NETWORK SECURITY SOFTWARE IDENTITY

Brand Owner (click to sort) Address Description
CONCENSUS CONCENSUS CONSULTING 51 Dutilh Rd STE 140 Cranberry Twp PA 16066 Network security software for identity management, namely, network and cloud computing applications for use in the management, integration, data-sharing and synchronization of information stored in computer applications, databases, directories, meta-directories, operating systems, and other computer data-storage sources, and instructional manuals distributed together as a unit; software for sharing data between applications and systems; computer security software for giving users access to networks, storage devices, servers, and operating systems; software for creating and editing user roles and permissions; software for providing a single user sign-on to access multiple computer systems;Reseller services, namely, distributorship services in the field of computer software;Customized software development services; computer software consulting services; computer consulting services; consulting services in the field of software design, selection, installation, integration, implementation, and data migration services;
CONCENSUS CONNECT CONCENSUS CONSULTING 51 Dutilh Rd STE 140 Cranberry Twp PA 16066 Network security software for identity management, namely, network and cloud computing applications for use in the management, integration, data-sharing and synchronization of information stored in computer applications, databases, directories, meta-directories, operating systems, and other computer data-storage sources, and instructional manuals distributed together as a unit; software for sharing data between applications and systems; computer security software for giving users access to networks, storage devices, servers, and operating systems; software for creating and editing user roles and permissions; software for providing a single user sign-on to access multiple computer systems;CONNECT;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. In one embodiment, the present invention provides for receiving security events from a network device by a distributed software agent of a network security system, determining a priority of each received security event, and storing the security events in a plurality of prioritized event buffers based on the determined priorities for a period of time determined by a timer. Upon expiration of the timer, a batch of security events for transport to a security event manager of the network security system can be created by including security events in the batch in order of priority until the batch is full.