Arbor Networks, Inc.

 Arbor Networks, Inc. contact information is shown below
Owner:ARBOR NETWORKS, INC.
Owner Address:310 Littleton Road Westford MA 01866
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byArbor Networks, Inc.

Brand:

ARBOR

Description:

Computer hardware and recorded and downloadable software systems for use in network security, monitoring and optimization; recorded and downloadable computer programs for connecting remotely to computers or computer networks; recorded and downloadable computer programs for use in network security, monitoring and optimization; recorded and downloadable computer software and hardware for use in network security, monitoring and optimization; recorded and downloadable computer software for the creation of firewalls; recorded and downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; recorded and downloadable computer software for use in network security, monitoring and optimization; downloadable computer software for use in network security, monitoring and optimization that may be downloaded from a global computer network; recorded and downloadable computer software platforms for use in network security, monitoring and optimization; computers for network management; electronic software updates, namely, downloadable computer software and associated downloadable electronic data files for updating computer software in the fields of use in network security, monitoring and optimization, provided via computer and communication networks;Computer services, namely, creating website-based indexes of information, websites and other resources available on computer networks; computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the websites of others; computer services, namely, providing search engines for obtaining data on a global computer network; computer virus protection services; consulting services regarding computer security; cloud based computer application and network enterprise security services to detect and mitigate distributed denial of service (DDoS) attacks, cyber risks, threats and vulnerabilities, scanning and preventing penetration by unauthorized computers and networks; providing temporary use of non-downloadable cloud-based software for use in monitoring computer network security; cloud computing featuring software for enterprise testing, management, security and maintenance in the field of distributed denial of service (DDoS) detection; cloud computing featuring software for enterprise testing, management, security and maintenance in the field of advance threat protection; providing on-line non-downloadable operating software for accessing data, analytics, and presentation of information; software as a service (SAAS) services featuring software for gathering, displaying and analyzing data from networks and enterprises; computer software development and computer programming development for others; development, updating and maintenance of computer software; technical support services, namely, troubleshooting of computer software problems; ; cloud based computer network security services, namely, monitoring of network traffic for security purposes, for purposes of preventing distributed denial of service (DDoS) attacks on computer servers connected to the internet;

Category: COMPUTER HARDWARE RECORDED
Brand:

ARBOR CLOUD

Description:

Cloud based computer network security services, namely, monitoring of network traffic for security purposes, for purposes of preventing distributed denial of service (DDOS) attacks on computer servers connected to the Internet;CLOUD;Cloud based computer application and network enterprise security services to detect and mitigate distributed denial of service (DDoS) attacks, cyber risks, threats and vulnerabilities, scanning and preventing penetration by unauthorized computers and networks; providing temporary use of non-downloadable cloud-based software for use in monitoring computer network security; cloud computing featuring software for enterprise testing, management, security and maintenance in the field of distributed denial-of-service (DDoS) detection; cloud computing featuring software for enterprise testing, management, security and maintenance in the field of advance threat protection; providing on-line non-downloadable operating software for accessing data, analytics, and presentation of information; software as a service (SAAS) services featuring software for gathering, displaying and analyzing data from networks and enterprises; computer software development and computer programming development for others; development, updating and maintenance of computer software; technical support services, namely, troubleshooting of computer software problems;

Category: CLOUD BASED COMPUTER NETWORK SECURITY
Brand:

ARBOR NETWORKS

Description:

Anti-spyware software; Computer anti-virus software; Computer hardware and software systems for use in network security, monitoring and optimization; Computer programs for connecting remotely to computers or computer networks; Computer programs for use in network security, monitoring and optimization; Computer software and hardware for use in network security, monitoring and optimization; Computer software for the creation of firewalls; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in network security, monitoring and optimization; Computer software for use in network security, monitoring and optimization that may be downloaded from a global computer network; Computer software platforms for use in network security, monitoring and optimization; Computers for network management; Electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of use in network security, monitoring and optimization, provided via computer and communication networks;NETWORKS;

Category: ANTI SPYWARE SOFTWARE
Brand:

ARBOR NETWORKS SPECTRUM

Description:

Computer hardware and software for monitoring computer systems and the internet for security purposes;Monitoring of computer systems for security purposes;NETWORKS SPECTRUM;Computer services, namely, creating indexes of information, sites and other resources available on computer networks; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the websites of others; Computer services, namely, providing search engines for obtaining data on a global computer network; Computer virus protection services;

Category: COMPUTER HARDWARE SOFTWARE
Brand:

ARBOR OPTIMA

Description:

Anti-spyware software; Computer anti-virus software; Computer hardware; Computer hardware and computer peripheral devices; Computer hardware and computer peripherals; Computer hardware and peripheral devices; Computer hardware and peripherals; Computer hardware and peripherals therefor; Computer hardware and software for setting up and configuring local area networks; Computer hardware and software for setting up and configuring wide area networks; Computer hardware and software sold as a unit for testing of embedded computer systems; Computer hardware, namely, firewalls; Computer network adapters; Computer network adapters, switches, routers and hubs; Computer network hubs; Computer network hubs, switches and routers; Computer network interface devices; Computer network switches; Computer networking hardware; Computer operating software; Computer programs for searching remotely for content on computers and computer networks; Computer programs for searching the contents of computers and computer networks by remote control; Computer search engine software; Computer software for accessing information directories that may be downloaded from the global computer network; Computer software for computer system and application development, deployment and management; Computer software for controlling and managing access server applications; Computer software for creating searchable databases of information and data; Computer software for encryption; Computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Computer software for the creation of firewalls; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Computer software to automate data warehousing; Decoder software; Enterprise software in the nature of a database for non-transactional data and a search engine for database content; Gateway routers in the nature of computer control hardware; Network access server hardware; Network access server operating software; Software for ensuring the security of electronic mail;Application service provider (ASP), namely, hosting computer software applications of others; Application service provider featuring software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer service, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating searchable databases of information and data; Computer service, namely, acting as an application service provider in the field of knowledge management to host computer application software for searching and retrieving information from databases and computer networks; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software development; Computer systems integration services; Computer virus protection services; Consultation services in the field of search engine optimization; Consultation services in the fields of selection, implementation and use of computer hardware and software systems for others; Consulting in the field of configuration management for computer hardware and software; Creating of computer programs; Customization of computer hardware and software; Customized software development services; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Data conversion of electronic information; Data encryption and decoding services; Data encryption services; Data migration services; Design and development of computer hardware; Design and development of computer hardware and software; Design and development of computer software; Design and development of electronic data security systems; Design, creation, hosting, maintenance of websites for others; Design, deployment and management of wireless networks for others; Design, development and consulting services in the field of software for content management; Design, development and implementation of software; Design, development, installation and maintenance of computer software; Design, installation, updating and maintenance of computer software; Design, maintenance, development and updating of computer software; Designing and developing computer game software and video game software for use with computers, video game program systems and computer networks; Developing and hosting a server on a global computer network for the purpose of facilitating e-commerce via such a server; Developing and implementing customized plans for improving security and preventing criminal activity for businesses and governmental agencies; Developing and updating computer software; Developing computer software; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Technical support services, namely, 24x7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support, namely, monitoring of network systems; Updating of computer software relating to computer security and prevention of computer risks;

Category: ANTI SPYWARE SOFTWARE
Brand:

ATLAS

Description:

Monitoring of computer systems for security purposes;Computer services, namely, creating indexes of information, sites and other resources available on computer networks; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the websites of others; Computer services, namely, providing search engines for obtaining data on a global computer network; Computer virus protection services;

Category: MONITORING COMPUTER SYSTEMS
Brand:

ATLAS INTELLIGENCE FEED

Description:

INTELLIGENCE FEED;Computer services, namely, creating indexes of information, sites and other resources available on computer networks; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the websites of others; Computer services, namely, providing search engines for obtaining data on a global computer network; Computer virus protection services; Monitoring of computer systems for security purposes, namely, computer security threat analysis for protecting data;

Category: INTELLIGENCE FEED
Brand:

CLOUD SIGNALING

Description:

Indicating membership in a(n) to indicate membership in a coalition created to mitigate application layer denial of service attacks;

Category: INDICATING MEMBERSHIP N
Brand:

EDGE DEFENSE

Description:

Downloadable software for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and testing the effectiveness of cyber security applications and devices and systems to achieve optimal device and network security, in the field of cyber security vulnerability testing of networked devices; computer software for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and testing the effectiveness of cyber security applications and devices and systems to achieve optimal device and network security for providing cyber security for global computer networks;DEFENSE;Cloud computing featuring software for use in providing security for computer systems, servers, computer networks, laptops, mobile devices and tablet computers; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (saas) featuring software for use in providing threat prevention, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, laptops, mobile devices and tablet computers; software as a service (saas) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, laptops, mobile devices and tablet computers; platform as a service (paas) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (paas) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, laptops, mobile devices and tablet computers; providing online non-downloadable software for use, including on a real-time basis, in providing operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, and laptops, mobile devices and tablet computers; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, laptops, mobile devices and tablet computers, including on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis;

Category: DOWNLOADABLE SOFTWARE ASSESSING
Brand:

HOW NETWORKS GROW

Description:

Anti-spyware software; Computer search engine software; Computer software for accessing information directories that may be downloaded from the global computer network; Computer software for computer system and application development, deployment and management; Computer software for controlling and managing access server applications; Computer software for creating searchable databases of information and data; Computer software for encryption; Computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Computer software for the creation of firewalls; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in network security, monitoring and optimization; Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Computer software to automate data warehousing; Decoder software; Enterprise software in the nature of a database for non-transactional data and a search engine for database content; Network access server operating software; Software for ensuring the security of electronic mail; Computer hardware; Computer hardware, namely, firewalls; Computer networking hardware; Gateway routers in the nature of computer control hardware; Network access server hardware; Computer hardware and software for setting up and configuring local area networks; Computer network hubs, switches and routers; Computer programs for searching the contents of computers and computer networks by remote control;Consulting services in the field of maintaining the security and integrity of databases; Electronic monitoring services for security purposes in the field of network use and security;Application service provider (ASP), namely, hosting computer software applications of others; Application service provider featuring software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Computer service, namely, acting as an application service provider in the field of knowledge management to host computer application software for searching and retrieving information from databases and computer networks; Computer service, namely, acting as an application service provider in the field of knowledge management to host computer application software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data and information; Computer software consultancy; Computer software consultation; Computer software development; Consultation services in the fields of selection, implementation and use of computer hardware and software systems for others; Customization of computer hardware and software; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Development of software for secure network operations; Development, updating and maintenance of software and data bases; Installation of computer software; Maintenance of computer software; Periodic upgrading of computer software for others; Technical support services, namely, troubleshooting of computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Up-dating of computer software for others; Computer hardware development; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts; Design of computer hardware, integrated circuits, communications hardware and software and computer networks for others. Computer consultation in the field of computer security; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Research in the field of intelligence and security; Computer services, namely, monitoring and reporting on the performance, availability, and errors of websites of others; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the websites of others; Monitoring the computer systems of others for technical purposes and providing back-up computer programs and facilities; Technical support, namely, monitoring of network systems; Integration of computer systems and networks;

Category: ANTI SPYWARE SOFTWARE
Brand:

INFRASTRUCTURE FINGERPRINTING

Description:

Computer software for use in network security, monitoring, and optimization.;INFRASTRUCTURE;

Category: COMPUTER SOFTWARE USE
Brand:

NETSCOUT ARBOR EDGE DEFENSE

Description:

Downloadable software for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and testing the effectiveness of cyber security applications and devices and systems to achieve optimal device and network security, in the field of cyber security vulnerability testing of networked devices; computer software for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and testing the effectiveness of cyber security applications and devices and systems to achieve optimal device and network security for providing cyber security for global computer networks;DEFENSE;Cloud computing featuring software for use in providing security for computer systems, servers, computer networks, laptops, mobile devices and tablet computers; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (saas) featuring software for use in providing threat prevention, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, laptops, mobile devices and tablet computers; software as a service (saas) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, laptops, mobile devices and tablet computers; platform as a service (paas) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (paas) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, laptops, mobile devices and tablet computers; providing online non-downloadable software for use, including on a real-time basis, in providing operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, and laptops, mobile devices and tablet computers; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, laptops, mobile devices and tablet computers, including on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis;

Category: DOWNLOADABLE SOFTWARE ASSESSING
Brand:

NETSCOUT DEFENDERONE

Description:

Computer software and hardware for managing network and hosting services in the field of cyber intelligence, security and threat data; Real-time, multi-tasking embedded computer operating system software for enterprise security;NET SCOUT DEFENDER ONE;Software as a service in the field of maintaining the security and integrity of databases; computerized security services, namely, providing user identity and authentication services, secure network access, secure network communications, information assurance and network integrity capabilities, for the purposes of mitigating cybersecurity risks; Cloud based computer software for managing network and hosting services in the field of cyber intelligence, security and threat data;

Category: COMPUTER SOFTWARE HARDWARE
Brand:

PRAVAIL

Description:

Anti-spyware software; Computer anti-virus software; Computer hardware and software systems for use in network security, monitoring and optimization; Computer operating software; Computer programs for use in network security, monitoring and optimization; Computer software for use in network security, monitoring and optimization; Computer software platforms for use in network security, monitoring and optimization;PREVAIL;

Category: ANTI SPYWARE SOFTWARE
Brand:

PRAVAIL

Description:

PREVAIL;Computer consultation in the field of computer security; Computer consultation in the field of computer security; Computer hardware and software consulting services in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software consultancy in the field of computer security; Computer software consultation in the field of computer security ; Computer software consulting in the field of computer security; Technical consulting and assistance with computer-based information systems and components in the field of computer security;

Category: PREVAIL
Brand:

SAFE QUARANTINE

Description:

computer hardware; computer software for the prevention of illegitimate network traffic;

Category: COMPUTER HARDWARE
Brand:

U ARBOR UNIVERSITY

Description:

Arranging and conducting educational conferences for customers and professionals in the field of network security and operational performance; Arranging of exhibitions, seminars and conferences for customers interested in network security and professionals in the field of network security and operational performance; Arranging of educational seminars for customers and professionals in the field of network security and operational performance; Arranging of educational seminars and conferences for customers and professionals in the field of network security and operational performance; Arranging professional workshop and training courses for customers and professionals in the field of network security and operational performance; Computer education training for customers and professionals in the field of network security and operational performance; Computer education training services for customers and professionals in the field of network security and operational performance; Conducting educational exhibitions relating to the use of Peakflow computer software and hardware used network security and Peakflow operational performance; Conducting workshops and seminars for customers and professionals in the field of computer software and hardware used in the field of network security and operational performance; Education for customers and professionals in the field of computer software and hardware rendered through video conference used in the field of network security and operational performance; Educational demonstrations for customers and professionals in the field of network security and operational performance; Educational services namely conducting programs for customers and professionals in the field of computer software and hardware used in the field of network security and operational performance; Educational services, namely, conducting informal on-line programs for customers and professionals in the fields of computer hardware and software used in the field of network security and operational performance, and printable materials distributed therewith, in Class 41; Educational services, namely, conducting on-line exhibitions and displays and interactive exhibits for customers and professionals in the field of computer software and hardware used in the field of network security and operational performance; Educational services, namely, conducting seminars, courses, training and workshops for customers and professionals in the field of computer hardware and sofware and distribution of course material in connection therewith used in the field of network security and operational performance; Educational services, namely, developing, arranging, and conducting educational conferences and programs and providing courses of instruction in the field of computer software and hardware for customers and professionals in the field of network security and operational performance; Instruction for customers and professionals in the field of computer software and hardware used in the field of network security and operational performance; On-line journals, namely, blogs featuring instruction and training in the field of computer hardware and software used in network security and operational performance; On-line publication of online journals, namely, blogs and articles in the field of computer hardware and software used in the field of network security and operational performance; Providing newsletters in the field of computer software and hardware for customers and professionals via e-mail in the field of network security and operational performance; Providing on-line publications in the nature of online journals, namely, blogs in the field of computer hardware and software used in the field of network security and operational performance; Providing on-line training courses, seminars and workshops for customers and professionals in the field of computer hardware and software used in the field of network security and operational performance; Publication of manuals; Publishing of electronic publications; Training in the use and operation of computer software and hardware for customers and professionals in the field of network security and operational performance; Training to customers and professionals in the use of computer software and hardware used in the field of network security and operational performance; Training services for customers and professionals in the field of computer software and hardware used in the field of network security and operational performance; Workshops and seminars for customers and professionals in the field of computer software and hardware used in the field of network security and operational performance;Color is not claimed as a feature of the mark.;UNIVERSITY;

Category: ARRANGING CONDUCTING EDUCATIONAL CONFERENCES
Brand:

WISR

Description:

Downloadable electronic publications in the nature of research reports in the field of information and telecommunications technology;Printed publications in the nature of research reports in the field of information and telecommunications technology;WORLDWIDE INFRASTRUCTURE SECURITY REPORT;

Category: DOWNLOADABLE ELECTRONIC PUBLICATIONS
Brand:

WORLDWIDE INFRASTRUCTURE SECURITY REPORT

Description:

Downloadable electronic publications in the nature of research reports in the field of information and telecommunications technology;INFRASTRUCTURE SECURITY REPORT;

Category: DOWNLOADABLE ELECTRONIC PUBLICATIONS
Brand:

WORM VACCINE

Description:

Computer software for network security, network integrity, data security, data integrity, and authentication;

Category: COMPUTER SOFTWARE NETWORK SECURITY