COMPUTER SECURITY SOFTWARE ENSURING

Brand Owner Address Description
ISARS ISARS 12 Route de la butte à l'oison F-78125 POIGNY LA FORET France Computer security software for ensuring the security of electronic mail, and for restricting unauthorized access to hard drives, computer networks and websites; Software for monitoring, analyzing, controlling, recording, detecting and filtering transfers of information and data to and from external media, via and on the internet, information networks, workstations, computers as well as access to information, data, sites, servers; Software for auditing, protecting and securing information, data, networks, computer systems, computers, servers and workstations; Computer software for use in ensuring the security of electronic mail for fraud protection purposes; Computer software for monitoring computers for security purposes; Downloadable electronic publications in the nature of instruction manuals and instructional data sheets for use with computer software;The wording ISARS has no meaning in a foreign language.;Software as a service (saas) featuring software for the protection, security and access control of computer systems; Computer services for monitoring, analyzing, controlling, recording, detecting and filtering information and data transfers as well as access to information, data, sites and servers in the nature of monitoring computer systems for detecting unauthorized access or data breaches; Creation, design and development of computer software for protection, security and access control; Monitoring of computer systems and networks in the nature of monitoring computer systems for detecting unauthorized access or data breaches for computer security purposes; Provision of security threat management systems, namely, surveillance and monitoring of security vulnerabilities and problems in software products, on the internet, and on computer networks in the nature of monitoring computer systems for detecting unauthorized access or data breaches; Auditing and computer security control services, namely, testing of security systems; computer services, namely, detection of computer security breaches or malware on computers and electronic devices; Cloud computing featuring software for use in ensuring the security of electronic mail and restricting unauthorized access to hard drives, computer networks and websites; Computer software rental; Computer support services in the field of computer security, namely, testing of security systems; Services provided by IT project consultants, particularly relating to computer security, namely, testing of security systems and restricting unauthorized access to hard drives, computer networks and websites; Consulting and information relating to the design and development of computer software; Consulting and information relating to the aforesaid services;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.