DOWNLOADABLE SOFTWARE FEATURING SUITE

Brand Owner Address Description
SINGULARITY SENTINELONE, INC. 444 Castro Street, Suite 400 Mountain View CA 94041 Downloadable software featuring a suite of cybersecurity software and tools; downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; computer software feature for computer security incident tracking, sold as an integral component of downloadable software; downloadable software for Internet of Things (IOT) device and end point discovery and management; downloadable software for connected device discovery and management; downloadable software for computer network mapping; downloadable software for managing the cyber security of environments combining computing devices and related networks; downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; downloadable software and applications for managing the cyber security of environments combining computing devices and related networks; downloadable software and applications for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; computer software feature to search for and index electronic data relating to security incidents and threats, sold as an integral component of downloadable software for cybersecurity; computer software feature for ingesting, analyzing, and providing cybersecurity threat intelligence information, sold as an integral component of downloadable software for cybersecurity; downloadable computer software for accessing third-party computer software and associated data; downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; downloadable cybersecurity software featuring technology for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources;Platform as a Service (PaaS) services featuring a suite of cybersecurity software and tools; Software as a service (SAAS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; computer software feature for computer security incident tracking, sold as an integral component of online non-downloadable software; providing temporary use of on-line non-downloadable software for Internet of Things (IOT) device and end point discovery and management; providing temporary use of on-line non-downloadable software for connected device discovery and management; providing temporary use of on-line non-downloadable software for computer network mapping; providing a website featuring non-downloadable software for managing the cyber security of environments combining computing devices and related networks; providing a website featuring non-downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; providing temporary use of on-line non-downloadable software and applications for managing the cyber security of environments combining computing devices and related networks; providing temporary use of on-line non-downloadable software and applications for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Computer software feature to search for and index electronic data relating to security incidents and threats, sold as an integral component of online non-downloadable software for cybersecurity; Computer software feature for ingesting, analyzing, and providing cybersecurity threat intelligence information, sold as an integral component of online non-downloadable software for cybersecurity; Platform as a service (PAAS) services featuring computer software for accessing third-party computer software and associated data; providing temporary use of on-line non-downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; providing non-downloadable cybersecurity software featuring technology for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method and apparatus are disclosed for providing data from a service to a client based on the encryption capabilities of the client. Cipher suite lists are exchanged between a client and an endpoint. On the endpoint, the cipher suite list incorporates a mapping of cipher suite names to services. The endpoint uses the client's list of cipher suites in conjunction with the mapping of cipher suite names to services to determine a cipher suite match. A service is selected based on the cipher suite match. A server farm is selected based on the service. The client is informed of this cipher suite match and the endpoint retains knowledge of the cipher suite match throughout the session. Therefore, the encrypted connection between the client and the endpoint can be disconnected and later reestablished to provide data from the particular server.