COMPUTER SOFTWARE USED ASSESS

Brand Owner (click to sort) Address Description
CYBERSIM BOOZ ALLEN HAMILTON INC. 8283 Greensboro Drive McLean VA 22102 Computer software used to assess skills and competency for cyber security professionals, and to recruit, screen and train cyber security professionals;CYBER SIM;
DATA LYNX ELECTRONIC DATA SYSTEMS CORPORATION 5400 LEGACY DRIVE M/S H3-3A-05 PLANO TX 75024 computer software used to assess and qualify student loans, and to transmit loan information to lenders;DATA;
DATACHECK DataStar Systems, Inc. 3915 Meandering Way Crystal Lake IL 60014 Computer software used to assess and evaluate the diagnostic laboratories of hospitals, clinics, and private offices for the purpose of accreditation;DATA CHECK;
DECISIONCARE CHARTER SYSTEM 1061 EAST FLAMINGO ROAD SUITE ONE LAS VEGAS NV 89119 computer software used to assess and track patient progress in behavioral healthcare;DECISION CARE;
FIREBLANKET Internet Security Systems, Inc. 6303 Barfield Road Atlanta GA 30328 computer software used to assess security vulnerabilities in open network servers and application programs;FIRE BLANKET;
FIRECELL Internet Security Systems, Inc. 6303 Barfield Road Atlanta GA 30328 computer software used to assess security vulnerabilities in open network servers and application programs;FIRE CELL;
FIREWALL SCANNER Internet Security Systems, Inc. 6303 Barfield Road Atlanta GA 30328 computer software used to assess open network security;
FLOWERBASE Hernon, Gregory James 32 Rose Avenue Boronia, Victoria 3155 Australia computer software used to assess and analyze flower essence requirements of patients, together with associated manuals;FLOWER BASW;
HACKERWHACKER NSI 441 Raymond Ave. #2 Santa Monica CA 90405 computer software used to assess security vulnerablities of a computer network; computer programmed to asses security vulnerabilities of a computer network;HACKER WHACKER;services offered via a global computer information network to assess security vulnerabilities of a computer network; on-site services to assess security vulnerabilities of a computer network; on-site services to correct security vulnerabilities of a computer network;
INTR-PLAY LEADERSHIP PROFILE P. JOHN BRUNSTETTER 5491 PAPAGALLO DR. OCEANSIDE CA 92057 computer software used to assess personality traits and leadership capacities;booklets and printed survey answer sheets in the field of leadership and personality assessment;LEADERSHIP PROFILE;
INTR-PLAY LEADERSHIP PROFILE DEVELOPMENT CENTER, INC., THE 111 Pacifica, Suite 210 Irvine CA 92718 computer software used to assess personality traits and leadership capacities;booklets and printed survey answer sheets in the field of leadership and personality assessment;LEADERSHIP PROFILE;
INTRANET SCANNER Internet Security Systems, Inc. 6303 Barfield Road Atlanta GA 30328 computer software used to assess security vulnerabilities in open network servers and application programs;
MAGENI Mageni Security Suite 2 110 Mamaroneck Avenue White Plains NY 10601 COMPUTER SOFTWARE USED TO ASSESS THE VULNERABILITY OF COMPUTER SOFTWARE AND TO PREVENT INTRUSION INTO COMPUTER NETWORKS, WEB SITES, AND OTHER COMPUTER SYSTEMS AS WELL AS RELATED COMPUTER HARDWARE;The English Translation of the word MAGENI in the mark is MY SHIELD;
S3 Internet Security Systems, Inc. 6303 Barfield Road Atlanta GA 30328 computer software used to assess and correct security vulnerabilities of a computer operating system;
SAM DUN & BRADSTREET INC. 103 JFK PARKWAY SHORT HILLS NJ 07078 computer software used to assess and track supplier information, supplier identification and supplies ordered and user manuals packaged as a unit;
SCARLET LegalNet Works Inc. 1100 N. Glebe Road, Suite 1010 Arlington VA 22201 Computer software used to assess, evaluate, and mitigate supply chain security risks for use in the field of cybersecurity risk management for information and communication technology supply chain;
SUPPLIER ASSESSMENT MANAGER DUN & BRADSTREET, INC. 5335 Gate Parkway Jacksonville FL 32256 Computer software used to assess, analyze and track supplier information, supplier identification and supplies ordered, as well as user manuals packaged as a unit;
SYSTEM SECURITY SCANNER Internet Security Systems, Inc. 6303 Barfield Road Atlanta GA 30328 computer software used to assess and correct security vulnerabilities of a computer operating system;
TENABLE NETWORK SECURITY TENABLE, INC. 6100 Merriweather Drive, 12th Floor Columbia MD 21046 COMPUTER SOFTWARE USED TO ASSESS THE VULNERABILITY OF COMPUTER SOFTWARE AND TO PREVENT INTRUSION INTO COMPUTER NETWORKS, WEB SITES, AND OTHER COMPUTER SYSTEMS AS WELL AS RELATED COMPUTER HARDWARE;NETWORK SECURITY;
TENABLE NETWORK SECURITY Tenable Network Security, Inc. 6100 Merriweather Drive, 12th Floor Columbia MD 20144 COMPUTER SOFTWARE USED TO ASSESS THE VULNERABILITY OF COMPUTER SOFTWARE AND TO PREVENT INTRUSION INTO COMPUTER NETWORKS, WEB SITES, AND OTHER COMPUTER SYSTEMS AS WELL AS RELATED COMPUTER HARDWARE;NETWORK SECURITY;
WEB SECURITY SCANNER Internet Security Systems, Inc. 6303 Barfield Road Atlanta GA 30328 computer software used to assess security vulnerabilities in open network servers and application programs;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.