COMPUTER SECURITY SYSTEMS

Brand Owner (click to sort) Address Description
FORTRESS Locale Systems Corporation 1613 Capital of Texas Hwy S. Suite 201 Austin TX 78746 Computer security systems;
N-FACTOR CREDENTIAL Secure Campus, Inc. Suite 414 Warm Springs Blvd. Fremont CA 94539 Computer security systems, namely, a secure access control appliance that enforces business policy rules and compliance in global, distributed intellectual property networks;IN FACTOR CREDENTIAL;
NETWORK-1 NETWORK-1 Security Solutions, Inc. 70 Walnut Street Wellesley MA 02181 COMPUTER SECURITY SYSTEMS;CONSULTING REGARDING COMPUTER SECURITY SYSTEMS;
SECURE CAMPUS Secure Campus, Inc. Suite 414 Warm Springs Blvd. Fremont CA 94539 Computer security systems, namely, a secure access control appliance that enforces business policy rules and compliance in global, distributed intellectual property networks;
SECURE DESK Secure Campus, Inc. Suite 414 Warm Springs Blvd. Fremont CA 94539 Computer security systems, namely, a secure access control appliance that enforces business policy rules and compliance in global, distributed intellectual property networks;
SECURE GUARD Secure Campus, Inc. Suite 414 Warm Springs Blvd. Fremont CA 94539 Computer security systems, namely, a secure access control appliance that enforces business policy rules and compliance in global, distributed intellectual property networks;
SECURITY THAT THINKS VECTRA AI, INC. 550 S. Winchester Blvd., Suite 200 San Jose CA 95128 Computer security systems, namely, a hardware/software platform that combines learning, automated analysis and prioritized reporting to detect unauthorized access or attacks on computer systems and networks; computer systems, namely, a hardware/software platform for network security, network analytics and business intelligence analytics; and software for use in monitoring and maintaining the safety and data integrity of a computer network or a computer system;Development and implementation of computer security systems, namely, a hardware/software platform that combines learning, automated analysis and prioritized reporting to detect unauthorized access or attacks on computer systems and networks; development and implementation of computer systems, namely, a hardware/software platform for network security, network analytics and business intelligence analytics; and development and implementation of software for use in monitoring and maintaining the safety and data integrity of a computer network or a computer system;
TRUSTED GUARD Secure Campus, Inc. Suite 414 Warm Springs Blvd. Fremont CA 94539 Computer security systems, namely, a secure access control appliance that enforces business policy rules and compliance in global, distributed intellectual property networks;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.