Brands and Their Owners
MICRO FOCUS LLC contact information is shown below | |
Owner: | MICRO FOCUS LLC |
---|---|
Owner Address: | 2202 SOUTH 950 EAST PROVO UT 84606 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
ALM OCTANE |
---|---|
Description: | Computer software, namely, process management software for monitoring the product lifecycle of computing applications;APPLICATION LIFE CYCLE MANAGEMENT OCTANE;APPLICATION LIFECYCLE MANAGEMENT OCTANE;ALM; |
Category: | COMPUTER SOFTWARE |
Brand: |
APPPULSE |
---|---|
Description: | Enterprise software consultation services in the nature of application development and application management consultation services, namely, computer software development in the field of mobile applications; Software as a service (SAAS) services featuring software for application management; software development consultation services in the field of application performance management; Software as a service (SAAS) services featuring software for quality control monitoring of cloud, web and application performance; |
Category: | ENTERPRISE SOFTWARE CONSULTATION SERVICES |
Brand: |
ARCSIGHT |
---|---|
Description: | Computer hardware; computer software used for collecting and analyzing data, to discover risks, correlate security information, assess vulnerabilities, and managing and communicating compliance, all in the area of enterprise security; security information management software used to provide security organizations with comprehensive, real time, expert security information analysis and remediation capabilities; computer software for use in evaluating and reporting risks to an enterprise's computer network; intrusion detection hardware and software, namely computer hardware and software for use in detecting, evaluating and responding to attacks to a computer network; network management software; data mining software, data storage software; computer software for use in analyzing computer networks; software for computer security testing;ARC SIGHT;Computer programming services; technical and strategic consultation in the field of computer software, network management and network security; computer support services, namely, installation, maintenance, repair and updating of computer software, computer systems analysis; technical support services, namely, troubleshooting of computer hardware and software problems; computer software design for others; application service provider (ASP) featuring software in the field of security management used for enterprises' computer networks; technical support services, namely, monitoring of network systems; |
Category: | COMPUTER HARDWARE |
Brand: |
AUTOPASS |
---|---|
Description: | AUTO PASS;Software as a service for managing and tracking software licenses; |
Category: | AUTO PASS |
Brand: |
AUTOPASS |
---|---|
Description: | Computer software for managing and tracking software licenses;AUTO PASS; |
Category: | COMPUTER SOFTWARE MANAGING |
Brand: |
CODAR |
---|---|
Description: | Computer software for application development, deployment, and management; computer software for application testing; computer software development tools; |
Category: | COMPUTER SOFTWARE APPLICATION DEVELOPMENT |
Brand: |
CYBERRES |
---|---|
Description: | Downloadable computer software for preventing, detecting, evaluating, reporting, and responding to threats and attacks on computer programs and networks; downloadable computer software for identifying, evaluating, reporting, and correcting computer security and software security vulnerabilities and defects; downloadable computer software for logging computer security events and then storing, searching, and reporting on same; downloadable computer software for use in managing risks to computers and computer networks; downloadable computer software for computer security testing; downloadable computer software for information security, namely, for detecting unauthorized access or data breach; downloadable computer software for authentication, encryption and tokenization of data; downloadable computer software to monitor and control the security of and the information technology infrastructure of servers, data storage, and networking hardware; downloadable computer software for secure messaging; downloadable computer utility programs for performing computer maintenance;CYBER RES;Technical support services, namely, technical consultation in the field of information security; design and development of information security hardware and software, information technology infrastructure of servers, data storage hardware, mobile devices, and networking hardware; maintenance, installation, updating, testing of information security software and data storage software; testing of computer hardware and software in the field of information security, information technology infrastructure of servers, data storage, mobile devices and networking hardware; monitoring of information security systems, information technology infrastructure of servers, data storage systems, mobile devices and networking hardware to detect breakdowns, to ensure proper functioning, detect unauthorized access or data breach; research, consultancy, testing, advisory services, in the field of information security, namely, design and development of information security systems, and technical support services thereto, namely, troubleshooting of computer software problems, providing backup computer programs, monitoring technological functions of computer network systems; consulting services in the field of software as a service (saas); software as a service (saas) services featuring software in the field of information security for detecting unauthorized access or data breach; design, development, installation and maintenance of computer software; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE PREVENTING |
Brand: |
FORTIFY |
---|---|
Description: | Software for analyzing source code; software for detecting and describing vulnerabilities and associated mitigation techniques based on an analysis of source code; software for preventing hacking of or attacks on computer programs and software systems based on runtime analysis of software behavior and use; |
Category: | SOFTWARE ANALYZING SOURCE CODE |
Brand: |
FORTIFY |
---|---|
Description: | Technical support services, namely, technical consultation in the field of security software for computer and network systems; computer services, namely, integration of computer software into multiple systems and networks; consulting services in the field of providing online, non-downloadable software and applications; design and development of security software for computer and network systems; services for maintenance and updating computer software; |
Category: | TECHNICAL SUPPORT SERVICES |
Brand: |
KEYVIEW |
---|---|
Description: | computer software which permits computer files to be printed, viewed, converted or otherwise used in software applications other than the software in which the files were created; excluding electronic apparatus consisting of a microprocessor-based unit and related software sold as a unit permitting one personal computer (PC) to access and control another PC via modems using standard telephone lines or via dedicated cabling;KEY VIEW; |
Category: | COMPUTER SOFTWARE WHICH PERMITS COMPUTER |
Brand: |
LOADRUNNER |
---|---|
Description: | computer software used to test computer software, for the purpose of software development, design or maintenance, and manuals sold as a unit;LOAD RUNNER; |
Category: | COMPUTER SOFTWARE USED TEST |
Brand: |
SITESCOPE |
---|---|
Description: | [ computer hardware and ] computer software for monitoring performance of electronic communications networks, computer networks, and Intranet web servers, and manuals sold as a unit;SITE SCOPE; |
Category: | COMPUTER HARDWARE |
Brand: |
STORMRUNNER |
---|---|
Description: | STORM RUNNER;Advisory services in the field of product development and quality improvement of software; computer programming and software design; computer programming services for others in the field of software configuration management; computer software consulting; consulting services in the field of providing online, non-downloadable software and applications; consulting services in the field of hosting computer software applications; design and development of computer software; providing on-line non-downloadable software for testing software applications; |
Category: | STORM RUNNER |
Brand: |
THREAT CENTRAL |
---|---|
Description: | THREAT;Providing temporary use of non-downloadable computer programs and computer software to automate formatted reporting of real-time security indicators for use in risk assessment and information security; |
Category: | THREAT |
Brand: |
TRUCLIENT |
---|---|
Description: | Computer software development tool for the monitoring and testing of web-enabled and mobile software applications;TRUE CLIENT; |
Category: | COMPUTER SOFTWARE DEVELOPMENT TOOL |
Brand: |
VERTICA PULSE |
---|---|
Description: | Computer software for management and analysis of social media and networking data; |
Category: | COMPUTER SOFTWARE MANAGEMENT |
Brand: |
VM EXPLORER |
---|---|
Description: | Computer programs and software for management of electronic data, backup, and disaster recovery tasks; software for management of electronic data, backup, and disaster recovery tasks for virtual infrastructure; personalizable software for management of electronic data, data backup, and disaster recovery tasks; data protection software and data security software; data saving and recovery software; software for management of virtual infrastructure;VM; |
Category: | COMPUTER PROGRAMS SOFTWARE |
Brand: |
WEBINSPECT |
---|---|
Description: | Computer software for identifying and correcting web application security vulnerabilities;WEB INSPECT; |
Category: | COMPUTER SOFTWARE IDENTIFYING |