TRUSTED INFORMATION SYSTEMS, INC.

 TRUSTED INFORMATION SYSTEMS, INC. contact information is shown below
Owner:TRUSTED INFORMATION SYSTEMS, INC.
Owner Address:3060 Washington Road - Rt. 97 Glenwood MD 21738
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byTRUSTED INFORMATION SYSTEMS, INC.

Brand:

BUILDING A WORLD OF TRUST

Description:

computer software, namely, computer operating systems, and computer application software in the fields of computer security, global computer network security, data security, and user manuals sold as a unit;

Category: COMPUTER SOFTWARE
Brand:

BUILDING A WORLD OF TRUST

Description:

consulting services in the field of computer, data and communications security, computer programming services and computer software design services;

Category: CONSULTING SERVICES FIELD
Brand:

CKE

Description:

computer software for providing data and communications security;

Category: COMPUTER SOFTWARE PROVIDING DATA
Brand:

CRYPTALL

Description:

computer software, namely, computer software for providing data, communications and computer security, local and wide area computer network security, Internet security, and user manuals sold therewith; computer software and related instructional manuals all sold as a unit used to facilitate communications and transactions over networks and on-line services reliably and to deny unauthorized access to such communications and transactions; and computer software for managing access to encrypted messages and for providing authorized persons with such access;

Category: COMPUTER SOFTWARE
Brand:

CRYSTAL BOX

Description:

computer software, namely, computer operating systems; computer application software for computer security, local and wide area computer network security, data security and user manuals sold therewith;

Category: COMPUTER SOFTWARE
Brand:

DATA SECURITY LETTER

Description:

newsletter in the field of computer and communications security;as to DATA SECURITY;LETTER;

Category: NEWSLETTER FIELD
Brand:

ESCROW ENABLED

Description:

computer software in the field of data security;

Category: COMPUTER SOFTWARE FIELD
Brand:

FORCEFIELD

Description:

computer software, namely, computer application software in the fields of computer security, local and wide area computer network security, data security, and user manuals sold therewith; computer software used to provide security for computer network servers and for publicly available information stored on computer networks and making that information resistant to unauthorized tampering;FORCE FIELD;

Category: COMPUTER SOFTWARE
Brand:

KRT

Description:

computer software for providing data and communications security;

Category: COMPUTER SOFTWARE PROVIDING DATA
Brand:

NDTE

Description:

computer software for use in enhancing data security;

Category: COMPUTER SOFTWARE USE
Brand:

RECOVERKEY

Description:

computer software for providing data and communications security; computer software for managing access to encrypted messages and for providing authorized persons with such access;RECOVER KEY;

Category: COMPUTER SOFTWARE PROVIDING DATA
Brand:

RECOVERKEY-INTERNATIONAL

Description:

computer software, namely, computer application software in the fields of computer security, local and wide area computer network security, data security, and user manuals sold therewith; computer software and related instructional manuals all sold as a unit used to facilitate communications and transactions over networks and on-line services reliably and to deny unauthorized access to such communications and transactions; and computer software for providing data and communications security; computer software for managing access to encrypted messages and for providing authorized persons with such access;

Category: COMPUTER SOFTWARE
Brand:

TIS

Description:

First used in another form in 1981;consulting services in the field of computer, data and communications security, computer programming services and computer software design services;

Category: FIRST USED ANOTHER FORM
Brand:

TIS

Description:

computer software, namely, computer operating systems, and computer application software in the fields of computer security, local and wide area computer network security, data security, and user manuals sold therewith;TRUST INFORMATION SYSTEMS;

Category: COMPUTER SOFTWARE
Brand:

TMACH

Description:

computer programs, computer programs and manuals sold as a unit for use as a computer operating system;T-MACH;

Category: COMPUTER PROGRAMS
Brand:

TMEG

Description:

computer software used to protect confidential and classified data and information;

Category: COMPUTER SOFTWARE USED PROTECT
Brand:

TMEG-100

Description:

computer software used to protect confidential and classified data and information;

Category: COMPUTER SOFTWARE USED PROTECT
Brand:

TRUSTED MACH

Description:

computer programs, computer programs and manuals sold as a unit for use as a computer operating system;MACH;

Category: COMPUTER PROGRAMS
Brand:

TRUSTED MAIL

Description:

MAIL;PROVIDING ENCRYPTION SERVICES FOR ELECTRONIC MAIL MESSAGES;

Category: MAIL