DOWNLOADABLE SOFTWARE COMPUTER SECURITY

Brand Owner (click to sort) Address Description
BAY DYNAMICS CA, INC. 1320 Ridder Park Drive San Jose CA 95131 Downloadable software for computer security; downloadable software in the field of information security management systems for information technology (IT) infrastructure and systems security, for user and entity behavioral analytics, predictive analytics for computer and network security, profiling and analyzing users, endpoints, applications and other entities independently and then correlates the data to identify threats, prioritize alerts, and communicate relevant information to the appropriate stakeholders, identifying anomalies in privileged user access, insight into third party vendor behavior, and intelligence about vulnerabilities within organizations' attack surface, detection, blocking, and facilitating removal and remediation of cyber-attacks, malicious attacks, insider threats, outsider threats, anomalous user behavior, compromised end points, compromised users, exploitable assets susceptible to threats, privilege account abuse, observed privilege activity, data exfiltration, phishing, bots, time bombs, worms, and advanced persistent threats, identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices, providing remediation and responder portal, providing just-in-time awareness training modules that personalize cyber education to change user behavior and shift the culture of the organization, providing executive dashboards and security self-service portals for cyber risk management, predicting and stopping crime before it happens by identifying, analyzing and correlating risky behavior and vulnerabilities across five vectors - insiders in the nature of employees, outsiders in the nature of bad actors, high privilege accounts, third party vendors and businesses' most valuable assets including who has access to them, and prioritizing the potential threats and security risk coming in through modern cyber threat vectors such as users, systems, applications, and vendors;
BEDROCK Kevix, Inc. 2061 Aly Avenue, 2nd Floor Menlo Park CA 94025 downloadable software for computer security and reliability, namely, formally proven software for edge and cloud computing;providing temporary use of non-downloadable, cloud-based software for computer security and reliability, namely, formally proven cloud-based software for edge and cloud computing;
ILLUMINATE Analyst Platform 11921 Freedom Drive, Suite 550 Reston VA 20190 Downloadable software for computer security threat analysis;Computer security threat analysis for protecting data;
LOGSIGN Logsign Inc. 764 San Aleso Avenue Sunnyvale CA 94085 Downloadable software for computer security, security compliance reporting, security intelligence and log management; downloadable cyber security computer software to protect computer networks against unauthorized intrusion, data theft, compromise, infiltration and corruption by hackers, and other risks related to computer security and for providing real-time Security Information Event Management (SIEM) for satellite networks for use in providing situational awareness and real-time monitoring across network and security devices;LOG SIGN;Cloud computing featuring software for computer security, security compliance reporting, security intelligence and log management; computer security services, namely, providing real-time Security Information Event Management (SIEM) for satellite networks for use in providing situational awareness across network and security devices;
ONE STOP EACCELERATION CORP. 1050 NE Hostmark Street, Suite 100B Poulsbo WA 98370 Downloadable software for computer security, namely, providing Internet security, email security, and anti-virus software featuring virus scanner, virus blocker, virus definition update, intrusion detection, privacy control, content filtering, firewall protection, encryption, spyware detection and removal, network security measures, and Internet advertisement eliminator;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.