SECURITY PLATFORM

Brand Owner (click to sort) Address Description
ONAPSIS SECURITY PLATFORM Onapsis, Inc. Suite 1800 101 Federal Street Boston MA 02110 SECURITY PLATFORM;Providing temporary use of on-line non-downloadable software for providing network, Internet, and computer security and performing security audits; providing temporary use of on-line non-downloadable software for use for security purposes with respect to customer relationship management, enterprise resource planning, supply chain management, data warehousing and business intelligence systems; consultation relating to computer software design, computer programming, maintenance of computer software, and extension and addition of functions to computer software; consultation relating to providing network, Internet, and computer security; consultation relating to security with respect to customer relationship management, enterprise resource planning, supply chain management, data warehousing and business intelligence systems; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; providing a website featuring information regarding computer system and information security;
SECURITY OPERATING PLATFORM Palo Alto Networks, Inc. 3000 Tannery Way Santa Clara CA 95054 SECURITY AND PLATFORM;Providing temporary use of non-downloadable computer software for browsing and accessing computer software programs;
UNIFIED SECURITY PLATFORM WATCHGUARD TECHNOLOGIES, INC. 505 5th Ave. S, Ste 500 Seattle WA 98104 SECURITY PLATFORM;Providing online non-downloadable software for identifying malware attacks; Providing online non-downloadable software used for detection of malicious websites, botnets, and wireless access points; Providing online non-downloadable software providing the ability to manage traffic on a computer network; online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Providing online non-downloadable software for management of computer software applications on a user's network; Providing online non-downloadable computer software for visualization of connected devices and wireless access points; Providing online non-downloadable software for monitoring, managing, and anonymizing personally identifying information and protecting confidential data on computer networks; computer security services in the nature of providing authentication, issuance, and validation of network users; online cloud-based services used for authentication in the fields of security monitoring, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks; Computer security services, namely, online monitoring computer networks for securing and protecting data and information from unauthorized access and malware attacks; Technical support, namely, online monitoring the technological functions of computer network systems;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An apparatus may include a root of trust for measurement (RTM) module coupled to a verified platform security property policy module and a comparison module. The comparison module may operate to prevent transfer of control to an operating system (and/or halt the boot process) if a policy included in the platform security property policy module is violated. A system may include a memory coupled to a processor, a platform security property policy module, and a comparison module. The memory may include an RTM. A method may include beginning execution at an entry point within an RTM, determining that the RTM is trustworthy, determining that a main initialization code associated with a platform is trustworthy and transferring control to the main initialization code, and otherwise, refraining from transferring control to the main initialization code.