NETWORK SECURITY SOFTWARE

Brand Owner (click to sort) Address Description
ASG PASSWERKS ATLANTIC SYSTEMS GROUP, INC. Suite 102 4195 US HWY 1 Rockledge FL 32955 network security software; printed publications and manuals related to the foregoing;computer consulting services; consulting services relating to network and Internet security;
BELDEN SECURITY BELDEN INC. 1 N. Brentwood Blvd., 15th Floor St. Louis MO 63105 Network security software, namely, software for the creation of firewalls; computer network security software;SECURITY;
CELESTIX Celestix Networks PTE LTD. 3125 Skyway Court Fremont CA 94539 Network Security Software;
INLINE IPS intoto, Inc. Suite 300 3100 De La Cruz Boulevard Santa Clara CA 95054 network security software;IN LINE IPS;IPS;
PARENTALCQ intoto, Inc. Suite 300 3100 De La Cruz Boulevard Santa Clara CA 95054 network security software;PARENTAL CQ;
PASSWERKS ATLANTIC SYSTEMS GROUP, INC. Suite 102 4195 US HWY 1 Rockledge FL 32955 network security software; printed publications and manuals related to the foregoing;computer consulting services; consulting services relating to networking and Internet security;
TOFINO BELDEN INC. 1 N. Brentwood Blvd., 15th Floor St. Louis MO 63105 Network security software, namely, firewalls; computer networking security software;Technical consulting services in the field of network security;
TOFINO Byres Security Inc. P.O. Box 178 7217 Lantzville Road, Unit 5 Lantzville V0R2H0 Canada Network security software, namely, firewalls; computer networking security software;Technical consulting services in the field of network security;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. In one embodiment, the present invention provides for receiving security events from a network device by a distributed software agent of a network security system, determining a priority of each received security event, and storing the security events in a plurality of prioritized event buffers based on the determined priorities for a period of time determined by a timer. Upon expiration of the timer, a batch of security events for transport to a security event manager of the network security system can be created by including security events in the batch in order of priority until the batch is full.