RSA SECURITY INC.

 RSA SECURITY INC. contact information is shown below
Owner:RSA SECURITY INC.
Owner Address:174 MIDDLESEX TURNPIKE BEDFORD MA 01730
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byRSA SECURITY INC.

Brand:

ACE/SERVER

Description:

electronic security systems comprising computer hardware and software, and user manuals sold as a unit therewith;ACE SERVER;

Category: ELECTRONIC SECURITY SYSTEMS COMPRISING COMPUTER
Brand:

CLEARTRUST

Description:

Computer programs for access management security over global computer networks, local area networks and wide area networks and related user manuals, licensed and distributed together as a unit;CLEAR TRUST;

Category: COMPUTER PROGRAMS ACCESS MANAGEMENT
Brand:

KANE SECURITY MONITOR

Description:

Computer software for use in detecting unauthorized access, or attempts to access computer systems and networks, and instructional manuals sold as a unit;SECURITY MONITOR;

Category: COMPUTER SOFTWARE USE
Brand:

KEON

Description:

Software products designed to issue and manage digital user identities and privilege information for electronic commerce and security;

Category: SOFTWARE PRODUCTS DESIGNED ISSUE
Brand:

LOGSMART

Description:

software for providing alerts, reports and queries of datagrams and message loggings for use in the field of network intelligence;LOG SMART; LOGS MART;

Category: SOFTWARE PROVIDING ALERTS
Brand:

NETWORK INTELLIGENCE CORPORATION

Description:

integrated computer hardware and software, namely, a computer network appliance with software for capturing network datagrams and system events in order to provide alerts, reports, and queries for use in the field of networked computers;

Category: INTEGRATED COMPUTER HARDWARE SOFTWARE
Brand:

PASSMARK

Description:

Software for identifying and authenticating users in e-commerce transactions, online financial transactions and online communications;PASS MARK;Providing authentication and identification services to users in e-commerce transactions, online financial transactions, and online communications;

Category: SOFTWARE IDENTIFYING AUTHENTICATING
Brand:

RC6

Description:

Algorithms, namely, computer software for protecting data from unauthorized access, for encrypting and decrypting data, and documentation, including documentation recorded on electronic data carriers, which are related to and sold with the aforesaid goods;

Category: ALGORITHMS
Brand:

RSA

Description:

ARRANGING AND CONDUCTING EDUCATIONAL CONFERENCES, NAMELY, TO EDUCATE INDIVIDUALS ABOUT THE FIELD OF DATA SECURITY;ARRANGING AND CONDUCTING BUSINESS CONFERENCES, NAMELY, FOR BRINGING TOGETHER THOSE INTERESTED IN THE FIELD OF DATA SECURITY TO DISPLAY AND SELL DATA SECURITY PRODUCTS;The drawing is lined for the colors red, and color is claimed as a feature of the mark.;

Category: ARRANGING CONDUCTING EDUCATIONAL CONFERENCES
Brand:

RSA SECURE

Description:

Computer security products, namely, blank smart cards, encoded smart cards for use in computer security, authentication tokens for use in computer security, communication servers, and clients, namely, client computer hardware; computer hardware and software that protects data from unauthorized access; computer hardware and software that identifies and authenticates users; and computer hardware and software that encrypts and decrypts data; and documentation, including documentation recorded on electronic data carriers, which are related to and sold with the aforesaid goods;SECURE;

Category: COMPUTER SECURITY PRODUCTS
Brand:

SOFTID

Description:

computer security products, namely, tokens, servers, clients, computer software, hardware, networks and related documentation sold together as a unit;

Category: COMPUTER SECURITY PRODUCTS
Brand:

THE MOST TRUSTED NAME IN E-SECURITY

Description:

COMPUTER SECURITY PRODUCTS FOR USE IN THE FIELD OF DATA SECURITY, NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT PERMIT ACCESS TO DATA BY GENERATING ACCESS CODES AND BY VERIFYING ACCESS CODES, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT ISSUE AND MANAGE DIGITAL USER IDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC COMMERCE AND SECURITY, AND COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT INTEGRATE CRYPTOGRAPHIC SECURITY FEATURES INTO OTHER SOFTWARE APPLICATIONS;THE MOST TRUSTED NAME IN E SECURITY;

Category: COMPUTER SECURITY PRODUCTS USE
Brand:

VERID

Description:

Providing user authentication services in e-commerce transactions through wireless, telecommunications and global computer networks;

Category: PROVIDING USER AUTHENTICATION SERVICES