SECURITY MONITORING COMPUTER SECURITY

Brand Owner (click to sort) Address Description
COUNTER THREAT UNIT SecureWorks Corp. Suite 500 One Concourse Parkway Atlanta GA 30328 Security monitoring of computer security networks, and providing computer security monitoring information in the field of vulnerability assessment and protection of computer data/information, networks, servers, applications, desktops and other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events;COUNTER THREAT;Installation, repair and maintenance of computer network protection, reporting, and security software; consultation in the field of software and computer networks and other information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data/information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data/information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data/information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data/information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data/information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer data/information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events;
CTU SecureWorks Corp. Suite 500 One Concourse Parkway Atlanta GA 30328 Security monitoring of computer security network; remote monitoring and detection of computer data/information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data/information, networks, servers, applications, desktops and other information technology infrastructure; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data/information, networks, servers, applications, desktops and other information technology infrastructure; providing security assessment of vulnerabilities of computer data/information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the field of vulnerability assessment for attack, intrusion, virus, unauthorized activity, misuse and anomalous event protection for computer data/information, networks, servers, applications, desktops and other information technology infrastructure;Installation, repair and maintenance of computer network protection software for protection of computer networks against viruses, attacks, intrusions, unauthorized activities, misuse and other anomalous events, reporting software, and security software; consultation in the field of software and computer networks and other information technology infrastructure; consultation in the field of computer security, namely, attack, intrusion, virus, unauthorized activity, misuse and anomalous event assessment, detection and protection for computer data/information, networks, servers, applications, desktops and other information technology infrastructure; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; computer services, namely, providing analyses, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure of others for attacks, intrusions, viruses, unauthorized activities, misuse and other anomalous events; conducting research in the field of computer security for attack, intrusion, virus, unauthorized activity, misuse and anomalous event protection, computer security assessment, detection and security for computer data/information, networks, servers, applications, desktops and other information technology infrastructure; and consultation in the field of computer security, namely, protecting computer data/information networks, servers, applications, desktops, and other information technology infrastructure against viruses, attacks, intrusions, unauthorized activities, misuse and other anomalous events;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for recovering previously activated security profiles utilizes memory and a security application. Initially, the security application enables a user to define a first security profile. After defining the first security profile, the user submits a request for activating the first security profile, and in response, the security application modifies a machine state of the computer system. The modification of the machine state in response to this request locks down the computer system, thereby implementing the first security profile defined by the user. Also in response to the request for activating the first security profile, the security application stores, in the memory, data indicative of the machine state so that the first security profile can be again implemented at a later time, if desired. In this regard, after causing a different security profile to be implemented by the computer system, a user may submit a request for changing the security profile of the computer system back to the first security profile. In response to such a request, the security application retrieves the data previously stored in the memory and automatically modifies the machine state so that the first security profile is again implemented by the computer system. As a result, any changes made to the security profile of the computer system since the submission of the aforementioned request for activating the first security profile are effectively nullified.