GuardSquare NV

 GuardSquare NV contact information is shown below
Owner:GUARDSQUARE NV
Owner Address:Tervuursevest 362/1 Leuven 3000 Belgium
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byGuardSquare NV

Brand:

APP-RAY

Description:

Computer hardware; computer peripherals; computer programs, namely, computer software for analysis of other software, computer software for simulation of operating conditions, computer software for quality control and computer software for safety checks; integrated circuits;Providing access to Internet portals; providing multiple user access to proprietary collections of information by means of global computer information networks; providing user access to computer programmes on data networks; providing access to databases on the Internet;Consultancy and advisory services relating to business management; business organisation consultancy; compilation, systematization of information on computer databases; updating and maintenance of information on computer databases; computerised file management;Scientific and technological services, namely, research and design in the field of computer software for analysis of other software, computer software for simulation of operating conditions, computer software for quality control and computer software for safety checks; design and development of computer hardware and software; research, development, design and upgrading of computer software; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; engineering; measurement evaluations in the field of computer software and computer hardware; development of measuring methods in the field of computer software and computer hardware; quality control for others; construction drafting; computer programming; product testing; design and development of computer hardware and computer software; maintenance and installation of computer software;

Category: COMPUTER HARDWARE
Brand:

APPSWEEP

Description:

Security software; software reliability software; threat data detection software; threat data analysis software; threat monitoring software; cloud network monitoring software; real-time threat monitoring software with intuitive dashboards and customs alert; software for scanning, detecting, removing viruses, worms, Trojan horses, adware, spyware and malware; software to protect software applications against suspicious activity and malicious users; software for providing mobile phone security; software for providing intrusion detection and prevention; software for data communications applications, and for the encryption and authentication of electronic information; fraud protection software; encryption software to enable secure transmission of digital information; software in the field of data security functions; application software; application software for mobile phones; computer software for controlling and managing access server applications; data processing software; software for secure storage; software for checking the security of the device and the application environment; software for optimizing applications; software for risk estimation;APP SWEEP;Software as a service; software development, programming and implementation; computer programming; database design; design services relating to computer software; design services for data processing systems; design of software packages; development, design, implementation, testing, analysis and consulting services in the field of security, access, authorization, authentication, encryption and identification software systems for computers, networks, mobile phones and other electronic devices; development of technologies for the protection of software applications; computer systems integration services; development of operating system software and administration of user rights in computer networks; computer support services, namely, computer software technical support services and software updating services; maintenance of software; technological services related to network, internet, computer, mobile phone security testing; surveying, technological research and studies; arranging and conducting technical surveys; surveying and providing scientific expertise; computer security threat analysis for protecting data;

Category: SECURITY SOFTWARE
Brand:

DEXGUARD

Description:

Computer software for encryption; Software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware and malware; Software for protection of software applications against reverse engineering and hacking; Software for providing network, internet, computer, and communication security in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, and communication hardening software; Software for providing online authentication and identity protection in the nature of computer software for authenticating user identification; Software for providing intrusion detection and prevention in the nature of computer software for the creation of firewalls; Software for the encryption and authentication of electronic information; Software for fraud protection in the nature of computer software for authenticating user identification; Software for cryptographic network security and data security functions in the nature of computer software for the creation of firewalls; Software for device fingerprinting in the nature of computer software for the identification of users and devices; Computer software for whitebox encryption; Software for secure keyboard in the nature of computer software for controlling the operation of secure keyboards; Software for biometric identity in the nature of downloadable middleware for authenticating users; Software for checking the security of the device and the application environment in the nature of computer anti-virus software; Software for visual hashes in the nature of computer software for generating visual hashes, namely, firmware for authenticating user identification; Software for optimizing applications in the nature of computer software for managing random-access memory while using system applications; Software for removing redundant data and resources from applications; Software for risk estimation in the nature of computer software for identifying risks for scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software for building applications, namely, software development tools for the creation of secure mobile internet applications; Software for compiling applications in the nature of compiler software; Computer application software for providing digital security, namely, software for networks, internet, computers, communication in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, and communication hardening software;DEX GUARD;Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design, development, and implementation of software for testing, analysis and consulting services in the field of security, access, authorization, authentication, encryption and identification systems for computers and networks; Testing of security systems; Computer services, namely, designing and implementing software in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, and communication hardening software for others; Research and development of technology in the field of protection of software applications; Research, development, design and upgrading of computer software in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, communication hardening software;

Category: COMPUTER SOFTWARE ENCRYPTION
Brand:

GUARDSQUARE

Description:

Computer software for encryption; Software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware and malware; Software for protection of software applications against reverse engineering and hacking; Software for providing network, internet, computer, communication, and mobile phone security in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, and communication hardening software; Software for providing online authentication and identity protection in the nature of computer software for authenticating user identification; Software for providing intrusion detection and prevention in the nature of computer software for the creating of firewalls; Software for the encryption and authentication of electronic information; Software for fraud protection in the nature of computer software for authenticating user identification; Software for cryptographic network security and data security functions in the nature of computer software for the creation of firewalls; Software for device fingerprinting in the nature of computer software for the identification of users and devices; Software for location verification in the nature of application software to detect the locations of users and devices; Computer software for whitebox encryption; Software for checking the security of the device and the application environment in the nature of computer anti-virus software; Software for digital signatures in the nature of computer application software for mobile phones, namely, software for digitally signing documents; Software for visual hashes in the nature of computer software for generating visual hashes in the nature of firmware for authenticating user identification; Software for optimizing applications in the nature of computer software for managing random-access memory while using system applications; Software for removing redundant data and resources from applications; Software for risk estimation in the nature of computer software for identifying risks for scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software for building applications, namely, software development tools for the creation of secure mobile internet applications; Software for compiling applications in the nature of compiler software; Computer application software for providing security, namely, software for networks, internet, computers, communication, and mobile phones in the nature of anti-spyware, anti-malware, application protection software, library protections software, obfuscation software, communication hardening software; none of the aforementioned including integrated software systems or services for financial transactions, payment processing and transfers, e-commerce, sales transactions, invoice processing, payroll management, sales and inventory tracking and management, invoicing, online retail platforms, stores and market places for use by third parties to market their own goods and services, and corresponding report and analytics for the same;GUARD SQUARE;Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design, development, and implementation of software for testing, analysis and consulting services in the field of security, access, authorization, authentication, encryption and identification systems for computers, networks, mobile phones and other electronic devices; Testing of security systems; Computer services, namely, designing and implementing software in the nature of anti-spyware, anti-malware, application protections software, library protections software, obfuscation software, communication hardening software for others; Research and development of technology in the field of protection of software applications; Research, development, design and upgrading of computer software in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, communication hardening software; none of the aforementioned including integrated software systems or services for financial transactions, payment processing and transfers, e-commerce, sales transactions, invoice processing, payroll management, sales and inventory tracking and management, invoicing, online retail platforms, stores and market places for use by third parties to market their own goods and services, and corresponding report and analytics for the same;

Category: COMPUTER SOFTWARE ENCRYPTION
Brand:

IXGUARD

Description:

Computer software for building applications, namely, software development tools for the creation of secure mobile applications; computer application software for providing security, namely, software for computers and mobile communication devices in the nature of application protection software, obfuscation software and anti-tamper software; software for protection of software applications against reverse engineering and hacking; software for assessing, reporting and preventing the security risks and privacy risks of installing software designed for mobile communication devices;NINE GUARD;Consultancy in the field of software for the protection and security of mobile applications; maintenance and updating of software for the protection and security of mobile applications; designing and developing software for the protection and security of mobile applications; research and development of technology in the field of protection of software applications;

Category: COMPUTER SOFTWARE BUILDING APPLICATIONS
Brand:

THREATCAST

Description:

Security software; software reliability software; threat data detection software; threat data analysis software; threat monitoring software; cloud network monitoring software; real-time threat monitoring software with intuitive dashboards and customs alert; software for scanning, detecting, removing viruses, worms, trojan horses, adware, spyware and malware; software to protect software applications against suspicious activity and malicious users; software for providing mobile phone security; software for providing intrusion detection and prevention; software for data communications applications, and for the encryption and authentication of electronic information; fraud protection software; encryption software to enable secure transmission of digital information; software in the field of data security functions; application software; application software for mobile phones; computer software for controlling and managing access server applications; data processing software; software for secure storage; software for checking the security of the device and the application environment; software for optimizing applications; software for risk estimation;THREAT CAST;Software as a service; software development, programming and implementation; computer programming; database design; design services relating to computer software; design services for data processing systems; design of software packages; development, design, implementation, testing, analysis and consulting services in the field of security, access, authorization, authentication, encryption and identification software systems for computers, networks, mobile phones and other electronic devices; development of technologies for the protection of software applications; computer systems integration services; development of operating system software and administration of user rights in computer networks; computer support services, namely, computer software technical support services and software updating services; maintenance of software; technological services related to network, internet, computer, mobile phone security testing; surveying, technological research and studies; arranging and conducting technical surveys; surveying and providing scientific expertise; computer security threat analysis for protecting data;

Category: SECURITY SOFTWARE