PROVIDING COMPUTER SOFTWARE SERVICES

Brand Owner (click to sort) Address Description
ADAPTIVE TRUST PROFILE FORCEPOINT FEDERAL HOLDINGS 10900-A STONELAKE BLVD. QUARRY OAKS 1, SUITE 350 AUSTIN TX 78759 Providing computer software services, namely, web, hardware, network, computer and internet security services by restricting and monitoring access to unauthorized areas in a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security; providing temporary use of non-downloadable computer software, namely, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and/or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of non-downloadable computer software for security and protection, namely, software for use in maintaining and monitoring web security, data security and e-mail security; Software as a Service (SaaS) services, namely, hosting cloud and datacenter infrastructure software for use in computer security and restricting access to computers and web sites; cloud computing services featuring computer software for use in security and protection, namely, software for restricting and monitoring access to a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and/or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of online non-downloadable computer software for the security and protection of data, networks, and communications;
CYBER BEHAVIOR CATALOG FORCEPOINT FEDERAL HOLDINGS 10900-A STONELAKE BLVD. QUARRY OAKS 1, SUITE 350 AUSTIN TX 78759 Providing computer software services, namely, web, hardware, network, computer and internet security services by restricting and monitoring access to unauthorized areas in a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security; providing temporary use of non-downloadable computer software, namely, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and/or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of non-downloadable computer software for security and protection, namely, software for use in maintaining and monitoring web security, data security and e-mail security; Software as a Service (SaaS) services, namely, hosting cloud and datacenter infrastructure software for use in computer security and restricting access to computers and web sites; cloud computing services featuring computer software for use in security and protection, namely, software for restricting and monitoring access to a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and/or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of online non-downloadable computer software for the security and protection of data, networks, and communications;
DYNAMIC DATA PROTECTION FORCEPOINT FEDERAL HOLDINGS 10900-A STONELAKE BLVD. QUARRY OAKS 1, SUITE 350 AUSTIN TX 78759 Providing computer software services, namely, web, hardware, network, computer and internet security services by restricting and monitoring access to unauthorized areas in a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security; providing temporary use of non-downloadable computer software, namely, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and/or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of non-downloadable computer software for security and protection, namely, software for use in maintaining and monitoring web security, data security and e-mail security; Software as a Service (SaaS) services, namely, hosting cloud and datacenter infrastructure software for use in computer security and restricting access to computers and web sites; cloud computing services featuring computer software for use in security and protection, namely, software for restricting and monitoring access to a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and/or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of online non-downloadable computer software for the security and protection of data, networks, and communications;
DYNAMIC EDGE PROTECTION FORCEPOINT FEDERAL HOLDINGS 10900-A STONELAKE BLVD. QUARRY OAKS 1, SUITE 350 AUSTIN TX 78759 Providing computer software services, namely, web, hardware, network, computer and internet security services by restricting and monitoring access to unauthorized areas in a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security; providing temporary use of non-downloadable computer software, namely, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of non-downloadable computer software for security and protection, namely, software for use in maintaining and monitoring web security, data security and e-mail security; Software as a Service (SaaS) services, namely, hosting cloud and datacenter infrastructure software for use in computer security and restricting access to computers and web sites; cloud computing services featuring computer software for use in security and protection, namely, software for restricting and monitoring access to a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of online non-downloadable computer software for the security and protection of data, networks, and communications;
DYNAMIC USER PROTECTION FORCEPOINT FEDERAL HOLDINGS 10900-A STONELAKE BLVD. QUARRY OAKS 1, SUITE 350 AUSTIN TX 78759 Providing computer software services, namely, web, hardware, network, computer and internet security services by restricting and monitoring access to unauthorized areas in a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security; providing temporary use of non-downloadable computer software, namely, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of non-downloadable computer software for security and protection, namely, software for use in maintaining and monitoring web security, data security and e-mail security; Software as a Service (SaaS) services, namely, hosting cloud and datacenter infrastructure software for use in computer security and restricting access to computers and web sites; cloud computing services featuring computer software for use in security and protection, namely, software for restricting and monitoring access to a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of online non-downloadable computer software for the security and protection of data, networks, and communications;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An integrated hardware and software monitoring system for a remote computer includes an event monitoring module loaded on the remote computer. The event monitoring module includes a hardware event detector that detects hardware events on the remote computer that may need attention, and a software service detector that detects status of software running on the remote computer to determine if any of the software has failed or is not operating properly, and to output a software event as a result thereof. The monitoring system also includes a data transmission system for performing a data transmission so as to notify a support specialist over a network connection of a hardware event or software event detected by the event monitoring module. The monitoring system further includes a graphical user interface provided on a display of the remote computer for allowing a user of the remote computer to make selections as to which software services and hardware events are to be detected.