Brands and Their Owners
CA, INC. contact information is shown below | |
Owner: | CA, INC. |
---|---|
Owner Address: | 1320 Ridder Park Drive San Jose CA 95131 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
A2A AUTHORITY |
---|---|
Description: | Computer software and hardware for use in providing secure access control, facilitating operations management, and connecting and controlling multiple servers;A TWO A AUTHORITY; A TO A AUTHORITY;A2A; |
Category: | COMPUTER SOFTWARE HARDWARE |
Brand: |
AGILITY MADE POSSIBLE |
---|---|
Description: | Computer software products, namely, enterprise management software for distributing software among computers, maintaining hardware and software inventories, configuring computers, and protecting local data and managing remote computer systems, computer software for creating and accessing searchable databases of the users' business information by authorized users; computer software for computer application development, computer software for data storage management, database management software, computer software for computer user identification and authentication, password authentication, sign-on control and encryption; computer software for administration of computer local area networks, virtual private networks and wide area networks; computer software for collecting, viewing and analyzing computer hardware inventory data; computer business application software for storage of data, data security protection, data backup, data restoring and data sharing directly for the user or for another application program for use in business; computer software for monitoring and controlling access to global computer networks, computer software for monitoring, tracking, troubleshooting and investigating web infrastructure; and computer software for data retention and data indexing to demonstrate best practices with regulations applicable to the industry for use in the fields of data communications and telecommunications; computer software platforms for grid and utility computing and for operating distributed applications and networks of computers; computer software for managing identities and access to data and applications in an organization and within service providers; computer software for providing identity governance, access governance, log management, access management, web services security, service oriented architecture (SOA) security, transaction security and single sign-on; computer software for providing identities, authentication, identity proofing and identity assurance to users, companies, applications, application providers and service providers; computer software platforms for implementing virtualization technologies;Color is not claimed as a feature of the mark.; |
Category: | COMPUTER SOFTWARE PRODUCTS |
Brand: |
AGILITY MADE POSSIBLE |
---|---|
Description: | Color is not claimed as a feature of the mark.;Computer consulting services; computer security services, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities; data encryption services, namely, administration of digital keys and digital certificates to ensure security of electronically transmitted data and information; technical support, namely, remote and on-site monitoring of network systems; on-line technical support services, namely, troubleshooting of computer hardware and software problems via a global computer network; on-line computer services, namely, providing upgrades of computer software and maintenance of internal computer services, namely, providing upgrades of computer software and maintenance of internal computer network software; computer network design services for others; computer services, namely, providing on-line non-downloadable software for managing identities and access to data and applications in an organization and within service providers; computer services, namely, providing on-line non-downloadable software for identify governance, access governance, log management, access management, web services security, service oriented architecture (SOA) security, transaction security and single sign-on; computer services, namely, application service provider services to third parties featuring remote hosting of operating systems and computer applications; computer services, namely, providing a virtual computing environment accessible via the internet and organizational networks for users for the purpose of computing and providing on-line services, providing computing and data storage facilities of variable capacity to third parties, providing non-downloadable software, accessible over a global computer network, for managing computer applications, providing grid and utility computing services, and providing on-line services for operating distributed applications and networks of computers; providing computer services for virtualization, namely, planning, design and implementation of virtualization technologies for enterprises and businesses; and providing cloud computing services, namely, consulting in the field of cloud computer networks and applications; |
Category: | COLOR NOT CLAIMED AS |
Brand: |
ALLFUSION |
---|---|
Description: | COMPUTER SOFTWARE THAT PROVIDES LIFE CYCLE MANAGEMENT MODELING OF OTHER BUSINESS SOFTWARE APPLICATIONS; |
Category: | COMPUTER SOFTWARE THAT PROVIDES LIFE |
Brand: |
ALTIRIS |
---|---|
Description: | Computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; computer programs for use in teaching and training users in the use of computer software and/or computer hardware; computer programs for remotely monitoring, evaluating, demonstrating and controlling other computer programs or computer processes; computer programs for locking-down one or more computers on a computer network; and instruction manuals supplied as a unit with each of the foregoing; |
Category: | COMPUTER PROGRAMS USE |
Brand: |
APPARENT NETWORKS |
---|---|
Description: | Network performance diagnostics and analysis software;NETWORKS;Consulting services in the field of computer network performance diagnostics, analysis and optimization; |
Category: | NETWORK PERFORMANCE DIAGNOSTICS ANALYSIS |
Brand: |
APPCRITICAL |
---|---|
Description: | Network performance, diagnostics and analysis software for networks supporting data, VoIP and video content;APPARENT CRITICAL; |
Category: | NETWORK PERFORMANCE |
Brand: |
APPNETA |
---|---|
Description: | Network performance diagnostics and analysis software;Consulting services in the field of computer network performance diagnostics, analysis and optimization; |
Category: | NETWORK PERFORMANCE DIAGNOSTICS ANALYSIS |
Brand: |
APPTHORITY |
---|---|
Description: | APPLICATION AUTHORITY;Computer security service, namely, providing online non-downloadable software for scanning and screening of third party mobile computer applications for security flaws and mal-ware detection; consulting in the field of mobile computer application security; |
Category: | APPLICATION AUTHORITY |
Brand: |
ASM2 |
---|---|
Description: | COMPUTER PROGRAMS IN THE FORM OF MAGNETIC TAPE FOR EXTERNAL DATA STORAGE MANAGEMENT, EXCLUDING COMPUTER PROGRAMS THAT PERFORM FUNCTIONS THAT ARE INTEGRAL AND CONFINED TO THE ENGINEERED METALS, ENGINEERED CERAMICS, ENGINEERED PLASTICS AND ENGINEERED COMPOSITES INDUSTRIES;ASM 2; |
Category: | COMPUTER PROGRAMS IN FORM |
Brand: |
BAY DYNAMICS |
---|---|
Description: | [ Computer education training ];Computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; [Computer software for the field of warehousing and distribution, to manage transactional data, provide statistical analysis, and produce notifications and reports;] Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface;Computer consultation; Computer programming for others; Computer project management services; Computer services in the nature of customized web pages featuring user-defined information, personal profiles and information; Computer software consultancy; Computer software consultation; Computer software design for others; Computer software design, computer programming, or maintenance of computer software; Computer software development; Consultancy in the field of software design; Consultation services in the fields of selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Data conversion of computer program data or information; Design, development and implementation of software; Development, updating and maintenance of software and data bases; Installation of computer software; Periodic upgrading of computer software for others; Providing information at the specific request of end-users by means of telephone or global computer networks; Technical support services, namely, troubleshooting of computer software problems; [Technical support services, namely, troubleshooting of industrial process control computer software problems;] Up-dating of computer software; Updating of computer programs for third parties; |
Category: | COMPUTER EDUCATION TRAINING |
Brand: |
BAY DYNAMICS |
---|---|
Description: | Downloadable software for computer security; downloadable software in the field of information security management systems for information technology (IT) infrastructure and systems security, for user and entity behavioral analytics, predictive analytics for computer and network security, profiling and analyzing users, endpoints, applications and other entities independently and then correlates the data to identify threats, prioritize alerts, and communicate relevant information to the appropriate stakeholders, identifying anomalies in privileged user access, insight into third party vendor behavior, and intelligence about vulnerabilities within organizations' attack surface, detection, blocking, and facilitating removal and remediation of cyber-attacks, malicious attacks, insider threats, outsider threats, anomalous user behavior, compromised end points, compromised users, exploitable assets susceptible to threats, privilege account abuse, observed privilege activity, data exfiltration, phishing, bots, time bombs, worms, and advanced persistent threats, identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices, providing remediation and responder portal, providing just-in-time awareness training modules that personalize cyber education to change user behavior and shift the culture of the organization, providing executive dashboards and security self-service portals for cyber risk management, predicting and stopping crime before it happens by identifying, analyzing and correlating risky behavior and vulnerabilities across five vectors - insiders in the nature of employees, outsiders in the nature of bad actors, high privilege accounts, third party vendors and businesses' most valuable assets including who has access to them, and prioritizing the potential threats and security risk coming in through modern cyber threat vectors such as users, systems, applications, and vendors; |
Category: | DOWNLOADABLE SOFTWARE COMPUTER SECURITY |
Brand: |
BLACKFIN SECURITY |
---|---|
Description: | Education services, namely, providing on-line and simulation training in the field of computer security;BLACK FIN SECURITY;SECURITY; |
Category: | EDUCATION SERVICES |
Brand: |
BLUE COAT |
---|---|
Description: | Computer hardware, computer peripherals and computer software for computer, network and internet security applications, content screening and filtering, virus protection, access control, authorization management, web usage monitoring and network bandwidth protection; |
Category: | COMPUTER HARDWARE |
Brand: |
BLUE COAT |
---|---|
Description: | Educational services, namely, arranging and providing online workshops and training courses, lectures and seminars in the field of computers, technology, software and computer networks and distribution of course materials in connection therewith; online educational publications, namely, user manuals in the fields of computers, technology, software and computer networks;Technical support services, namely, online telephone, email and in person troubleshooting for problems with computers, computer software and hardware and computer networks; maintenance, installation and updating of computer software for others; consulting services for others in the field of computer network design, connectivity, management and security; providing an online computer database in the field of computer software installation and maintenance; providing an online computer database in the fields of computer software and hardware design; |
Category: | EDUCATIONAL SERVICES |
Brand: |
BLUE COAT |
---|---|
Description: | [ Educational services, namely, conducting arranging and providing online workshops, and training courses, lectures, workshops and seminars in the field of computers, technology, software, networks, security and bandwidth optimization and distribution of educational materials in connection therewith; On-line journals, namely, blogs featuring articles and commentary on computer, network and internet security, and bandwidth optimization ];The mark consists of the word Blue stacked on top of the word Coat with the o in coat in the shape of a shield.;Computer hardware; Computer software for computer, network, and internet security applications, content screening and filtering, virus protection, computer and network access control and authorization management, web usage monitoring, and network bandwidth optimization and protection;Color is not claimed as a feature of the mark.;Business consulting services in the field of computer, network and internet security, virus protection, network bandwidth optimization and protection;[ Computer software installation and maintenance; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support, namely, monitoring technological functions of computer network systems ]; |
Category: | EDUCATIONAL SERVICES |
Brand: |
BRIGHTSTOR |
---|---|
Description: | Computer software, namely that is a fully integrated storage management solution that operates across all platforms used for mission critical computing and supports all storage management functions to provide an end to end storage management capability;BRIGHT STORE; |
Category: | COMPUTER SOFTWARE |
Brand: |
BUNDL |
---|---|
Description: | COMPUTER PROGRAMS;BUNDLE; |
Category: | COMPUTER PROGRAMS |
Brand: |
BUSINESS, REWRITTEN BY SOFTWARE |
---|---|
Description: | Cloud computing software, namely, resource management software, software for delivering on-demand computing resources, software for use in electronic storage of data, software for providing remote access to data and software programs, distributing software among computers, maintaining hardware and software inventories, configuring computers, protecting local data, managing remote computer systems, providing the ability to plan, develop, manage and secure any of the foregoing, as well as enabling third parties to provide any of the foregoing, as part of private, public or hybrid infrastructures; enterprise management software for distributing software among computers, maintaining hardware and software inventories, configuring computers, and protecting local data and managing remote computer systems; computer software for creating and accessing searchable databases of the users' business information by authorized users; computer software for computer application development; computer software for data storage management; database management software; computer software for computer user identification and authentication, password authentication, sign-on control and encryption; computer software for administration of computer local area networks, virtual private networks and wide area networks; computer software for collecting, viewing and analyzing computer hardware inventory data; computer business application software for storage of data, data security protection, data backup, data restoring and data sharing directly for the user or for another application program for use in business; computer software for monitoring and controlling access to global computer networks; computer software for monitoring, tracking, troubleshooting and investigating web infrastructure; and computer software for data retention and data indexing to demonstrate best practices with regulations applicable to the industry for use in the fields of data communications; computer software platforms for grid and utility computing and for operating distributed applications and networks of computers; computer software for managing identities and access to data and applications in an organization and within service providers; computer software for providing identity governance, access governance, log management, access management, web services security, service oriented architecture (SOA) security, transaction security and single sign-on; computer software for providing identities, authentication, identity proofing and identity assurance to users, companies, applications, application providers and service providers; computer software platforms for cloud computing networks and applications; computer software platforms for implementing virtualization technologies;Software as a service (SAAS) services featuring software for use in providing remote access to applications and computing devices, managing and securing mobile devices, applications and content, developing and deploying application software, providing access to content repositories, providing cloud storage integration and providing secure access to enterprise data; cloud computing featuring software for use in managing and securing mobile devices, applications and content, developing and deploying application software, providing access to content repositories, providing cloud storage integration, and providing secure access to enterprise data; on-line computer services, namely, providing upgrades of computer software and maintenance of internal computer network software; computer services, namely, providing on-line non-downloadable software for managing identities and access to data and applications in an organization and within service providers; computer services, namely, providing on-line non-downloadable software for identity governance, access governance, log management, access management, web services security, service oriented architecture (SOA) security, transaction security and single sign-on; planning, design and implementation of virtualization technologies for enterprises and businesses; computer consulting services; computer network design services for others; computer security services, namely, restricting access to and by computer networks to and of undesired websites, media, individuals and facilities; technical support, namely, remote and onsite computer network technical monitoring; on-line technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems via global computer network; on-line technical support services, namely, troubleshooting of computer software problems via a global computer network; information, advice and providing advice and consultation in the field of the aforesaid computer software and services; |
Category: | CLOUD COMPUTING SOFTWARE |
Brand: |
CA |
---|---|
Description: | HOUSE MARK OF COMPUTER SOFTWARE PRODUCTS NAMELY ENTERPRISE MANAGEMENT SOFTWARE, INFORMATION MANAGEMENT AND APPLICATION DEVELOPMENT SOFTWARE AND BUSINESS APPLICATION SOFTWARE;COMPUTER ASSOCIATES;COMPUTER CONSULTING SERVICES; |
Category: | HOUSE MARK COMPUTER SOFTWARE |
Brand: |
CA ACCESSMINDER |
---|---|
Description: | Downloadable computer software for securing, managing and tracking access to digital resources, namely, web portals, websites, applications, web services, and application programming interfaces (APIs);CA ACCESS MINDER; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE SECURING |
Brand: |
CA DATACOM |
---|---|
Description: | computer software for use in database management;In the statement, a standard character claim is inserted. The drawing is amended to appear as follows: CA DATACOM;First used in commerce in another form on January 1, 1974;First used in another form on January 1, 1974;CA-DATA COMPUTER; |
Category: | COMPUTER SOFTWARE USE |
Brand: |
CA DYNAM |
---|---|
Description: | Computer Programs Recorded on Magnetic Tapes and User Manuals Supplied Therewith for Use in Business;The drawing is amended to appear as follows: CA DYNAM and a standard character claim is inserted.; |
Category: | COMPUTER PROGRAMS RECORDED ON MAGNETIC |
Brand: |
CA JARS |
---|---|
Description: | COMPUTER PROGRAMS RECORDED ON MAGNETIC TAPES AND USER MANUALS SUPPLIED THEREWITH FOR USE IN BUSINESS;In the statement, Column 1, The mark consists of standard characters, without claim to any particular font style, size or color. is inserted. The drawing is amended to appear as follows: CA JARS; |
Category: | COMPUTER PROGRAMS RECORDED ON MAGNETIC |
Brand: |
CA LIBRARIAN |
---|---|
Description: | computer programs for the management of software in automatic data processing systems;The drawing is amended to appear as follows: CA LIBRARIAN and a standard character claim is inserted.;First used in another form in September 1969; |
Category: | COMPUTER PROGRAMS MANAGEMENT |
Brand: |
CA SCHEDULER |
---|---|
Description: | Computer Programs Recorded on Magnetic Tapes and User Manuals Supplied Therewith for Use in Business;The drawing is amended to appear as follows: CA SCHEDULER and a standard character claim is inserted.; |
Category: | COMPUTER PROGRAMS RECORDED ON MAGNETIC |
Brand: |
CA SUPPORTBRIDGE |
---|---|
Description: | SOFTWARE FOR MANAGEMENT AND DELIVERY OF TECHNICAL SUPPORT;COMPUTER ASSOCIATES SUPPORT BRIDGE; |
Category: | SOFTWARE MANAGEMENT DELIVERY |
Brand: |
CA TECHNOLOGIES |
---|---|
Description: | The mark consists of CA TECHNOLOGIES with the letters CA in an interlocking format and TECHNOLOGIES below CA in lower case lettering.;computer software, namely, enterprise management software for distributing software among computers, maintaining hardware and software inventories, configuring computers, and protecting local data and managing remote computer systems, computer software for creating and accessing searchable databases of the users' business information by authorized users; computer software for computer application development, computer software for data storage management, database management software, computer software for computer user identification and authentication, password authentication, sign-on control and encryption; computer software for administration of computer local area networks, virtual private networks and wide area networks; computer software for collecting, viewing and analyzing computer hardware inventory data; computer business application software for storage of data, data security protection, data backup, data restoring and data sharing directly for the user or for another application program for use in business; computer software for monitoring and controlling access to global computer networks, computer software for monitoring, tracking, troubleshooting and investigating web infrastructure; and computer software for data retention and data indexing to demonstrate best practices with regulations applicable to the industry for use in the fields of data communications; computer software platforms for grid and utility computing and for operating distributed applications and networks of computers; computer software for managing identities and access to data and applications in an organization and within service providers; computer software for providing identity governance, access governance, log management, access management, web services security, service oriented architecture (SOA) security, transaction security and single sign-on; computer software for providing identities, authentication, identity proofing and identity assurance to users, companies, applications, application providers and service providers; computer software platforms for cloud computing networks and applications; computer software platforms for implementing virtualization technologies;COMPUTER ASSOCIATES TECHNOLOGIES;Color is not claimed as a feature of the mark.;TECHNOLOGIES;Computer consulting services; Computer security services, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities; Technical support, namely, remote and onsite computer network technical monitoring; On-line technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems via global computer network; On-line technical support services, namely, troubleshooting of computer software problems via a global computer network; On-line computer services, namely, providing upgrades of computer software and maintenance of internal computer network software; computer network design services for others; Computer services, namely, providing on-line non-downloadable software for managing identities and access to data and applications in an organization and within service providers; computer services, namely, providing on-line non-downloadable software for identity governance, access governance, log management, access management, web services security, service oriented architecture (SOA) security, transaction security and single sign-on; Planning, design and implementation of virtualization technologies for enterprises and businesses; |
Category: |