SOFTWARE CYBERSECURITY

Brand Owner (click to sort) Address Description
1STEALTH INVISINET TECHNOLOGIES 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile devices, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;ONE STREALTH;Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes;
4STEALTH INVISINET TECHNOLOGIES 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile devices, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;FOUR STEALTH; FOR STEALTH;Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes;
BLUE ARMOR INVISINET TECHNOLOGIES 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile device, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;
BLUE ARMOR Blue Armor Technologies Suite 224 4420 Cypress Creek Parkway Houston TX 77068 Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile device, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;
CLOAKNET INVISINET TECHNOLOGIES 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile devices, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;CLOAK NET;Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes;
HOUDININET INVISINET TECHNOLOGIES 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile devices, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes;
INVISINET INVISINET TECHNOLOGIES 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile devices, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes;
NETCLOAK INVISINET TECHNOLOGIES 4422 CYPRESS CREEK PKWY STE. 250 HOUSTON TX 770683411 Software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Recorded computer application software for gateways, laptops, desktops, servers, mobile devices, and Internet Of Things devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, cards, tags, key fobs, dongles, and gateways;NET CLOAK;Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes;
VALENCOR Valencor 5553 Beverleys Mill Rd Broad Run VA 20137 Software for cybersecurity, network architecture and data architectures; software and hardware for data replication and data integration; software for cybersecurity, data integration, data replication and data architectures; software and hardware for electronic data security systems; Downloadable software for distributed, cloud-agnostic, multi-publisher data for Network-Centric Security (NCS) mission systems, namely, software to extract, transform, encrypt, wrapper, securely deliver, replicate, deconflict, or update data changes between Data-Centric Security (DCS) micro-segments; Downloadable software for distributed, cloud-agnostic, multi-publisher data for Data-Centric Security (DCS) micro-segments, namely, software for micro-segments operating at differing security levels in a Zero Trust Architecture (ZTA) or equivalent environment/data fabric; Downloadable software that tracks application performance, performs periodic maintenance and provides reports and alerts concerning such performance; Downloadable software that extracts, transforms, encrypts, wrappers, securely delivers, replicates, deconflicts, or updates data changes between Data-Centric Security (DCS) micro-segments; Downloadable software for multi-publisher, bi-directional, filtered data replication between micro-segments; Software for distributed, cloud-agnostic, multi-publisher data for Network-Centric Security (NCS) mission systems, namely, software to extract, transform, encrypt, wrapper, securely deliver, replicate, deconflict, or update data changes between Data-Centric Security (DCS) micro-segments; Software for distributed, cloud-agnostic, multi-publisher data for Data-Centric Security (DCS) micro-segments, namely, software for micro-segments operating at differing security levels in a Zero Trust Architecture (ZTA) or equivalent environment/data fabric; Software that tracks application performance, performs periodic maintenance and provides reports and alerts concerning such performance; Software that extracts, transforms, encrypts, wrappers, securely delivers, replicates, deconflicts, or updates data changes between Data-Centric Security (DCS) micro-segments; Software for multi-publisher, bi-directional, filtered data replication between micro-segments;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for protecting software components of a software system can be used to guard against faults which might occur during the execution of a software component. A software component which is particularly prone to faults may be designated for protection. Faults occurring during execution of these protected software components can be detected, execution of the protected software component can be halted, and the software system may be restored to the state it held before execution of the protected software component commenced. The software system can then resume executing in a normal manner. Furthermore, a default value for the protected software component may be assigned in the event that a fault is detected during execution of the protected software component.