LIBERATE

Welcome to the Brand page for “LIBERATE”, which is offered here for Downloadable computer software that facilitates identity federation, facilitates multi-factor and strong authentication, facilitates access control for web, mobile and application programmable interface (api); downloadable computer software that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification; downloadable software for api traffic security; downloadable software for api activity monitoring and attack detection and reporting; security software, being downloadable, for data, applications, and computer systems accessed via api or other programmatic methods; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion; downloadable software for monitoring and maintaining network security; downloadable computer software for use in the safeguarding of network data or network services; downloadable computer software for detecting security threat; downloadable software for securing api traffic across hybrid clouds; downloadable software for protecting computers and network services from attack; computer software for the detection and removal of computer viruses and threats; computer software for managing and filtering electronic and wireless communications; computer software for protecting and securing the integrity of data computer networks, mobile devices, electronic and wireless communications and applications; anti-virus software; computer software for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems; computer software for providing security for email, internal and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware, and other undesirable content; computer software for tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; computer software for secure storage and management of usernames and passwords; computer hardware and software used to allow individuals to upload and download information, software, programs, media or documents from an online digital network, cloud network or server; computer hardware and software for publishing data to digital and cloud networks;licensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data;computer security consultancy; computer security consulting services in the fields of information security, computer security, network security, cyber security, internet security, and data security; monitoring of computer systems for security purposes for the protection of information and data; computer security consulting services in the field of incident response to information, computer, network and internet security breaches; computer network security services and computer security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis, all of the foregoing for the protection of information and data; cybersecurity services, penetration testing of computers and information systems and networks for vulnerability assessment and management, risk assessment in the nature of testing of information systems to determine vulnerability, data breach threat analysis, and network threat analysis, all of the foregoing for the protection of information and data; consulting in the field of computer security and electronic data security services, providing cyber threat data intelligence collection and analysis services and solutions therefor; computer security services in the nature of providing an internet trust centre; computer security assurance; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; authentication, issuance and validation of digital certificates; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the internet;computer security services in the nature of detecting, reporting, investigating and resolving security incidents of network abuse and email abuse; computer security services in the nature of providing an internet trust centre, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; managed computer network and internet security services; computer security services in the nature of filtering content on the internet; software as a service namely, hosting non-downloadable computer software for use by others that scans networks and websites to detect and identify vulnerabilities and malware; online services, providing internet-based and network-based computer virus protection services for others; security verification of computer network firewalls, servers and other network devices from unauthorized access; computer services, detection of viruses and threats; providing user authentication services using single sign-on technology for online software applications; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (api); software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification, software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates api traffic security; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates api activity monitoring and attack detection and reporting; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates computer network security; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates cloud-based computer security; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates monitoring computer networks; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates the detection of computer network intrusion; software as a service (saas) services, hosting non-downloadable computer software for use by others for monitoring and maintaining network security; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates safeguarding of network data or network services; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates the detection of security threat; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates the protection of computers and network services from attack; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates the detection and removal of computer viruses and threats; software as a service (saas) services, hosting non-downloadable computer software for use by others for managing and filtering electronic and wireless communications; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates the protection and securing the integrity of data computer networks, mobile devices, electronic and wireless communications and applications; software as a service (saas) services, hosting non-downloadable computer software for use by others for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates security for email, internal and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware, and other undesirable content; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; software as a service (saas) services, hosting non-downloadable computer software for use by others for secure storage and management of usernames and passwords; software as a service (saas) services, hosting non-downloadable computer software for use by others that facilitates the upload and download of information, software, programs, media or documents from an online digital network, cloud network or server; identity verification services, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (api);.

Its status is currently believed to be active. Its class is unavailable. “LIBERATE” is believed to be currently owned by “JISC”.


Owner:
JISC
Owner Details
Description:
Downloadable computer software that facilitates identity federation, facilitates multi-factor and strong authentication, facilitates access control for web, mobile and application programmable interface (API); downloadable computer software that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification; downloadable software for API traffic security; downloadable software for API activity monitoring and attack detection and reporting; security software, being downloadable, for data, applications, and computer systems accessed via API or other programmatic methods; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion; downloadable software for monitoring and maintaining network security; downloadable computer software for use in the safeguarding of network data or network services; downloadable computer software for detecting security threat; downloadable software for securing API traffic across hybrid clouds; downloadable software for protecting computers and network services from attack; computer software for the detection and removal of computer viruses and threats; computer software for managing and filtering electronic and wireless communications; computer software for protecting and securing the integrity of data computer networks, mobile devices, electronic and wireless communications and applications; anti-virus software; computer software for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems; computer software for providing security for email, internal and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware, and other undesirable content; computer software for tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; computer software for secure storage and management of usernames and passwords; computer hardware and software used to allow individuals to upload and download information, software, programs, media or documents from an online digital network, cloud network or server; computer hardware and software for publishing data to digital and cloud networks;Licensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data;Computer security consultancy; computer security consulting services in the fields of information security, computer security, network security, cyber security, internet security, and data security; monitoring of computer systems for security purposes for the protection of information and data; computer security consulting services in the field of incident response to information, computer, network and internet security breaches; computer network security services and computer security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis, all of the foregoing for the protection of information and data; cybersecurity services, penetration testing of computers and information systems and networks for vulnerability assessment and management, risk assessment in the nature of testing of information systems to determine vulnerability, data breach threat analysis, and network threat analysis, all of the foregoing for the protection of information and data; consulting in the field of computer security and electronic data security services, providing cyber threat data intelligence collection and analysis services and solutions therefor; computer security services in the nature of providing an internet trust centre; computer security assurance; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; authentication, issuance and validation of digital certificates; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the internet;computer security services in the nature of detecting, reporting, investigating and resolving security incidents of network abuse and email abuse; computer security services in the nature of providing an internet trust centre, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; managed computer network and internet security services; computer security services in the nature of filtering content on the internet; software as a service namely, hosting non-downloadable computer software for use by others that scans networks and websites to detect and identify vulnerabilities and malware; online services, providing internet-based and network-based computer virus protection services for others; security verification of computer network firewalls, servers and other network devices from unauthorized access; computer services, detection of viruses and threats; Providing user authentication services using single sign-on technology for online software applications; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification, Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates API traffic security; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates API activity monitoring and attack detection and reporting; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates computer network security; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates cloud-based computer security; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates monitoring computer networks; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates the detection of computer network intrusion; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others for monitoring and maintaining network security; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates safeguarding of network data or network services; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates the detection of security threat; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates the protection of computers and network services from attack; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates the detection and removal of computer viruses and threats; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others for managing and filtering electronic and wireless communications; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates the protection and securing the integrity of data computer networks, mobile devices, electronic and wireless communications and applications; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates security for email, internal and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware, and other undesirable content; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others for secure storage and management of usernames and passwords; Software as a service (SAAS) services, hosting non-downloadable computer software for use by others that facilitates the upload and download of information, software, programs, media or documents from an online digital network, cloud network or server; identity verification services, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API);
Categories: DOWNLOADABLE COMPUTER SOFTWARE THAT FACILITATES