SOFTWARE SYSTEM VULNERABILITY MANAGEMENT

Brand Owner (click to sort) Address Description
AUDIT ON CONNECT SYMANTEC CORPORATION 350 Ellis Street Mountain View CA 94043 Software for system vulnerability management;AUDIT;
AUDIT ON DETECT Pedestal Software, Inc. 199 Wells Avenue Newton MA 02459 Software for system vulnerability management;Computer security services, namely system vulnerability management services, namely vulnerability assessment, configuration management, patch management, and security policy compliance; computer security consulting services;AUDIT;
AUDITEXPRESS SYMANTEC CORPORATION 350 Ellis Street Mountain View CA 94043 Software for system vulnerability management;AUDIT EXPRESS;Computer security services, namely system vulnerability management services, namely vulnerability assessment, configuration management, patch management, and security policy compliance; and computer security consulting services;
SCAN ON DETECT Pedestal Software, Inc. 199 Wells Avenue Newton MA 02459 Software for system vulnerability management;Computer security services, namely system vulnerability management services, namely vulnerability assessment, configuration management, patch management, and security policy compliance; computer security consulting services;SCAN;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The disclosed invention is a software license management system (SLMS) utilizing a web-based interactive database to automate a software management process (SWMP) for managing software assets, measuring compliance requirements, and tracking/reporting status as necessary to assure proficiency and adherence to implementation requirements of the software management process. The SWMP is a process consisting of five different phases. The five steps of the SWMP involve identification of various solution alternatives, acquisition, deployment, maintenance and software retirement. The SWMP establishes high-level software management process to avoid litigation and penalties, maximize software asset utilization through tighter inventory control, and capitalize on the software procurement process.