RECORDED DOWNLOADABLE COMPUTER SECURITY

Brand Owner Address Description
BIOS-SHIELD Janus Technologies, Inc. 1292 Kifer Road, Suite 808 Sunnyvale CA 94086 Recorded and downloadable computer security software for computers and computer networks; Recorded and downloadable computer security software for monitoring, recording, blocking, and analyzing electronic communications; Recorded and downloadable computer software for network security purposes; Recorded and downloadable computer software for preventing network intrusion; Recorded and downloadable computer software for monitoring, recording, blocking and analyzing network activity; computer security firmware that sits below the operating system (OS), within the basic input output system (BIOS); Downloadable cloud-based security software for computers and computer networks made available to users on demand or through the Internet; Downloadable cloud-based security software for monitoring, recording, blocking and analyzing electronic communications made available to users on demand or through the Internet;Providing cloud-based computer services in the nature of providing on-line updates, enhancements and patches for security software for computers and computer networks and electronic communications hardware made available to users on demand or through the Internet;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.