COMPUTER SECURITY SYSTEM

Brand Owner (click to sort) Address Description
ACE/SENTRY SECURITY DYNAMICS TECHNOLOGIES, INC. 20 Crosby Drive Bedford MA 01730 computer security system, comprising, computer hardware, computer peripherals and computer software for verification and authentication of individuals for controlling access to computer networks and systems, and instruction manuals and booklets sold as a unit therewith;
CYBERWALL NETWORK-1 Security Solutions, Inc. 70 Walnut Street Wellesley MA 02181 computer security system;CYBER WALL;computer consulting on computer security;
E-LOCK NETWORK-1 Security Solutions, Inc. 70 Walnut Street Wellesley MA 02181 computer security system;computer consulting on computer security;
E-SHIELD NETWORK-1 Security Solutions, Inc. 70 Walnut Street Wellesley MA 02181 Computer security system;consulting on computer security;
E-WALL NETWORK-1 Security Solutions, Inc. 70 Walnut Street Wellesley MA 02181 computer security system;computer consulting on computer security;
FIRESHIELD NETWORK-1 Security Solutions, Inc. 70 Walnut Street Wellesley MA 02181 computer security system;FIRE SHEILD;computer consulting on computer security;
NETWORK WALL NETWORK-1 Security Solutions, Inc. 70 Walnut Street Wellesley MA 02181 computer security system;computer consulting on computer security;
PROX.PAD NORTEK SECURITY & CONTROL Suite 100 5919 Sea Otter Place Carlsbad CA 92010 COMPUTER SECURITY SYSTEM, COMPRISING, DEVICES, NAMELY, COMPUTER HARDWARE AND SOFTWARE FOR USE IN VERIFICATION AND AUTHENTICATION OF INDIVIDUALS FOR CONTROLLING ACCESS TO ENTRY WAYS AND DEVICES;PROX PAD;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.