the security servers is able to provide the requested service. The virtual security server sends to a selected security server data enabling the selected security server to provide the security service corresponding to the service request. Accordingly, communication between the applications and the security servers is simplified because the application are not required to manage negotiation protocols associated with the security servers and choose the security server(s) appropriate for the required service.