DOWNLOADABLE SOFTWARE CYBERSECURITY

Brand Owner (click to sort) Address Description
APPICRYPT AHEAD iTec, s.r.o. Za dvorem 505 Zlín, Stípa 76314 Czech Republic Downloadable software for cybersecurity; downloadable software for ensuring the security of applications (apps) and application programming interfaces (API's); downloadable cybersecurity software with encryption features and application programming interface (API) protection features;
CHECKLIGHT Sera-Brynn Suite 100 1435 Crossways Blvd. Chesapeake VA 23320 Downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes;CHECK LIGHT;Software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; Event Management as a Service (SIEMaaS) in the field of cybersecuirty, computer and network security, and prevention of computer and network risks purposes;
HOXHUNT HoxHunt Oy Itämerentori 2 FI-00180 HELSINKI Finland Downloadable software for cybersecurity and cybersecurity awareness and training; Downloadable mobile application for cybersecurity and cybersecurity awareness and training; Downloadable software in the nature of a mobile application for cybersecurity and cybersecurity awareness and training; Downloadable computer software applications for cybersecurity and cybersecurity awareness and training; Downloadable computer application software for cybersecurity and cybersecurity awareness and training; Downloadable computer firmware for cybersecurity and cybersecurity awareness and training; Downloadable computer gaming software; Downloadable computer gaming software for use on mobile and cellular phones and handheld computers; Computer hardware, namely, automatic access control apparatus for detecting, mitigating and preventing user risk for cybersecurity; Recorded software for automatic access control apparatus for access to digital assets, namely, mailing lists, documents, data, and emails; Electronic data loggers and data recording apparatus; Computer storage devices, namely, high-speed storage subsystems for storage of electronic data either locally or via a telecommunications network; Electronic databases in the field of security recorded on computer media; Electronic computer components and parts; Computer networking and data communications equipment, namely, hubs, switches, and routers; Display devices, namely, computer monitors; Television receivers and film and video devices, namely, video cameras; Image scanners; Recorded content, namely, ebooks, books, DVDs, CDs, video tapes, and pre-recorded USB flash drives featuring cybersecurity and cybersecurity awareness; Downloadable video recordings featuring cybersecurity and cybersecurity awareness; Downloadable audio recordings featuring cybersecurity and cybersecurity awareness; Recorded software for safety, security, protection and signaling devices for detecting, mitigating and preventing user risk of cybersecurity; Educational apparatus and simulators in the field of cybersecurity and cybersecurity awareness, namely, computers used with Computer Managed Learning and Computer Assisted Instruction as teaching aids for cybersecurity awareness training and phishing simulations; Sensors and detectors for detecting, mitigating and preventing cybersecurity risks;Technical supervision and inspection services in the field of cybersecurity; Testing and inspection services for alarm and monitoring systems; Computer system monitoring of computer system services by remote access to ensure proper functioning; Information technology consulting services related to computer hardware, software and peripherals design; Cybersecurity services in the nature of restricting unauthorized access to computer systems; IT engineering services; Computer services, namely, IT security services in the nature of protection and recovery of computer data; Technical advice relating to cybersecurity safety; Research relating to security, namely, cybersecurity and cybersecurity awareness; Computer hardware development; Computer software development, programming and implementation for increasing cybersecurity; Maintenance of computer software; Rental of computer software and programs; Programming of electronic control systems; Rental of computer hardware and computer software; Web-site hosting services; Software as a service (SAAS) services featuring software for use by others for use in increasing cybersecurity and for training in the field of cybersecurity; Consultancy and advice in the design and development of computer hardware and software; Platform as a service [PaaS] featuring computer software platforms for increasing cybersecurity; IT consultancy and advisory services; Design services, namely, design of computer networks and software for cybersecurity; Testing, authentication and quality control in the field of cybersecurity; Scientific and technological services, namely, scientific research and testing in the field of cybersecurity; Computer security services, namely, monitoring and management of computer systems for security purposes in the field of encrypted and secure communications; Computer security services, namely, identification and verification of digital identity and electronic signatures;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. There is disclosed an apparatus for controlling a physical layer interface of a network interface card. The apparatus comprises: 1) a read only memory (ROM) for storing an embedded control program; 2) a random access memory for storing a downloadable software control program; and 3) a microcontroller for controlling the physical layer interface, wherein the microcontroller in a first operating mode executes the embedded control program to thereby control the physical layer interface, and wherein the microcontroller in a second operating mode downloads the downloadable software control program from an external processing system and executes the software control program in place of the embedded control program to thereby control the physical layer interface.