COMPUTER NETWORK SECURITY SOFTWARE

Brand Owner (click to sort) Address Description
ADVANCED AGILE INSPECTION ENGINE CORERO NETWORK SECURITY, INC. 293 Boston Post Road West, Suite 310 Marlborough MA 01752 Computer network security software, namely, a dynamic, flexible, high performance inspection engine that can be updated in the field in real time without the need for a software upgrade or reboot;INSPECTION ENGINE;
AGILE INSPECTION ENGINE CORERO NETWORK SECURITY, INC. 293 Boston Post Road West, Suite 310 Marlborough MA 01752 Computer network security software, optimized for parsing, verifying and modifying network protocols and which enables the deployment of a dynamic, flexible, high performance inspection engine that can be updated in the field in real time without the need for a software upgrade or reboot;INSPECTION ENGINE;
APPERCUT SECURITY Appercut Security, Ltd. 5460 Yonge St., Suite 1201 Toronto, Ontario M2N6K7 Canada Computer and network security software; security software that scans source code for back doors;SECURITY;Computer software support services, namely, software design services, remote installation of computer software and patching services in the nature of repairing and updating computer software by remote installation, installation technical support services and trouble shooting and repairing computer software problems;
ATTACKTRACE SYMANTEC CORPORATION 350 Ellis Street Mountain View CA 94043 Computer network security software;ATTACK TRACE;
BLINK eCompany, Inc. One Columbia, Suite 100 Aliso Viejo CA 92656 COMPUTER NETWORK SECURITY SOFTWARE;
BROWN BEAR COMMUNICATIONS Brown Bear Communications, Inc. 115 East 86th Street Apartment 131 New York NY 10028 Computer network security software for securing information entered from local and remote locations;COMMUNICATIONS;Computer network security services providing encryption and secured transaction security for users of telecommunications networks; computer security services, namely, providing secured transaction and online security services to registered users of a global computer network or private network to ensure the security and authentication of online transactions including any type of file transfers;
CATOOL Amaranth Networks, Inc. 324 Still River Road Bolton MA 01740 COMPUTER NETWORK SECURITY SOFTWARE; COMPUTER SOFTWARE FOR USE IN IMPLEMENTING E-MAIL ENCRYPTION, VIRTUAL PRIVATE NETWORK (VPN) CONTROL, WIRELESS ENCRYPTION, CERTIFICATE AUTHORITY (CA) MANAGEMENT, AND FIREWALLS;CERTIFICATE AUTHORITY TOOL;
CROSSVIEW FORCEPOINT FEDERAL HOLDINGS 10900-A STONELAKE BLVD. QUARRY OAKS 1, SUITE 350 AUSTIN TX 78759 Computer network security software;CROSS VIEW;
DNS DEFENDER CLOUDSHIELD TECHNOLOGIES, INC. 108 Dundee Lane San Carlos CA 94070 computer network security software;DNS;
EQUILOGIC McKennirey, Matthew c/o Netlexis Plano TX 75074 COMPUTER NETWORK SECURITY SOFTWARE;
GATE TECHNOLOGY V-ONE CORPORATION 20250 Century Blvd. Suite 300 Germantown MD 20874 computer network security software;TECHNOLOGY;
IDENTITY AUDIT Informed Control Inc. PO Box 90626 Austin TX 78709 Computer network security software;
IMASK IMASK, Inc 9 Plain Rd Westford MA 01886 Computer Network and Security Software and related consulting services;Computer Network and Security Software and related consulting services;
INTERNET CONTENT SHIELD True Technologies Solutions, L.C. 8200 Springwood - Suite 260 Irving TX 75063 computer and network security software for screening and filtering content of and access to internet sites.;
INTRUPRO intoto, Inc. Suite 300 3100 De La Cruz Boulevard Santa Clara CA 95054 Computer network security software;
LCE TENABLE, INC. 6100 Merriweather Drive, 12th Floor Columbia MD 21046 Computer network security software;
NETGATE Smallworks, Inc. 4501 Spicewood Springs Rd. Suite 1001 Austin TX 78759 computer network security software for protecting networks from unauthorized access;NET GATE;
PVS Tenable Network Security, Inc. 6100 Merriweather Drive, 12th Floor Columbia MD 20144 Computer network security software;
RADIUS Livingston Enterprises, Inc. 4464 Willow Road Pleasanton CA 94588 computer network security software;
SC TENABLE, INC. 6100 Merriweather Drive, 12th Floor Columbia MD 21046 Computer network security software;
SITE METER BRIGHTWORK DEVELOPMENT, INC. 766 Shrewsburg Avenue Gerral Center West Lenton Falls NJ 07724 computer network security software;SIGHT METER;
TOTAL COVER Polisner, Carol 115 East 86 Street Apartment 131 New York NY 10028 Computer network security software for securing information entered from local and remote locations;Computer network security services providing encryption and secured transaction security for users of telecommunications networks; computer security services, namely providing secured transaction and online security services to registered users of a global computer network or private network to ensure the security and authentication of online transactions including any type of file transfers;
TOTALCOVER Brown Bear Communications, Inc. 115 East 86th Street Apartment 131 New York NY 10028 Computer network security software for securing information entered from local and remote locations;TOTAL COVER;Computer network security services providing encryption and secured transaction security for users of telecommunications networks; computer security services, namely providing secured transaction and online security services to registered users of a global computer network or private network to ensure the security and authentication of online transactions including any type of file transfers;
TRUSTED GATEWAY SYSTEM FORCEPOINT FEDERAL HOLDINGS 10900-A STONELAKE BLVD. QUARRY OAKS 1, SUITE 350 AUSTIN TX 78759 Computer network security software; computer software that enables safe, secure and simultaneous data movement within and between computer networks;GATEWAY SYSTEM;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. In one embodiment, the present invention provides for receiving security events from a network device by a distributed software agent of a network security system, determining a priority of each received security event, and storing the security events in a plurality of prioritized event buffers based on the determined priorities for a period of time determined by a timer. Upon expiration of the timer, a batch of security events for transport to a security event manager of the network security system can be created by including security events in the batch in order of priority until the batch is full.