INTRUSION

Brand Owner (click to sort) Address Description
ADVANTAGE SONITROL CORPORATION 211 N. Union Street, Suite 350 Alexandria VA 22314 INTRUSION, FIRE AND SOUND DETECTORS AND SECURITY MONITORS, POWER SUPPLIES, SWITCHES, CONSOLES, AND CIRCUITS;
FIBERPATROL SENSTAR CORPORATION Pri-Tec Industrial Park 119 John Cavanaugh Drive Carp, Ontario K0A1L0 Canada intrusion, movement and vibration detection security systems consisting of fiber optic cables which detect intrusion based on signals generated by flexing the cable and which are designed to be used on fences; intrusion, movement and vibration detection security systems consisting of fiber optic cables which detect intrusion based on signals generated by flexing the cable and which are designed to be used on the exterior of buildings; intrusion, movement and vibration detection security systems consisting of fiber optic cables which detect intrusion based on signals generated by flexing the cable and which are designed to be used on critical infrastructure, namely, pipelines, power generation, distribution and storage facilities, tele- and data- communications facilities, transportation and government facilities, and a national border for security; intrusion, movement and vibration detection systems consisting of fiber optic cables which detect intrusion based on signals generated by flexing the cable and which are designed to be used along the outdoor perimeter of a facility;FIBER PATROL;
FLEXPI SENSTAR CORPORATION Pri-Tec Industrial Park 119 John Cavanaugh Drive Carp, Ontario K0A1L0 Canada Intrusion, movement and vibration detection security systems consisting of microphonic cables which detect intrusion based on signals generated by flexing the cable and which are designed to be used on the exterior of buildings;FLEX PRIVATE EYE;
FLEXZONE SENSTAR CORPORATION Pri-Tec Industrial Park 119 John Cavanaugh Drive Carp, Ontario K0A1L0 Canada Intrusion, movement and vibration detection security systems consisting of microphonic cables which detect intrusion based on signals generated by flexing the cable and which are designed to be used on fences; intrusion, movement and vibration detection security systems consisting of microphonic cables which detect intrusion based on signals generated by flexing the cable and which are designed to be used on the exterior of buildings; intrusion, movement and vibration detection security systems consisting of microphonic cables which detect intrusion based on signals generated by flexing the cable and which are designed to be used on the interior of buildings;FLEX ZONE;
KROLL INTRUSION LIFECYCLE KROLL 55 East 52nd Street New York NY 10055 INTRUSION;Computer security consulting services in the field of digital forensics, incident response, cyberattack simulations, managed detection and response, and professional cyber security services including testing, assessments, and technical advisory; Technology research in the field of cyber threat intelligence, cyber security technology, and detection and response technology; Computer security consultancy in the field of monitoring, scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security planning services, namely, development of customized plans for improving computer and network security and preventing unauthorized and criminal activity for businesses and governmental agencies;
TOP COP Lone Star Alarms Systems, Inc. Suite L 11381 Meadowglen La. Houston TX 77082 Intrusion, Smoke, Fire and Burglar Alarms for Domestic and Commercial Use;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Disclosed is a method for configuring an intrusion detection system in a network which comprises determining a location in the network for a deployed intrusion detection sensor of the intrusion detection system, deploying the intrusion detection sensor in the determined location, enabling the intrusion detection sensor to monitor communication in a portion of the network, tuning the intrusion detection sensor to an appropriate level of awareness of the content in the communication in the network, prioritizing responses generated by the intrusion detection sensor to achieve an appropriate response to a detected intrusion in the network, configuring intrusion response mechanisms in the network to achieve an appropriate response by the mechanisms; and re-tuning the intrusion detection sensor in response to a prior intrusion detection.