DOWNLOADABLE COMPUTER SOFTWARE USING

Brand Owner (click to sort) Address Description
CYBERARK PRIVILEGE CLOUD CYBERARK SOFTWARE, LTD. 9 Ha'psagot St., Park Ofer 2 Petach Tikva 4951041 Israel Downloadable computer software for using, sharing and storing sensitive information over computer networks and over the Internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording sessions of users, and for detecting suspicious or malicious user activity and cyber-related threats; downloadable electronic computer manuals distributed with the foregoing;CYBER ARK PRIVILEGE CLOUD;PRIVILEGE CLOUD;Software as a service (SAAS) services featuring software for using, sharing and storing sensitive information over computer networks and over the Internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording sessions of users, and for detecting suspicious or malicious user activity and cyber-related threats;
FEARLESSLY FORWARD CYBERARK SOFTWARE LTD. 9 Ha'psagot St., Park Ofer 2 Petach Tikva 4951041 Israel Downloadable computer software for using, sharing and storing sensitive information over an enterprise computer networks and over the internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording sessions of users, for detecting suspicious or malicious user activity and cyber-related threats; downloadable computer software for transparently removing local administrative rights through least privilege management, just-in-time access and elevation, advanced credential theft protection and application control in order to reduce the attack surface, mitigate the risk of a data breach, to block and contain advanced persistent threat attacks at the endpoint, helping to prevent lateral movement within the network and information from being stolen or encrypted then held for ransom; downloadable computer software for protecting, securing, managing and auditing, credentials and secrets used by computer applications, automation scripts tools and other machine and non-human identities to securely access databases, web-services and other resources required to perform computing functions and deliver services, including all widely used non-human identities and application types including third party off-the-shelf software, internally developed application software, automation scripts, containerized, cloud, SaaS, PaaS, hybrid, mainframe and other software components, solutions, and compute environments; downloadable computer software for enabling secure application access over computer networks and over the internet, for protecting user identity using multi factor authentication, establishing secure just-in-time access to designated computing resources, monitoring and detecting privileged access, providing biometric user authentication services using biometric hardware and software technology, and for third party accounts management and related session activity monitoring; and downloadable electronic computer manuals distributed with the foregoing;Design, development, implementation of and consulting on computer software, and software as a service (SAAS) services featuring software, for using, sharing and storing sensitive information over an enterprise computer networks and over the internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording sessions of users, for detecting suspicious or malicious user activity and cyber-related threats; design, development, implementation of and consulting on computer software, and software as a service (SAAS) services featuring software, for transparently removing local administrative rights through least privilege management, just-in-time access and elevation, advanced credential theft protection and application control in order to reduce the attack surface, mitigate the risk of a data breach, to block and contain advanced persistent threat attacks at the endpoint, helping to prevent lateral movement within the network and information from being stolen or encrypted then held for ransom; design, development, implementation of and consulting on computer software for protecting, securing, managing and auditing, credentials and secrets used by computer applications, automation scripts tools and other machine and non-human identities to securely access databases, web-services and other resources required to perform computing functions and deliver services, including all widely used non-human identities and application types including third party off-the-shelf software, internally developed application software, automation scripts, containerized, cloud, SaaS, PaaS, hybrid, mainframe and other software components, solutions, and compute environments; and design, development, implementation of and consulting on computer software, and software as a service (SAAS) services featuring software, for enabling secure application access over computer networks and over the internet, for protecting user identity using multi factor authentication, establishing secure just-in-time access to designated computing resources, monitoring and detecting privileged access, providing user authentication services using biometric hardware and software technology, and for third party accounts management and related session activity monitoring;
HARMONY INTEGRATE INVENIAM CAPITAL PARTNERS, INC. 39500 High Pointe Blvd., Suite 220 Novi MI 48375 Downloadable computer software using a consensus engine incorporating blockchain technology for securing data with cryptographic information including services and software instructions that can be incorporated into other software for data immutability, provenance and publication for workflow management, process transparency and trusted data exchanges;INTEGRATE;Software-as-a-service featuring software using a consensus engine incorporating blockchain technology for securing data with cryptographic information including services and software instructions that can be incorporated into other software for data immutability, provenance and publication for workflow management, process transparency and trusted data exchanges;
LINGUISTIC GPS Anatomy Mapper 4327 Pine Ridge Circle Monclova OH 43542 Downloadable computer software for using language to describe pinpoint positions on a map, and to create map visualizations from linguistic descriptions; Downloadable mobile applications for using language to describe pinpoint positions on a map, and to create map visualizations from linguistic descriptions;LINGUISTIC GLOBAL POSITIONING SYSTEM;Providing on-line non-downloadable software for using language to describe pinpoint positions on a map, and to create map visualizations from linguistic descriptions; Software as a service (SAAS) services featuring software for using language to describe pinpoint positions on a map, and to create map visualizations from linguistic descriptions;
PRIVILEGE CLOUD CYBERARK SOFTWARE, LTD. 9 Ha'psagot St., Park Ofer 2 Petach Tikva 4951041 Israel Downloadable computer software for using, sharing and storing sensitive information over computer networks and over the Internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording sessions of users, and for detecting suspicious or malicious user activity and cyber-related threats; downloadable electronic computer manuals distributed with the foregoing;CLOUD;Software as a service (SAAS) services featuring software for using, sharing and storing sensitive information over computer networks and over the Internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording sessions of users, and for detecting suspicious or malicious user activity and cyber-related threats;
TRACAB CHYRONHEGO US HOLDING CORPORATION 532 Broadhollow Road - Suite 135 Melville NY 11747 Downloadable computer software using an array of optical cameras, and/or wearable transponders, radio frequency and/or GPS tracking devices, and/or advanced computer vision-based image and data processing to track, calculate and display the coordinates of players, officials and objects on a playing field and to produce and display real-time physical, tactical and statistical data for live and post-game analysis regarding the players relative to the current and total playing time;
VÖISTON VOISTON, INC. Rua Vergueiro, 2087 conj 1009 São Paulo 04102 Brazil Downloadable computer software for using artificial intelligence for use in extracting data from cloud based electronic medical records and exams; Downloadable software for use in extracting data from cloud based electronic medical records and exams;Providing on-line non-downloadable software using artificial intelligence for use in extracting data from cloud based electronic medical records and exams; Providing temporary use of on-line non-downloadable software and applications using artificial intelligence for use in extracting data from cloud based electronic medical records and exams; Software as a service (SAAS) services featuring software for use in extracting data from cloud based electronic medical records and exams;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. There is disclosed an apparatus for controlling a physical layer interface of a network interface card. The apparatus comprises: 1) a read only memory (ROM) for storing an embedded control program; 2) a random access memory for storing a downloadable software control program; and 3) a microcontroller for controlling the physical layer interface, wherein the microcontroller in a first operating mode executes the embedded control program to thereby control the physical layer interface, and wherein the microcontroller in a second operating mode downloads the downloadable software control program from an external processing system and executes the software control program in place of the embedded control program to thereby control the physical layer interface.