GUARDSQUARE

Welcome to the Brand page for “GUARDSQUARE”, which is offered here for Computer software for encryption; software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware and malware; software for protection of software applications against reverse engineering and hacking; software for providing network, internet, computer, communication, and mobile phone security in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, and communication hardening software; software for providing online authentication and identity protection in the nature of computer software for authenticating user identification; software for providing intrusion detection and prevention in the nature of computer software for the creating of firewalls; software for the encryption and authentication of electronic information; software for fraud protection in the nature of computer software for authenticating user identification; software for cryptographic network security and data security functions in the nature of computer software for the creation of firewalls; software for device fingerprinting in the nature of computer software for the identification of users and devices; software for location verification in the nature of application software to detect the locations of users and devices; computer software for whitebox encryption; software for checking the security of the device and the application environment in the nature of computer anti-virus software; software for digital signatures in the nature of computer application software for mobile phones, software for digitally signing documents; software for visual hashes in the nature of computer software for generating visual hashes in the nature of firmware for authenticating user identification; software for optimizing applications in the nature of computer software for managing random-access memory while using system applications; software for removing redundant data and resources from applications; software for risk estimation in the nature of computer software for identifying risks for scanning and penetration testing of computers and networks to assess information security vulnerability; computer software for building applications, software development tools for the creation of secure mobile internet applications; software for compiling applications in the nature of compiler software; computer application software for providing security, software for networks, internet, computers, communication, and mobile phones in the nature of anti-spyware, anti-malware, application protection software, library protections software, obfuscation software, communication hardening software; none of the aforementioned including integrated software systems or services for financial transactions, payment processing and transfers, e-commerce, sales transactions, invoice processing, payroll management, sales and inventory tracking and management, invoicing, online retail platforms, stores and market places for use by third parties to market their own goods and services, and corresponding report and analytics for the same;guard square;computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; design, development, and implementation of software for testing, analysis and consulting services in the field of security, access, authorization, authentication, encryption and identification systems for computers, networks, mobile phones and other electronic devices; testing of security systems; computer services, designing and implementing software in the nature of anti-spyware, anti-malware, application protections software, library protections software, obfuscation software, communication hardening software for others; research and development of technology in the field of protection of software applications; research, development, design and upgrading of computer software in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, communication hardening software; none of the aforementioned including integrated software systems or services for financial transactions, payment processing and transfers, e-commerce, sales transactions, invoice processing, payroll management, sales and inventory tracking and management, invoicing, online retail platforms, stores and market places for use by third parties to market their own goods and services, and corresponding report and analytics for the same;.

Its status is currently believed to be active. Its class is unavailable. “GUARDSQUARE” is believed to be currently owned by “GuardSquare NV”.

Owner:
GUARDSQUARE NV
Owner Details
Description:
Computer software for encryption; Software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware and malware; Software for protection of software applications against reverse engineering and hacking; Software for providing network, internet, computer, communication, and mobile phone security in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, and communication hardening software; Software for providing online authentication and identity protection in the nature of computer software for authenticating user identification; Software for providing intrusion detection and prevention in the nature of computer software for the creating of firewalls; Software for the encryption and authentication of electronic information; Software for fraud protection in the nature of computer software for authenticating user identification; Software for cryptographic network security and data security functions in the nature of computer software for the creation of firewalls; Software for device fingerprinting in the nature of computer software for the identification of users and devices; Software for location verification in the nature of application software to detect the locations of users and devices; Computer software for whitebox encryption; Software for checking the security of the device and the application environment in the nature of computer anti-virus software; Software for digital signatures in the nature of computer application software for mobile phones, software for digitally signing documents; Software for visual hashes in the nature of computer software for generating visual hashes in the nature of firmware for authenticating user identification; Software for optimizing applications in the nature of computer software for managing random-access memory while using system applications; Software for removing redundant data and resources from applications; Software for risk estimation in the nature of computer software for identifying risks for scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software for building applications, software development tools for the creation of secure mobile internet applications; Software for compiling applications in the nature of compiler software; Computer application software for providing security, software for networks, internet, computers, communication, and mobile phones in the nature of anti-spyware, anti-malware, application protection software, library protections software, obfuscation software, communication hardening software; none of the aforementioned including integrated software systems or services for financial transactions, payment processing and transfers, e-commerce, sales transactions, invoice processing, payroll management, sales and inventory tracking and management, invoicing, online retail platforms, stores and market places for use by third parties to market their own goods and services, and corresponding report and analytics for the same;GUARD SQUARE;Computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design, development, and implementation of software for testing, analysis and consulting services in the field of security, access, authorization, authentication, encryption and identification systems for computers, networks, mobile phones and other electronic devices; Testing of security systems; Computer services, designing and implementing software in the nature of anti-spyware, anti-malware, application protections software, library protections software, obfuscation software, communication hardening software for others; Research and development of technology in the field of protection of software applications; Research, development, design and upgrading of computer software in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, communication hardening software; none of the aforementioned including integrated software systems or services for financial transactions, payment processing and transfers, e-commerce, sales transactions, invoice processing, payroll management, sales and inventory tracking and management, invoicing, online retail platforms, stores and market places for use by third parties to market their own goods and services, and corresponding report and analytics for the same;
Categories: COMPUTER SOFTWARE ENCRYPTION