Brands and Their Owners
TRUSTED INFORMATION SYSTEMS, INC. contact information is shown below | |
Owner: | TRUSTED INFORMATION SYSTEMS, INC. |
---|---|
Owner Address: | 3060 Washington Road - Rt. 97 Glenwood MD 21738 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
BUILDING A WORLD OF TRUST |
---|---|
Description: | computer software, namely, computer operating systems, and computer application software in the fields of computer security, global computer network security, data security, and user manuals sold as a unit; |
Category: | COMPUTER SOFTWARE |
Brand: |
BUILDING A WORLD OF TRUST |
---|---|
Description: | consulting services in the field of computer, data and communications security, computer programming services and computer software design services; |
Category: | CONSULTING SERVICES FIELD |
Brand: |
CKE |
---|---|
Description: | computer software for providing data and communications security; |
Category: | COMPUTER SOFTWARE PROVIDING DATA |
Brand: |
CRYPTALL |
---|---|
Description: | computer software, namely, computer software for providing data, communications and computer security, local and wide area computer network security, Internet security, and user manuals sold therewith; computer software and related instructional manuals all sold as a unit used to facilitate communications and transactions over networks and on-line services reliably and to deny unauthorized access to such communications and transactions; and computer software for managing access to encrypted messages and for providing authorized persons with such access; |
Category: | COMPUTER SOFTWARE |
Brand: |
CRYSTAL BOX |
---|---|
Description: | computer software, namely, computer operating systems; computer application software for computer security, local and wide area computer network security, data security and user manuals sold therewith; |
Category: | COMPUTER SOFTWARE |
Brand: |
DATA SECURITY LETTER |
---|---|
Description: | newsletter in the field of computer and communications security;as to DATA SECURITY;LETTER; |
Category: | NEWSLETTER FIELD |
Brand: |
ESCROW ENABLED |
---|---|
Description: | computer software in the field of data security; |
Category: | COMPUTER SOFTWARE FIELD |
Brand: |
FORCEFIELD |
---|---|
Description: | computer software, namely, computer application software in the fields of computer security, local and wide area computer network security, data security, and user manuals sold therewith; computer software used to provide security for computer network servers and for publicly available information stored on computer networks and making that information resistant to unauthorized tampering;FORCE FIELD; |
Category: | COMPUTER SOFTWARE |
Brand: |
KRT |
---|---|
Description: | computer software for providing data and communications security; |
Category: | COMPUTER SOFTWARE PROVIDING DATA |
Brand: |
NDTE |
---|---|
Description: | computer software for use in enhancing data security; |
Category: | COMPUTER SOFTWARE USE |
Brand: |
RECOVERKEY |
---|---|
Description: | computer software for providing data and communications security; computer software for managing access to encrypted messages and for providing authorized persons with such access;RECOVER KEY; |
Category: | COMPUTER SOFTWARE PROVIDING DATA |
Brand: |
RECOVERKEY-INTERNATIONAL |
---|---|
Description: | computer software, namely, computer application software in the fields of computer security, local and wide area computer network security, data security, and user manuals sold therewith; computer software and related instructional manuals all sold as a unit used to facilitate communications and transactions over networks and on-line services reliably and to deny unauthorized access to such communications and transactions; and computer software for providing data and communications security; computer software for managing access to encrypted messages and for providing authorized persons with such access; |
Category: | COMPUTER SOFTWARE |
Brand: |
TIS |
---|---|
Description: | First used in another form in 1981;consulting services in the field of computer, data and communications security, computer programming services and computer software design services; |
Category: | FIRST USED ANOTHER FORM |
Brand: |
TIS |
---|---|
Description: | computer software, namely, computer operating systems, and computer application software in the fields of computer security, local and wide area computer network security, data security, and user manuals sold therewith;TRUST INFORMATION SYSTEMS; |
Category: | COMPUTER SOFTWARE |
Brand: |
TMACH |
---|---|
Description: | computer programs, computer programs and manuals sold as a unit for use as a computer operating system;T-MACH; |
Category: | COMPUTER PROGRAMS |
Brand: |
TMEG |
---|---|
Description: | computer software used to protect confidential and classified data and information; |
Category: | COMPUTER SOFTWARE USED PROTECT |
Brand: |
TMEG-100 |
---|---|
Description: | computer software used to protect confidential and classified data and information; |
Category: | COMPUTER SOFTWARE USED PROTECT |
Brand: |
TRUSTED MACH |
---|---|
Description: | computer programs, computer programs and manuals sold as a unit for use as a computer operating system;MACH; |
Category: | COMPUTER PROGRAMS |
Brand: |
TRUSTED MAIL |
---|---|
Description: | MAIL;PROVIDING ENCRYPTION SERVICES FOR ELECTRONIC MAIL MESSAGES; |
Category: | MAIL |