DOWNLOADABLE SOFTWARE SECURE INTEGRATION

Brand Owner (click to sort) Address Description
CLOUD EXTENDER INTERNATIONAL BUSINESS MACHINES CORPORATION New Orchard Road Armonk NY 10504 DOWNLOADABLE SOFTWARE FOR SECURE INTEGRATION OF THE MANAGEMENT, ADMINISTRATION, MODIFICATION AND CONTROL OF END USER REMOTE ACCESS TO AN ENTERPRISE SYSTEM; DOWNLOADABLE SOFTWARE FOR PROVIDING SECURE INTEGRATION OF REMOTE ACCESS SERVICES, SERVICES FOR MANAGING, ADMINISTERING, MODIFYING AND CONTROLLING END USER COMPUTER AND MOBILE DEVICES, DATA AND SOFTWARE APPLICATIONS; DOWNLOADABLE SOFTWARE FOR SECURELY INTEGRATING END USER REMOTE CONNECTIVITY TO AN ENTERPRISE SYSTEM SO THAT COMPUTER SOFTWARE APPLICATIONS, COMPUTER NETWORK-BASED SERVICES, FILE SHARING SERVICES, E-MAIL SERVICES AND INTRANET SERVICES CAN BE SECURELY ACCESSED BY AN END-USER CONNECTING REMOTELY WITH COMPUTER AND MOBILE DEVICES TO THE ENTERPRISE SYSTEM LOCAL AREA NETWORK AND FOR USE IN MANAGING, ADMINISTERING, MODIFYING AND CONTROLLING END USER COMPUTER AND MOBILE DEVICES, DATA AND SOFTWARE APPLICATIONS;PROVIDING SECURE TELECOMMUNICATION CONNECTIVITY TO COMPUTER SOFTWARE APPLICATIONS AND COMPUTER NETWORK-BASED SERVICES, FILE SHARING SERVICES, E-MAIL SERVICES, AND INTRANET SERVICES FOR DATA TRANSFER BY WAY OF END USER COMPUTER OR MOBILE DEVICE; PROVIDING ACCESS TO ENTERPRISE SYSTEM INTEGRATION SOFTWARE APPLICATIONS AND RELATED SERVICES FOR MANAGING REMOTE END USER ACCESS TO AN ENTERPRISE COMPUTER SYSTEM, NAMELY, PROVIDING SECURE, GENERAL-PURPOSE CONNECTIVITY SO THAT COMPUTER SOFTWARE APPLICATIONS AND COMPUTER NETWORK-BASED SERVICES, FILE SHARING SERVICES, E-MAIL SERVICES, AND INTRANET SERVICES CAN BE SECURELY ACCESSED BY A USER CONNECTING REMOTELY TO THE ENTERPRISE SYSTEM LOCAL AREA NETWORK WITH AN END-USER COMPUTER OR MOBILE DEVICE, AND MANAGING, ADMINISTERING, MODIFYING AND CONTROLLING END USER COMPUTER AND MOBILE DEVICES;Color is not claimed as a feature of the mark.;TECHNICAL SUPPORT SERVICES, NAMELY, REMOTE ADMINISTRATION AND MANAGEMENT OF IN-HOUSE AND HOSTED END USER COMPUTER AND MOBILE DEVICES; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE INTEGRATION SOFTWARE AND RELATED SERVICES FOR OTHERS TO MANAGE, ADMINISTER, MODIFY AND CONTROL THEIR END USERS' SECURE ACCESS TO AN ENTERPRISE SYSTEM THROUGH AN ONLINE PORTAL, THEIR END-USER COMPUTER AND MOBILE DEVICES, THEIR END USER DATA AND THEIR END USER SOFTWARE APPLICATIONS RUNNING ON THE END-USER COMPUTER AND MOBILE DEVICES CONNECTING REMOTELY TO ENTERPRISE LOCAL AREA NETWORKS; HOSTING ENTERPRISE COMPUTER APPLICATION SOFTWARE ON A COMPUTER SERVER FOR OTHERS TO MANAGE, ADMINISTER, MODIFY, CONTROL AND REPORT THE STATUS OF THEIR END-USER COMPUTER AND MOBILE DEVICES, THEIR END USER DATA AND THEIR END USER SOFTWARE APPLICATIONS RUNNING ON THE END-USER COMPUTER AND MOBILE DEVICES CONNECTING REMOTELY TO LOCAL AREA NETWORKS, AND FOR USE IN CONTROLLING SECURE ACCESS TO THE ENTERPRISE LOCAL AREA NETWORK;
MCM360 Fiberlink Communications Corporation Suite 200 1787 Sentry Parkway West, Building 18 Blue Bell PA 19422 DOWNLOADABLE SOFTWARE FOR SECURE INTEGRATION OF THE MANAGEMENT, ADMINISTRATION, MODIFICATION AND CONTROL OF END USER REMOTE ACCESS TO AN ENTERPRISE SYSTEM; DOWNLOADABLE SOFTWARE FOR PROVIDING SECURE INTEGRATION OF REMOTE ACCESS SERVICES, NAMELY, MANAGING, ADMINISTERING, MODIFYING AND CONTROLLING END USER COMPUTER AND MOBILE DEVICES, DATA AND SOFTWARE APPLICATIONS; DOWNLOADABLE SOFTWARE FOR SECURELY INTEGRATING END USER REMOTE CONNECTIVITY TO AN ENTERPRISE SYSTEM SO THAT COMPUTER SOFTWARE APPLICATIONS, COMPUTER NETWORK-BASED SERVICES, FILE SHARING SERVICES, E-MAIL SERVICES AND INTRANET SERVICES CAN BE SECURELY ACCESSED BY AN END-USER CONNECTING REMOTELY WITH COMPUTER AND MOBILE DEVICES TO THE ENTERPRISE SYSTEM LOCAL AREA NETWORK AND FOR USE IN MANAGING, ADMINISTERING, MODIFYING AND CONTROLLING END USER COMPUTER AND MOBILE DEVICES, DATA AND SOFTWARE APPLICATIONS; DOWNLOADABLE COMPUTER SOFTWARE, NAMELY, MOBILE SOLUTIONS FOR SECURE, REMOTE WORKPLACE ACCESSIBILITY WITH EMPLOYEE-OWNED MOBILE AND COMPUTER DEVICES; DOWNLOADABLE COMPUTER SOFTWARE, NAMELY, CROSS-PLATFORM, CLOUD-BASED SOLUTIONS TO ISOLATE AND CONTAIN WORK DATA ON MOBILE DEVICES; DOWNLOADABLE COMPUTER SOFTWARE, NAMELY, CLOUD-BASED SOLUTION FOR MOBILE DEVICES FOR ENABLING EMPLOYEES TO SECURELY ACCESS CORPORATE DATA WHILE PRESERVING THE MOBILE EXPERIENCE ON PERSONAL MOBILE DEVICES; DOWNLOADABLE COMPUTER SOFTWARE FOR SINGLE LOCATION DUAL MANAGEMENT OF EMAILS, CONTACTS, CALENDAR, APPLICATIONS, DOCUMENTS AND INTERNET ACCESS USING A MOBILE DEVICE; DOWNLOADABLE COMPUTER SOFTWARE, NAMELY, CYBER SECURITY CONTROLS FOR CLOUD COMPUTING THROUGH MOBILE DEVICES; DOWNLOADABLE COMPUTER SOFTWARE APPLICATIONS FOR SECURELY ACCESSING EMAIL, CALENDAR, AND CONTACTS; COMPUTER SOFTWARE IN THE NATURE OF MOBILE APPLICATION CONTAINER SOLUTIONS WITH OPERATIONAL AND SECURITY MANAGEMENT TO PROTECT DATA AGAINST DATA LEAKS; COMPUTER SECURITY SOFTWARE IN THE NATURE OF SECURE DOCUMENT CONTAINER SOLUTION WITH EXPANDED USER SUPPORT FOR CONTENT EDITING; COMPUTER SOFTWARE IN THE NATURE OF A WEB BROWSER TO CONTROL AND ENFORCE COMPLIANCE WITH CORPORATE SECURITY AND HR POLICIES AND PROVIDE SECURE ACCESS TO CORPORATE INTRANET SITES; DOWNLOADABLE COMPUTER SOFTWARE IN THE NATURE OF CLOUD-BASED SOLUTIONS FOR USE ON A SINGLE DEVICE TO PROVIDE PERSONAL AND CORPORATE DATA ACCESS AND USE; COMPUTER SOFTWARE IN THE NATURE OF A REMOTE MOBILE DEVICE WIPE SOLUTION TO REMOTELY WIPE DATA FROM MOBILE DEVICES FOR SUITE CONTAINER, APPLICATION CONTAINER, ENTERPRISE PROFILES, OR WHOLE DEVICE; COMPUTER SOFTWARE FOR IMPLEMENTING ADMINISTRATOR CONTROLS AND INTERACTIVE GRAPHICAL REPORTS FOR MOBILE DEVICE ACCESS AND SECURITY; COMPUTER SOFTWARE FOR EMAIL SECURITY; COMPUTER SOFTWARE FOR PROVIDING MOBILE APPLICATION SECURITY; COMPUTER SOFTWARE APPLICATIONS FOR SECURE DOCUMENT SHARING; COMPUTER SOFTWARE APPLICATIONS FOR SECURE AND CONTROLLED INTERNET BROWSING;PROVIDING SECURE, GENERAL-PURPOSE WIRED AND WIRELESS TELECOMMUNICATIONS CONNECTIVITY FOR TRANSFER AND DATA SO THAT COMPUTER SOFTWARE APPLICATIONS AND COMPUTER NETWORK-BASED SERVICES, FILE SHARING SERVICES, E-MAIL SERVICES, AND INTRANET SERVICES CAN BE SECURELY ACCESSED BY A USER CONNECTING REMOTELY TO THE ENTERPRISE SYSTEM LOCAL AREA NETWORK WITH AN END-USER COMPUTER OR MOBILE DEVICE;MCM 360;PROVIDING TEMPORARY USE OF A WEB-BASED SOFTWARE APPLICATION FOR OTHERS TO MANAGE, ADMINISTER, MODIFY AND CONTROL THEIR END USERS' SECURE ACCESS TO AN ENTERPRISE SYSTEM THROUGH AN ONLINE PORTAL, THEIR END-USER COMPUTER AND MOBILE DEVICES, NAMELY, LAPTOPS, NOTEBOOKS, SMART PHONES, TABLETS, PDAS, THEIR END USER DATA AND THEIR END USER SOFTWARE APPLICATIONS RUNNING ON THE END-USER COMPUTERS AND MOBILE DEVICES CONNECTING REMOTELY TO ENTERPRISE LOCAL AREA NETWORKS; PROVIDING NON-DOWNLOADABLE COMPUTER APPLICATION SOFTWARE ON A COMPUTER SERVER ACCESSIBLE OVER THE INTERNET THAT ENABLES OTHERS TO MANAGE, ADMINISTER, MODIFY, CONTROL AND GENERATE REPORTS ON THE STATUS OF THEIR END-USER COMPUTER AND MOBILE DEVICES, NAMELY, LAPTOPS, NOTEBOOKS, SMART PHONES, TABLETS, PDAS, THEIR END USER DATA AND THEIR END USER SOFTWARE APPLICATIONS RUNNING ON THE END-USER COMPUTER AND MOBILE DEVICES CONNECTING REMOTELY TO LOCAL AREA NETWORKS, AND THAT ENABLES OTHERS TO SECURELY ACCESS TO THE ENTERPRISE LOCAL AREA NETWORK; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE INTEGRATION SOFTWARE FOR OTHERS TO MANAGE, ADMINISTER, MODIFY AND CONTROL THEIR END USERS' SECURE ACCESS TO AN ENTERPRISE SYSTEM THROUGH AN ONLINE PORTAL, THEIR END-USER COMPUTER AND MOBILE DEVICES, THEIR END USER DATA AND THEIR END USER SOFTWARE APPLICATIONS RUNNING ON THE END-USER COMPUTER AND MOBILE DEVICES CONNECTING REMOTELY TO ENTERPRISE LOCAL AREA NETWORKS;
MOBILE CONTEXT MANAGEMENT Fiberlink Communications Corporation Suite 200 1787 Sentry Parkway West, Building 18 Blue Bell PA 19422 DOWNLOADABLE SOFTWARE FOR SECURE INTEGRATION OF THE MANAGEMENT, ADMINISTRATION, MODIFICATION AND CONTROL OF END USER REMOTE ACCESS TO AN ENTERPRISE SYSTEM; DOWNLOADABLE SOFTWARE FOR PROVIDING SECURE INTEGRATION OF REMOTE ACCESS SERVICES, NAMELY, MANAGING, ADMINISTERING, MODIFYING AND CONTROLLING END USER COMPUTER AND MOBILE DEVICES, DATA AND SOFTWARE APPLICATIONS; DOWNLOADABLE SOFTWARE FOR SECURELY INTEGRATING END USER REMOTE CONNECTIVITY TO AN ENTERPRISE SYSTEM SO THAT COMPUTER SOFTWARE APPLICATIONS, COMPUTER NETWORK-BASED SERVICES, FILE SHARING SERVICES, E-MAIL SERVICES AND INTRANET SERVICES CAN BE SECURELY ACCESSED BY AN END-USER CONNECTING REMOTELY WITH COMPUTER AND MOBILE DEVICES TO THE ENTERPRISE SYSTEM LOCAL AREA NETWORK AND FOR USE IN MANAGING, ADMINISTERING, MODIFYING AND CONTROLLING END USER COMPUTER AND MOBILE DEVICES, DATA AND SOFTWARE APPLICATIONS; DOWNLOADABLE COMPUTER SOFTWARE, NAMELY, MOBILE SOLUTIONS FOR SECURE, REMOTE WORKPLACE ACCESSIBILITY WITH EMPLOYEE-OWNED MOBILE AND COMPUTER DEVICES; DOWNLOADABLE COMPUTER SOFTWARE, NAMELY, CROSS-PLATFORM, CLOUD-BASED SOLUTIONS TO ISOLATE AND CONTAIN WORK DATA ON MOBILE DEVICES; DOWNLOADABLE COMPUTER SOFTWARE, NAMELY, CLOUD-BASED SOLUTION FOR MOBILE DEVICES FOR ENABLING EMPLOYEES TO SECURELY ACCESS CORPORATE DATA WHILE PRESERVING THE MOBILE EXPERIENCE ON PERSONAL MOBILE DEVICES; DOWNLOADABLE COMPUTER SOFTWARE FOR SINGLE LOCATION DUAL MANAGEMENT OF EMAILS, CONTACTS, CALENDAR, APPLICATIONS, DOCUMENTS AND INTERNET ACCESS USING A MOBILE DEVICE; DOWNLOADABLE COMPUTER SOFTWARE, NAMELY, CYBER SECURITY CONTROLS FOR CLOUD COMPUTING THROUGH MOBILE DEVICES; DOWNLOADABLE COMPUTER SOFTWARE APPLICATIONS FOR SECURELY ACCESSING EMAIL, CALENDAR, AND CONTACTS; COMPUTER SOFTWARE IN THE NATURE OF MOBILE APPLICATION CONTAINER SOLUTIONS WITH OPERATIONAL AND SECURITY MANAGEMENT TO PROTECT DATA AGAINST DATA LEAKS; COMPUTER SECURITY SOFTWARE IN THE NATURE OF SECURE DOCUMENT CONTAINER SOLUTION WITH EXPANDED USER SUPPORT FOR CONTENT EDITING; COMPUTER SOFTWARE IN THE NATURE OF A WEB BROWSER TO CONTROL AND ENFORCE COMPLIANCE WITH CORPORATE SECURITY AND HR POLICIES AND PROVIDE SECURE ACCESS TO CORPORATE INTRANET SITES; DOWNLOADABLE COMPUTER SOFTWARE IN THE NATURE OF CLOUD-BASED SOLUTIONS FOR USE ON A SINGLE DEVICE TO PROVIDE PERSONAL AND CORPORATE DATA ACCESS AND USE; COMPUTER SOFTWARE IN THE NATURE OF A REMOTE MOBILE DEVICE WIPE SOLUTION TO REMOTELY WIPE DATA FROM MOBILE DEVICES FOR SUITE CONTAINER, APPLICATION CONTAINER, ENTERPRISE PROFILES, OR WHOLE DEVICE; COMPUTER SOFTWARE FOR IMPLEMENTING ADMINISTRATOR CONTROLS AND INTERACTIVE GRAPHICAL REPORTS FOR MOBILE DEVICE ACCESS AND SECURITY; COMPUTER SOFTWARE FOR EMAIL SECURITY; COMPUTER SOFTWARE FOR PROVIDING MOBILE APPLICATION SECURITY; COMPUTER SOFTWARE APPLICATIONS FOR SECURE DOCUMENT SHARING; COMPUTER SOFTWARE APPLICATIONS FOR SECURE AND CONTROLLED INTERNET BROWSING;PROVIDING SECURE, GENERAL-PURPOSE WIRED AND WIRELESS TELECOMMUNICATIONS CONNECTIVITY FOR TRANSFER OF INFORMATION AND DATA SO THAT COMPUTER SOFTWARE APPLICATIONS AND COMPUTER NETWORK-BASED SERVICES, FILE SHARING SERVICES, E-MAIL SERVICES, AND INTRANET SERVICES CAN BE SECURELY ACCESSED BY A USER CONNECTING REMOTELY TO THE ENTERPRISE SYSTEM LOCAL AREA NETWORK WITH AN END-USER COMPUTER OR MOBILE DEVICE;PROVIDING TEMPORARY USE OF A WEB-BASED SOFTWARE APPLICATION FOR OTHERS TO MANAGE, ADMINISTER, MODIFY AND CONTROL THEIR END USERS' SECURE ACCESS TO AN ENTERPRISE SYSTEM THROUGH AN ONLINE PORTAL, THEIR END-USER COMPUTER AND MOBILE DEVICES, NAMELY, LAPTOPS, NOTEBOOKS, SMART PHONES, TABLETS, PDAS, THEIR END USER DATA AND THEIR END USER SOFTWARE APPLICATIONS RUNNING ON THE END-USER COMPUTERS AND MOBILE DEVICES CONNECTING REMOTELY TO ENTERPRISE LOCAL AREA NETWORKS; PROVIDING NON-DOWNLOADABLE COMPUTER APPLICATION SOFTWARE ON A COMPUTER SERVER ACCESSIBLE OVER THE INTERNET THAT ENABLES OTHERS TO MANAGE, ADMINISTER, MODIFY, CONTROL AND GENERATE REPORTS ON THE STATUS OF THEIR END-USER COMPUTER AND MOBILE DEVICES, NAMELY, LAPTOPS, NOTEBOOKS, SMART PHONES, TABLETS, PDAS, THEIR END USER DATA AND THEIR END USER SOFTWARE APPLICATIONS RUNNING ON THE END-USER COMPUTER AND MOBILE DEVICES CONNECTING REMOTELY TO LOCAL AREA NETWORKS, AND THAT ENABLES OTHERS TO SECURELY ACCESS TO THE ENTERPRISE LOCAL AREA NETWORK; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE INTEGRATION SOFTWARE FOR OTHERS TO MANAGE, ADMINISTER, MODIFY AND CONTROL THEIR END USERS' SECURE ACCESS TO AN ENTERPRISE SYSTEM THROUGH AN ONLINE PORTAL, THEIR END-USER COMPUTER AND MOBILE DEVICES, THEIR END USER DATA AND THEIR END USER SOFTWARE APPLICATIONS RUNNING ON THE END-USER COMPUTER AND MOBILE DEVICES CONNECTING REMOTELY TO ENTERPRISE LOCAL AREA NETWORKS;
SECURE PRODUCTIVITY SUITE INTERNATIONAL BUSINESS MACHINES CORPORATION New Orchard Road Armonk NY 10504 Downloadable software for secure integration of the management, administration, modification and control of end user remote access to an enterprise system; downloadable software for providing secure integration of remote access services, namely, services for managing, administering, modifying and controlling end user computer and mobile devices, data and software applications; downloadable software for securely integrating end user remote connectivity to an enterprise system so that computer software applications, computer network-based services, file sharing services, e-mail services and intranet services can be securely accessed by an end-user connecting remotely with computer and mobile devices to the enterprise system local area network and for use in managing, administering, modifying and controlling end user computer and mobile devices, data and software applications; mobile device software for secure, remote workplace accessibility with employee-owned mobile and computer devices; software for cross-platform, cloud-based solutions to isolate and contain work data on mobile devices; downloadable computer software, namely, cloud-based solution for mobile devices for enabling employees to securely access corporate data while preserving the mobile experience on personal mobile devices; software for single location dual management of emails, contacts, calendar, applications, documents and internet access using a mobile device; software applications for cyber security controls for cloud computing through mobile devices; software applications for e-mail, calendar, and contacts; software in the nature of mobile application container software with operational and security management to protect data against data leaks; computer security software in the nature of secure document container software with expanded user support for content editing; computer software in the nature of a web browser to control and enforce compliance with corporate security and HR polices and provide secure access to corporate intranet sites; computer software in the nature of cloud-based solutions for use on a single device to provide personal and corporate data access and use; software in the nature of a remote mobile device wipe solution to remotely wipe data from mobile devices; software for implementing administrator controls and interactive graphical reports for mobile device access and security; software for e-mail security; software for providing mobile application security; software for secure document sharing; and software for secure and controlled internet browsing;Managed remote access services provided via software, namely, providing secure, general-purpose connectivity so that computer software applications and computer network-based services, file sharing services, e-mail services, and intranet services can be securely accessed by a user connecting remotely to the enterprise local area network with an end-user computer or mobile device;PRODUCTIVITY SUITE;Providing temporary use of non-downloadable software in the nature of mobile solutions for secure, remote workplace accessibility with employee-owned mobile and computer devices; providing temporary use of non-downloadable software in the nature of cross-platform, cloud-based solutions to isolate and contain work data on mobile devices; providing temporary use of non-downloadable software in the nature of a cloud-based solution for mobile devices for enabling employees to securely access corporate data while preserving the mobile experience on personal mobile devices; providing temporary use of non-downloadable software in the nature of software for single location dual management of emails, contacts, calendar, applications, documents and internet access using a mobile device; providing temporary use of non-downloadable software in the nature of cyber security controls for cloud computing through mobile devices; providing temporary use of non-downloadable integration software for others to manage, administer, modify and control their end users' secure access to an enterprise system through an online portal, their end-user computer and mobile devices, their end user data and their end user software applications running on the end-user computer and mobile devices connecting remotely to enterprise local area networks; hosting the enterprise computer application software of others on a computer server for others to manage, administer, modify, control and report the status of their end-user computer and mobile devices, their end user data and their end user software applications running on the end-user computer and mobile devices connecting remotely to local area networks, and for use in controlling secure access to the enterprise local area network;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A technique is presented for integrating software components. The technique includes providing an application integration model capable of adapting to different environments by dynamically using different software components at application runtime. The software components are categorized into different stages, with the stages being indicative of when the software components are to be loaded and executed within an application by the application integration model. The technique further includes employing the application integration model to assemble software components into the application within a runtime environment. The application integration model includes an application runtime driver (ARD), which drives work flows of the application integration model through multiple predefined application stages, and a component runtime integration box (CRIB), which includes multiple common data structures employed by the software components during integration into the application.