FORTIFY CLOUD

Brand Owner Address Description
FORTICLOUD Fortinet, Inc. 899 Kifer Road Sunnyvale CA 94086 FORTIFY CLOUD;computer services, namely, cloud hosting provider services; consulting services in the field of cloud computing; cloud computing featuring software for use in database management, security analytics and management service; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; technical support services, namely, remote infrastructure management services for monitoring, administration and management of public and private cloud computing it and application systems; electronic data storage; electronic storage of reports, files and documents; electronic storage of electronic media; cloud based computer services for collecting, storing, synthesizing, analyzing, and managing data and information from computer security systems; computer services, namely, hosting on-line web facilities for others for organizing and collecting information; Software as a service (SAAS) services featuring software for data analysis and management, security analytics, data automation, data collection and reporting; software as a service (SAAS) services featuring software for providing cloud-based analytics for network and computer security systems; software as a service (SAAS) services featuring software for providing real-time monitoring, alerting, updating and upgrading services for network and computer security systems; software as a service (SAAS) services featuring software for providing centralized management and storage of data, reports, and information; computer monitoring service which tracks application software performance, performs periodic maintenance and provides reports and alerts concerning such performance; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts; software as a service (SAAS) services featuring software for monitoring network and security activity and for generating reports and statistics on such activity; Software as a service (SAAS) services featuring software for monitoring cyber security analytics; Software as a service (SAAS) services featuring security software for reporting on the key security indicators of network and computer security systems; software as a service (SAAS) services featuring software security analytics for predicting threats and delivering threat intelligence; software as a service (SAAS) services featuring software for allowing third parties to secure and monitor computer applications; cloud computing featuring software for use in database management and on-line storage and backup; computer services, namely, monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; computer consultation in the field of computer security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess security vulnerability; maintenance of computer software; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; computer consultation services in the field of computer security auditing; computer consulting services; computer software and network security research and development services; computer software and network security management and analysis, namely, remote and on-line system management and analysis of the information technology (IT) systems and networks of others; computer software and network security management and analysis services that allows users to view risk posture and network performance, to track network activity and to access reports regarding the same; computer network security management and analysis, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer network security management and analysis in the field of updating of computer software relating to computer security and prevention of computer risks; technical support services related to the provision of antivirus, anti-spam, anti-spyware, anti-malware, web-content filtering and/or intrusion detection and prevention for network and computer security; troubleshooting of computer software and hardware problems and monitoring of network systems; maintenance, upgrading, and updating of computer software; computer services, namely, providing a web-based system comprised of the temporary use of non-downloadable software to be used by others in the monitoring of computer systems for security purposes;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A sterilization apparatus wherein one or more electron beam tubes are used to direct electron beams into an ambient gaseous environment to create an electron plasma cloud into which non-sterile target objects may be moved. The electron plasma cloud is formed by interaction of the electron beam with the ambient atmosphere. Helium or other like gaseous may be used to expand the effective volume of the electron plasma cloud. Manipulators are used to move target objects in the electron plasma cloud, exposing non-sterile surfaces to the cloud and then joining the surfaces together where appropriate. The beam tube used to generate the electron beam has a thin low energy absorbing window which allows relatively low energy beams to be used, minimizing damage to materials within the surface of the target objects.