COMPUTER SOFTWARE PROTECTION

Brand Owner (click to sort) Address Description
ABSOLUTE DATA PROTECT Absolute Software Corporation Suite 1400, 1055 Dunsmuir Street Vancouver, B.C. V7X1K8 Canada Computer software for the protection of data enabling automatic enforcement of data protection policies and the disabling of lost or stolen personal computers;Computer services, namely, monitoring and tracking personal computers for security purposes;DATA PROTECT;Computer services, namely, automatic disabling of personal computers and deletion of data from personal computers;
ACTIVE FIREWALL MCAFEE, INC. 2821 Mission College Blvd. Santa Clara CA 95054 COMPUTER SOFTWARE FOR PROTECTION OF COMPUTER NETWORKS, NAMELY, SOFTWARE THAT PROTECTS THE RESOURCES OF A NETWORK FROM OUTSIDE USERS, AND MANUALS PACKAGED AS A UNIT;ACTIVE FIRE WALL;
BE INVISIBLE ON THE WEB Wild West Domains, Inc. 14455 N. Hayden Road, Suite 219 Scottsdale AZ 85260 COMPUTER SOFTWARE FOR PROTECTION OF PRIVACY OF USERS ON A GLOBAL COMPUTER NETWORK;
CODEARMOR REVULYTICS, INC. 2207 North Grant Avenue Wilmington DE 19806 Computer software for the protection of software applications from piracy, theft, tampering and reverse engineering;CODE ARMOR;
CYBERDEFENSE FIREWALL Webroot Software, Inc. 2650 55TH STREET BOULDER CO 80301 Computer software for the protection of a single computer system or computer network from unauthorized electronic intrusion;CYBERDEFENSE FIREWALL;
DATADEFENSE IRON MOUNTAIN INCORPORATED One Federal Street Boston MA 02110 Computer software for the protection of data locally stored on a computer or device from unauthorized third party access by rendering the computer or device generally inoperable by triggering data protection policies, including the destruction and encryption of data and the disabling of physically lost or stolen pc's, laptops and mobile data devices;DATA DEFENSE;Computer services, namely, providing temporary use of online non-downloadable software for the backup, recovery, destruction and encryption of data locally stored on pc's, laptops and mobile data devices that are physically lost, stolen or being accessed by unauthorized third parties; technical support, namely providing back-up computer programs and facilities for the management and control of a web based interface for the backup, recovery, destruction and encryption of data locally stored on pc's, laptops and mobile data devices that are lost, stolen or being accessed by unauthorized third parties by rendering the computer or device generally inoperable;
DOORS Advanced Biometric Solutions, Inc. Suite 1D 108-17 72nd Avenue Forest Hills NY 11375 Computer software for protection of electronic communications and electronically stored information designed for use with biometric identification and verification devices identifying and verifying biometric characteristics of users;
ELECTRONIC ARMOR RAYTHEON CYBER SOLUTIONS, INC. 1220 N. HWY A1A, SUITE 123 INDIALANTIC FL 32903 computer software for the protection of third party software to prevent against reverse engineering and tampering of said software in the field of software security;ELECTRONIC;
INVISI TOOL Wild West Domains, Inc. 14455 N. Hayden Road, Suite 219 Scottsdale AZ 85260 COMPUTER SOFTWARE FOR PROTECTION OF PRIVACY OF USERS ON A GLOBAL COMPUTER NETWORK;INVISIBLE TOOL;TOOL;
INVISIBLE INK Signafy, Inc. 4 Independence Way Princeton NJ 08540 computer software for the protection and identification of creative works authored or transmitted in digital form;publications, namely, user manuals, documentation, pamphlets, brochures, pertaining to the protection and identification of creative works authored or transmitted in digital form;
INVISITOOL Wild West Domains, Inc. 14455 N. Hayden Road, Suite 219 Scottsdale AZ 85260 COMPUTER SOFTWARE FOR PROTECTION OF PRIVACY OF USERS ON A GLOBAL COMPUTER NETWORK;
JUNIOR SHIELD 1G Computing 14061 Rancho Solana Trail San Diego CA 92130 Computer software for protection of children when using a computer and the prevention of corruption to already installed software on computer hardware;JUNIOR;
MY FIREWALL Webroot Software, Inc. 2650 55TH STREET BOULDER CO 80301 Computer software for the protection of a single computer system or computer network from unauthorized electronic intrusion;FIREWALL;
OSTRA OSTRA CYBERSECURITY, INC. 3500 VICKSBURG LN N, #129 PLYMOUTH MN 55447 Computer software for the protection of online data and systems; Computer anit-virus software; Mobile applications for increasing cybersecurity and/or protecting information and data from internet cyber risks, threats and/or attacks; Computer hardware; Network routers; Wireless routers;
PIKEWERKS RAYTHEON CYBER SOLUTIONS, INC. 1220 N. HWY A1A, SUITE 123 INDIALANTIC FL 32903 computer software for the protection of third party software to prevent against reverse engineering and tampering of said software in the field of software security;PIKE WORKS;
PIKEWERKS RAYTHEON PIKEWERKS CORPORATION 105 A CHURCH STREET MADISON AL 35758 computer software for the protection of third party software to prevent against reverse engineering and tampering of said software in the field of software security;PIKE WORKS;
PREVX WEBROOT INC. 385 Interlocken Crescent, Suite 800 Broomfield CO 80021 Computer software for the protection of computers, computer systems and networks, telecommunication and information technology systems and networks against unauthorized access and/or operation;
PREVX WEBROOT SOLUTIONS LTD 3 NEW PARK PLACE, PRIDE PARK DERBY DE24 8DZ United Kingdom Computer software for the protection of computers, computer systems and networks, telecommunication and information technology systems and networks against unauthorized access and/or operation;
PREVX PREVX LIMITED 3 New Park Place Pride Park, Derby DE24 8DZ United Kingdom Computer software for the protection of computers, computer systems and networks, telecommunication and information technology systems and networks against unauthorized access and/or operation;
PROTECTING TODAY. BUILDING TOMORROW. MANX CAPITAL GROUP, INC. 251 Little Falls Drive Wilmington DE 19807 Computer software for protection of electronic data from unintended or unauthorized access, change or destruction; computer software for identification of computer user, application, system and network anomalies; computer software for analysis of computer user, application, system and network data; computer software for detection and isolation of cyber threats; computer software for computer network security threat analysis; computer software for computer network forensics; computer software for monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering or intrusion detection; computer anti-virus software; next-generation computer anti-virus software; computer networking hardware;Software as a service (SAAS) services featuring software for protection of electronic data from unintended or unauthorized access, change or destruction; providing temporary use of non-downloadable cloud-based software for identification of computer user, application, system and network anomalies; providing temporary use of non-downloadable cloud-based software for detection and isolation of cyber threats; providing temporary use of non-downloadable cloud-based software for computer network security threat analysis; providing temporary use of non-downloadable cloud-based software for computer network forensics; providing temporary use of non-downloadable cloud-based software for monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering or intrusion detection; providing temporary use of non-downloadable computer anti-virus software and next-generation computer anti-virus software; computer security threat analysis for protecting data; computer services, namely, computer network forensics services; computer services, namely, monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering or intrusion detection; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; technical support services, namely, installation, administration and troubleshooting of computer applications;
RECUVA PIRIFORM SOFTWARE LIMITED 7TH FLOOR 110 HIGH HOLBORN LONDON WC1V6JS United Kingdom Computer software for protection and recovery of personal data;
RECUVA PIRIFORM COMMERICAL LIMITED STASANDROU, 20, 1ST FLOOR NICOSIA 1016 Cyprus Computer software for protection and recovery of personal data;
SAVEDIR Muller, Andreas Raiffeisenstraße 8 Straßenhaus D-56587 Germany computer software for protection of data in personal computers;SAVE DIRECT;
SIGNAFY Signafy, Inc. 4 Independence Way Princeton NJ 08540 computer software for the protection and identification of creative works authored or transmitted in digital form;publications, namely, user manuals, documentation, pamphlets, brochures, pertaining to the protection and identification of creative works authored or transmitted in digital form;
SPECTRAGUARD AirTight Networks, Inc. Suite 200 339 N Bernardo Ave Mountain View CA 94043 Computer software for protection of wireless networks over the radio frequency (RF) medium;
SPECTRAGUARD Wibhu Technologies, Inc. 471 Acalanes Drive, Suite #44 Sunnyvale CA 94086 Computer software for protection of wireless networks over the radio frequency (RF) medium;
STEALTHRAY GO DADDY OPERATING COMPANY 2155 East GoDaddy Way Tempe AZ 85284 COMPUTER SOFTWARE FOR PROTECTION OF PRIVACY OF USERS ON A GLOBAL COMPUTER NETWORK;
STEGOSYSTEMS STEGOSYSTEMS, INC. 93 CRANBROOK DRIVE HOLDEN MA 01520 Computer software for the protection of software programs from pirating, tampering and reverse engineering;STEGO SYSTEMS;
STEGOSYSTEMS Software Sentinel, Inc. 93 Cranbrook Drive Holden MA 01520 Computer software for the protection of software programs from pirating, tampering and reverse engineering;STEGO SYSTEMS;
TIGERMARK NEC Research Institute, Inc. 4 Independence Way Princeton NJ 08540 computer software for the protection and identification of creative works authored or transmitted in digital form;publications, namely, computer manuals, pamphlets, brochures, pertaining to protection and identification of creative works authored or transmitted in digital form;TIGER MARK;
TNS NETWORKS ASSOCIATES, INC. 3965 FREEDOM CIRCLE SANTA CLARA CA 95054 computer software for protection of computer applications and networks; and instructional manuals packaged therewith;
TVD NETWORKS ASSOCIATES, INC. 3965 FREEDOM CIRCLE SANTA CLARA CA 95054 computer software for protection of computer applications and systems; and instructional manuals packaged as a unit;
V.I.LABS REVULYTICS, INC. 2207 North Grant Avenue Wilmington DE 19806 Computer software for the protection of software applications from piracy, theft, tampering and reverse engineering;V.I. LABORATORIES;
VGER Vger Technologies, Inc. Burton Hills III Nashville TN 37215 computer software for protection and management of digital information in the medical and healthcare industries;computer programming for others;The lining shown in the mark is a feature of the mark and is not intended to indicate color.;
VILABS Vi Laboratories, Inc. 130 Turner Street Waltham MA 02453 Computer software for the protection of software applications from piracy, theft, tampering and reverse engineering;VI LABORATORIES;
VIROBOT Hauri Inc. Seoul 156-754 Republic of Korea Computer software for the protection of computers against computer viruses, computer operating programs, computer programs for protecting computers against computer viruses, downloadable computer programs for protecting computers against computer viruses, computers, computer memories, blank floppy disks, blank CD-ROM's;VIRUSES ROBOT;
WASHING MACHINE Intego S.A. 41 rue Condorcet Paris 75009 France Computer software for protection and security of computer networks and applications; Computer software for privacy of communications and transactions over electronic communications networks;
WEPGUARD AirTight Networks, Inc. Suite 200 339 N Bernardo Ave Mountain View CA 94043 Computer software for protection of wireless networks over the radio frequency (RF) medium;WEP GUARD;
XPLODER STARFIELD TECHNOLOGIES 14455 N. HAYDEN RD, STE 219 LEGAL DEPT. SCOTTSDALE AZ 85260 COMPUTER SOFTWARE FOR PROTECTION OF PRIVACY OF USERS ON A GLOBAL COMPUTER NETWORK, AND SPECIFICALLY FOR BLOCKING POP UP ADVERTISING ON THE INTERNET;EXPLODER;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.