COMPUTER NETWORK SECURITY

Brand Owner (click to sort) Address Description
ALL COVERED SECURE ALL BASES COVERED, INC. 1001 Marshall Street, Suite 200 Redwood City CA 94063 computer network security, computer virus protection, and content filtering services, and computer network security, computer virus protection, and content filtering products;
CRYTICA SECURITY Crytica Security Inc. 7655 TOWN SQUARE WAY, SUITE 212 Reno NV 89523 Computer network security, system security, file security, data security, and device security software; computer software for management and monitoring of computer networks, systems, files, data, and computing devices; computer software for detection, analysis, and reporting, of changes to computer networks, systems, applications, files, data, and computing devices; computer software for data and file security; computer software for providing compliance monitoring and configuration control of hardware and software;
IF YOU CAN'T DETECT, YOU CAN'T PROTECT Crytica Security Inc. 7655 TOWN SQUARE WAY, SUITE 212 Reno NV 89523 Computer network security, system security, file security, data security, and device security software; computer software for management and monitoring of computer networks, systems, files, data, and computing devices; computer software for detection, analysis, and reporting, of changes to computer networks, systems, applications, files, data, and computing devices; computer software for data and file security; computer software for providing compliance monitoring and configuration control of hardware and software;IF YOU CAN NOT DETECT YOU CAN NOT PROTECT;
TRIPWIRE Tripwire, Inc. 308 SW 2nd Avenue Portland OR 97204 Computer network security, system security, file security, and data security software; computer software for management and monitoring of computer networks, systems, files, and data; computer software for detection, analysis, reporting, and restoration of changes to computer networks, systems, applications, files, and data; computer software for data and file security; computer software for managing hardware and software in an information technology environment; computer software for providing compliance monitoring and configuration control of hardware and software;TRIP WIRE;Computer software consulting; computer software installation and maintenance; customizing computer software;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A policy-based network security management system is disclosed. In one embodiment, the system comprises a security management controller comprising one or more processors; a computer-readable medium carrying one or more sequences of instructions for policy-based network security management, wherein execution of the one or more sequences of instructions by the one or more processors causes the one or more processors to perform the steps of receiving a set of data regarding a user of a computer network; automatically deciding on a course of action based on the set of data, wherein the course of action may be adverse to the user although the set of data is insufficient to establish whether the user is performing a malicious action; and sending signals to one or more network elements in the computer network to implement the decision.