SECURITY SOFTWARE

Brand Owner (click to sort) Address Description
ACTIVE HUNT Morta Security, Inc. 525 University Ave., A81 Palo Alto CA 94301 security software, computer services, cloud computing services;
APPSWEEP GuardSquare NV Tervuursevest 362/1 Leuven 3000 Belgium Security software; software reliability software; threat data detection software; threat data analysis software; threat monitoring software; cloud network monitoring software; real-time threat monitoring software with intuitive dashboards and customs alert; software for scanning, detecting, removing viruses, worms, Trojan horses, adware, spyware and malware; software to protect software applications against suspicious activity and malicious users; software for providing mobile phone security; software for providing intrusion detection and prevention; software for data communications applications, and for the encryption and authentication of electronic information; fraud protection software; encryption software to enable secure transmission of digital information; software in the field of data security functions; application software; application software for mobile phones; computer software for controlling and managing access server applications; data processing software; software for secure storage; software for checking the security of the device and the application environment; software for optimizing applications; software for risk estimation;APP SWEEP;Software as a service; software development, programming and implementation; computer programming; database design; design services relating to computer software; design services for data processing systems; design of software packages; development, design, implementation, testing, analysis and consulting services in the field of security, access, authorization, authentication, encryption and identification software systems for computers, networks, mobile phones and other electronic devices; development of technologies for the protection of software applications; computer systems integration services; development of operating system software and administration of user rights in computer networks; computer support services, namely, computer software technical support services and software updating services; maintenance of software; technological services related to network, internet, computer, mobile phone security testing; surveying, technological research and studies; arranging and conducting technical surveys; surveying and providing scientific expertise; computer security threat analysis for protecting data;
BRAXOS SECURITY SOFTWARE braXos Security Software P.O. Box 1013 New Albany OH 43054 SECURITY SOFTWARE;Software development, programming and implementation; computer and mobile application programming; computer and mobile application software design; updating of computer and mobile application software; computer and mobile application software consultancy; installation of computer and mobile application software; maintenance of computer and mobile application software;
BULLETPROOF Bulletproof Cyber Limited Unit H, Gateway 1000, Whittle Way Stevenage SG12FP United Kingdom Security software, namely, software for use in controlling access to computer networks, transmitting secure email, authorizing access to databases, assessing and testing the cyber-security status of computer systems and networks; computer application software for mobile phones and tablet computers, namely, security software for use in authorizing access to databases, controlling access to computer networks, and protecting mobile internet-enabled devices against cyber threats by provision of anti-intrusion functionality; Downloadable computer security software, namely, anti-virus software; Software for ensuring the security of electronic mail; Software to control building environmental, access and security systems; Computer software for the remote control of security apparatus, namely, software to remotely control intrusion prevention systems for computer networks and systems; Magnetically encoded cards with security features for identification purposes; Security apparatus for processing audio signals, namely, alarms and alerting devices; Electronic security systems for home network, namely, computer hardware and software for the operation and control of home environmental automation systems, software and hardware to remotely operate door locks, computer hardware and software for the operation and control of IT infrastructure systems and networks; Electronic security tags; security alarms;BULLET PROOF;Computer and internet security services, namely, detecting, quarantining and eliminating unauthorized data and programs on computers and repair of damaged software files, assessing and testing the cyber-security status of computer systems and networks; Consultancy in the field of computer security software; Consultancy in the field of computer security; Programming of Internet security programs; Computer programming services for electronic data security; Computer security services for protection against illegal network access; Provision of security services, namely, monitoring computer systems and networks to control computer access, monitoring and controlling computer systems and networks to mitigate denial-of-service attacks, monitoring and controlling computer systems and networks to provide cyber -threat protection, and manage online financial transactions; Design and development of Internet security programs; Design and development of electronic data security systems; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Data security consultation services; remote monitoring of computer security system to ensure proper functioning; Website usability testing services; Safety technological testing services; Computer aided testing services; Testing services for alarm and monitoring systems to determine conformity with certification standards; Testing services relating to computer software, computer programs, computer hardware, IT security, computer infrastructure and network, computer configurations and electronic data processing systems to ensure compliance with industry standards; consultation services in the field of computer software applications system testing; testing of computer software applications to assess IT security and networks for access vulnerabilities; Configuration of computer systems and networks; Configuration of computer software; Configuration of computer firmware; Technical testing services, namely, assessing and testing the cyber-security status of computer systems and networks; Testing of computer systems and networks for the certification of quality or standards; Advisory services relating to computer security; cyber security services, namely, protection and monitoring of digital assets and users of computing resources for cloud, mobile, or network resources, and enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; Security threat analysis for protecting computer systems and networks; Security monitoring services, namely, monitoring of server, storage and network infrastructure, virtualisation software, and web, mobile and software applications for security events;
BULLWALL BullWall A/S ÿster Snedevej 15B, st. Vejle ￿st 7120 Denmark Security software; computer software; firmware; computer systems;BULL WALL;Software development; development of computer programs; development of computer firmware; development of computer systems; computer and information technology consultancy services; advisory services relating to computer programming; information technology [IT] consultancy; rental of computer software; computer software consultancy; software as a service [SaaS]; computer virus protection services; monitoring of computer systems for security purposes; provision of security services for computer networks, computer access and computerised transactions;
BULLWALL BullWall A/S ÿster Snedevej 15B, st. Vejle ￿st 7120 Denmark Security software; computer software; firmware; computer systems;BULL WALL;Software development; development of computer programs; development of computer firmware; development of computer systems; computer and information technology consultancy services; advisory services relating to computer programming; information technology [IT] consultancy; rental of computer software; computer software consultancy; software as a service [SaaS]; computer virus protection services; monitoring of computer systems for security purposes; provision of security services for computer networks, computer access and computerised transactions;
COMPUTRACE Absolute Software Corporation Suite 1400, 1055 Dunsmuir Street Vancouver, B.C. V7X1K8 Canada Security software, computer disks and erasable programmable read only memories (EPROMS) for security systems for computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices, and manuals sold as a unit therewith;COMPUTING TRACE;Monitoring and tracking services for locating lost or stolen computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices programmed with software designed to contact the monitoring service center on a regular basis or in the event of theft or loss of the computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices;
CRYPTEIA PCCW-HKT DATACOM SERVICES LIMITED 39th Floor, PCCW Tower, Taikoo Place 979 King's Road, Quarry Bay Hong Kong Hong Kong Security software, programs and applications, namely, software for use for predicting, discovering, identifying and managing computer network security threats within an organisation; security analytics software, programs and applications, namely, software for use by security analysists to facilitate the search and analysis of data related to cyber threats within an organisation; electronic documentation and manuals sold in conjunction with the aforementioned goods; all of the aforementioned goods relating to data security, security analytics and threat management operations within an organisation;Computer services, namely, design, programming, development, implementation, hosting, optimisation, performance management, updating, repair, installation, maintenance and configuration of computer software, programs and applications for security analytics and threat management operations within an organisation; online provision of web-based software, namely, the provision of a cloud-based platform that collects, correlates, monitors and mines behavioural data activity logs produced by inter-connected network elements, such as firewalls, routers, intrusion detection tools and other security devices, in order to evaluate and report on patterns and behaviour consistent with a potential cyberattack; monitoring and surveillance of computer networks and systems and their users for the purposes of providing security analytics and directing threat management operations within an organisation; all of the aforementioned services relating to data security, security analytics and threat management operations within an organisation;
CYBEATS Cybeats Technologies Inc. 65 International Blvd., Suite #202 Toronto Ontario M9W6L9 Canada Security software; computer software for encrypting and authenticating data; computer software, namely, cyber security software; computer software for computer security, computer network security and information security purposes; computer software in the field of the security risk industry, namely, computer security software; computer software for managing computer security strategy and resources; computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing devices; computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; computer software for managing cyber incident response, alert management, response management, cyber incident investigation, and cyber incident data collection and analysis; application programing interfaces (APIs), namely, computer software comprising a set of subroutine definitions, protocols, and tools for building application software, for integrating external systems into detection and incident response management systems; computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats;Services for enhancing the performance, function and security of computer networks, namely, installation and maintenance of computer hardware; troubleshooting of computer hardware, namely, troubleshooting in the nature of the repair of computer hardware; maintenance and repair of computer hardware; installation, maintenance and repair of computer hardware and software; upgrading of computer hardware; installation of Access Control as a Service (ACaaS) hardware;Computer network security services; computer security consultancy; design and development of electronic data security systems; developing computer software; internet security consultancy; maintenance of computer software relating to computer security and prevention of computer risks; monitoring of computer systems for detecting unauthorized access or data breach; computer consultation in the fields of computer networks security, cyber security, cyber threat detection, cybercrime, and prevention and mitigation of cyber risk; providing online non-downloadable software in the field of computer security; Software as a Service (SAAS) services featuring computer security and risk assessment and remediation; Platform as a Service (PAAS) services featuring computer security and risk assessment and remediation; providing online non-downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; providing online non-downloadable cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing firmware based devices; providing online non-downloadable computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; providing online non-downloadable computer software for managing cyber incident response, alert management, response management, cyber incident investigation and cyber incident data collection and analysis; providing online non-downloadable computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats;
CYBEATS SBOM STUDIO Cybeats Technologies Inc. 65 International Blvd., Suite #202 Toronto Ontario M9W6L9 Canada Security software; computer software for encrypting and authenticating data; computer software, namely, cyber security software; computer software for computer security, computer network security and information security purposes; computer software in the field of the security risk industry, namely, computer security software; computer software for managing computer security strategy and resources; computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing devices; computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; computer software for managing cyber incident response, alert management, response management, cyber incident investigation, and cyber incident data collection and analysis; application programing interfaces (APIs), namely, computer software comprising a set of subroutine definitions, protocols, and tools for building application software, for integrating external systems into detection and incident response management systems; computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats;Services for enhancing the performance, function and security of computer networks, namely, installation and maintenance of computer hardware; troubleshooting of computer hardware, namely, troubleshooting in the nature of the repair of computer hardware; maintenance and repair of computer hardware; installation, maintenance and repair of computer hardware and software; upgrading of computer hardware; installation of Access Control as a Service (ACaaS) hardware;CYBEATS SOFTWARE BILL OF MATERIALS STUDIO;Computer network security services; computer security consultancy; design and development of electronic data security systems; developing computer software; internet security consultancy; maintenance of computer software relating to computer security and prevention of computer risks; monitoring of computer systems for detecting unauthorized access or data breach; computer consultation in the fields of computer networks security, cyber security, cyber threat detection, cybercrime, and prevention and mitigation of cyber risk; providing online non-downloadable software in the field of computer security; Software as a Service (SAAS) services featuring computer security and risk assessment and remediation; Platform as a Service (PAAS) services featuring computer security and risk assessment and remediation; providing online non-downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; providing online non-downloadable cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing firmware based devices; providing online non-downloadable computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; providing online non-downloadable computer software for managing cyber incident response, alert management, response management, cyber incident investigation and cyber incident data collection and analysis; providing online non-downloadable computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats;
CYBERDOME Revbits Suite 1R 2 Twelvepence Court, Melville NY 11747 security software, namely, anti-malware, anti-phishing, and anti-hacking software, security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Downloadable computer software for use in computer security, namely, end-point control, device management, malware detection and response, threat detection and response, virus detection and response; honeypots, namely, computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems; downloadable privileged access management computer software for use in controlling, monitoring and managing user access to computer systems and software, computer software for managing and securing passwords and sensitive information; computer software for managing software encryption keys; computer software for managing digital public key identity certificates that allow secure exchange of data over the Internet; software for blocking detected phishing sites in email links and web browsing; Downloadable computer software for use in initiating, monitoring and recording privileged sessions between users and computer hardware and software systems, initiating privileged sessions between users and computer hardware and software systems without revealing passwords to the end user, and recording usage of administrative and privileged accounts and activities performed by users during privileged sessions and including a playback feature of such recordings;CYBER DOME;non-downloadable security software, namely, anti-malware, anti-phishing, and anti-hacking software, non-downloadable security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; non-downloadable computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; non-downloadable computer software for use in computer security, namely, end-point control, device management, malware detection and response, threat detection and response, virus detection and response; non-downloadable training simulation software in the field of analyzing, detecting and preventing digital and online threats consisting of computer virus, malware and phishing attacks;
CYDEF Cyber Defence QCD Corporation #308 - 1505 Laperriere Avenue Ottawa, Ontario K1Z7T1 Canada Security software;Computer security services;
CYSCALE CYSCALE SYSTEMS S.R.L. 150D Abatorului Street, Romania Security software; utility, security and cryptography software; software for network and device security; software for ensuring the security of electronic mail; software to control building environment, access and security systems; downloadable computer security software; safety, security, protection and signalling devices; electronic security systems for home network; cloud computing software; downloadable cloud computing software; application software for cloud computing services; risk detection software; operational risk management software; computer software for testing vulnerability in computers and computer networks; threat detection software; intrusion detection system [ids] software; computer software for the detection of threats to computer networks;Consultancy in the field of security software; computer security consultancy; data security services; internet security consultancy; data security consultancy; data security services [firewalls]; research in the field of internet security; computer security system monitoring services; it security, protection and restoration; programming of internet security programs; monitoring of computer systems for security purposes; computer security threat analysis for protecting data; computer programming services for electronic data security; design and development of internet security programs; consultancy in the field of computer security; consultancy in the field of data security; professional consultancy relating to computer security; provision of computer security risk management programs; design and development of electronic data security systems; computer security services for protection against illegal network access; computer security services in the nature of administering digital certificates; provision of security services for computer networks, computer access and computerised transactions; updating of computer software relating to computer security and prevention of computer risks; maintenance of computer software relating to computer security and prevention of computer risks; cloud computing; cloud computing services; consulting services in the field of cloud computing; consulting in the field of cloud computing networks and applications; programming of operating software for accessing and using a cloud computing network; design and development of operating software for accessing and using a cloud computing network; design and development of operating software for cloud computing networks; rental of operating software for accessing and using a cloud computing network; providing temporary use of online non-downloadable software for accessing and using a cloud computing network; providing temporary use of on-line non-downloadable operating software for accessing and using a cloud computing network; consultancy and information services relating to information technology architecture and infrastructure; consultancy and information services in the field of information technology architecture and infrastructure; information technology consultancy; information technology consulting; information technology services; information services relating to information technology;
D-FIRST Glasswall (IP) Limited 18A St James's Place London SW1A1NH United Kingdom Security software, namely, computer software for protection of computer systems against viruses; computer software for inspecting and filtering data, files and emails; computer software for blocking and control of computer malicious software and viruses; computer software for detecting malicious software in data, files and emails; computer software for removing malicious software from data, files and emails; computer software for sanitising data, files and emails; computer software for repairing data, files and emails from which malicious software has been removed; computer software for the transmission of data, files and emails; computer software to manage and monitor document libraries; downloadable computer software for inspecting, filtering, sanitising and rebuilding data, files and emails; software for ensuring the security of electronic mail; computer anti-virus software and computer anti-virus filtering software;In the statement, line 62, 000032965280 should be deleted, and 00003296528 should be inserted.;Installation, maintenance and repair of computer hardware, computer networking hardware and computer hardware systems for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails; installation, maintenance and repair of computer hardware, computer networking hardware and computer hardware systems for blocking, filtering and control of computer malicious software and viruses; installation, maintenance and repair of computer hardware, computer networking hardware and computer hardware systems for managing and monitoring document libraries; consultation about the repair of computer hardware, computer networking hardware and computer hardware systems for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails; consultation about the repair of computer hardware, computer networking hardware and computer hardware systems for blocking, filtering and control of computer malicious software and viruses; technical support services, namely, technical advice relating to the repair of computer hardware, computer networking hardware, and computer hardware systems for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails; technical support services, namely, technical advice relating to the repair of computer hardware, computer networking hardware, and computer hardware systems for blocking, filtering and control of computer malicious software and viruses; technical support services, namely, technical advice relating to the repair of computer hardware, computer networking hardware, and computer hardware systems for managing and monitoring document libraries; information and advisory services relating to the aforementioned services;Computer diagnostic services; updating, and design of computer software and computer programs; computer programming services; rental of computer software; customised design and creation of computer software and computer programs; all of the above services connected to the provision of systems for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails, blocking, filtering and control of computer malicious software and viruses and managing and monitoring document libraries; development of computer software relating to computer security and prevention of computer risks; computer security consultancy; computer virus protection services; computer services, namely, on-line scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, and unauthorized data and programs on computers and electronic devices; installation, maintenance and repair of security software for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails; installation, maintenance and repair of security software for blocking, filtering and control of computer malicious software and viruses; installation, maintenance and repair of security software for managing and monitoring document libraries; consultation about the repair of security software for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails; consultation about the repair of security software for blocking, filtering and control of computer malicious software and viruses; technical support services, namely, technical advice relating to the repair of security software for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails; technical support services, namely, technical advice relating to the repair of security software for blocking, filtering and control of computer malicious software and viruses; technical support services, namely, technical advice relating to the repair of security software for managing and monitoring document libraries; information and technical advisory services relating to all the aforementioned services;
DEDAUB Dedaub SCS, 2nd Floor Tower Business Centre, Tower Street, Swatar BKR 4013 Birkirkara Malta Security software; downloadable computer security software; downloadable computer software for blockchain technology; computer software for encryption; utility, security and cryptography software; software for network and device security; computer application software; computer software; software for computers; computer software applications;Computer software development; development of computer software; computer security consultancy; development of computer hardware and software; computer software maintenance; computer software integration; maintenance of computer software; configuration of computer software;
DFNDR PSAFE TECHNOLOGY, INC. 45 Belden Place, Suite 300 San Francisco CA 94104 Security software, namely, anti-malware, anti-phishing, and anti-hacking software, security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices, software for managing security and privacy on social media, computer anti-virus software, software for improving device performance, software for managing device battery usage, software for managing privacy, and software for managing storage space, all for mobile phones, tablets, and personal computers;D F N D R;
DOORBELL SEASON AMAZON TECHNOLOGIES, INC. 410 Terry Ave. N. Seattle WA 98109 Security software, namely, downloadable software for monitoring security camera footage and home security systems; security software, namely, downloadable software to control building access and security systems; downloadable computer software and downloadable software applications for mobile phones, tablets, and desktop computers, namely, downloadable software for use in monitoring home security systems, for controlling home devices and systems, and for use in electronic storage of data; downloadable software and downloadable software applications permitting users to identify and communicate with persons at their door; electronic doorbells; electronic wireless LAN enabled doorbells; electronic doorbells with a camera allowing persons to identify who is at their door from remote locations; video cameras; digital cameras; motion sensors and monitoring equipment, namely, video monitors and video cameras for monitoring the interior and exterior of homes, retail stores, offices and other structures for security and surveillance; security lights for outdoor use; motion sensitive security lights;Online retail store services featuring a wide variety of consumer electronics, consumer goods, security and surveillance equipment, and audiovisual equipment; retail store services featuring a wide variety of consumer electronics, consumer goods, security and surveillance equipment, and audiovisual equipment; promoting consumer awareness on safety and crime prevention; promoting awareness of public safety and crime prevention and the benefits of using electronic security monitoring systems;Floodlights; spotlights; wall lights; light bulbs; LED light bulbs: lighting fixtures; lighting fixtures with motion detection; battery powered lighting fixtures; electric lighting fixtures, namely, power failure backup safety lighting; sconce lighting fixtures; lanterns for lighting; ceiling lights; LED lighting fixtures for indoor and outdoor lighting applications; lights for illuminating stairs, doors and other portions of buildings;DOORBELL;
ERELON Eredyne Corporation 262 West 38th Street--Suite 402 New York NY 10018 SECURITY SOFTWARE, NAMELY, SOFTWARE THAT AUTHENTICATES USERS, ENCRYPTS AND DECRYPTS COMMUNICATIONS TRANSMITTED BETWEEN USERS AND VERIFIES ITS INTEGRITY; COMMUNICATION SOFTWARE, NAMELY, SOFTWARE THAT ALLOWS MULTIPLE USERS USING NETWORKED SYSTEMS, SUCH AS THE INTERNET, INTRANET AND WIRELESS COMMUNICATIONS SYSTEMS TO E-MAIL, CHAT, ACCESS AND REMOTELY ACCESS, MANIPULATE AND SAVE THE SAME DATA AND APPLICATIONS; ORGANIZATION SOFTWARE, NAMELY, SOFTWARE FOR SCHEDULING, CONTACT MANAGEMENT, FILE SHARING, PROJECT COORDINATION, INTERNET SEARCHING AND INFORMATION RETRIEVAL;MAINTENANCE OF COMPUTER SYSTEMS UTILIZING SECURITY, COMMUNICATIONS AND ORGANIZATION SOFTWARE;MAINTENANCE, UPDATING, AND CUSTOMIZING FOR OTHERS IN THE AREA OF SECURITY, COMMUNICATIONS AND ORGANIZATION SOFTWARE; INSTALLATION OF COMPUTER SOFTWARE; TECHNICAL SUPPORT SERVICES, NAMELY, TROUBLESHOOTING OF COMPUTER HARDWARE AND SOFTWARE PROBLEMS VIA TELEPHONE, LIVE ON-LINE COMMUNICATION, E-MAIL AND IN PERSON;
FIELD EFFECT COVALENCE Field Effect Software Inc. 207-825 Exhibition Way Ottawa, Ontario K1S5J3 Canada Security software, namely, IT and IT system monitoring and protection, including for IT security threats;Providing temporary use of on-line non-downloadable security software in the nature of IT and IT system monitoring, analysis and protection, including for IT security threats; computer security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on endpoint systems; network security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on networks and network devices; internet security services, namely, monitoring and identifying anomalies, including security threats, in client cloud-based services infrastructure; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer hosting services, namely, providing hosted deployments of IT and IT system monitoring, analysis and protection capabilities and computer network security services, namely, monitoring on premise networks, endpoints, as well as cloud-based services and infrastructure;
FIELD EFFECT NOBLE Field Effect Software Inc. 207-825 Exhibition Way Ottawa, Ontario K1S5J3 Canada Security software, namely, software for provisioning, testing and measuring virtual and physical hardware and software systems;Providing temporary use of on-line non-downloadable security software in the nature of software for software testing, assurance and performance measurement; computer security services, namely, providing hosted capabilities, evaluation of end-user products and services for security considerations; automated security software and hardware testing; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security;
GLASSWALL FILETRUST Glasswall (IP) Limited 18A St James's Place London SW1A1NH United Kingdom Security software, namely, computer software for protection of computer systems against viruses; computer software for inspecting and filtering data, files and emails; computer software for blocking and control of computer malicious software and viruses; computer software for detecting malicious software in data, files and emails; computer software for removing malicious software from data, files and emails; computer software for sanitising data, files and emails; computer software for repairing data, files and emails from which malicious software has been removed; computer software for the transmission of data, files and emails; computer software to manage and monitor document libraries; downloadable computer software for inspecting, filtering, sanitising and rebuilding data, files and emails; software for ensuring the security of electronic mail; computer anti-virus software and computer anti-virus filtering software;Installation, maintenance and repair of computer hardware, computer networking hardware and computer hardware systems for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails; installation, maintenance and repair of computer hardware, computer networking hardware and computer hardware systems for blocking, filtering and control of computer malicious software and viruses; installation, maintenance and repair of computer hardware, computer networking hardware and computer hardware systems for managing and monitoring document libraries; consultation about the repair of computer hardware, computer networking hardware and computer hardware systems for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails; consultation about the repair of computer hardware, computer networking hardware and computer hardware systems for blocking, filtering and control of computer malicious software and viruses; technical support services, namely, technical advice relating to the repair of computer hardware, computer networking hardware, and computer hardware systems for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails; technical support services, namely, technical advice relating to the repair of computer hardware, computer networking hardware, and computer hardware systems for blocking, filtering and control of computer malicious software and viruses; technical support services, namely, technical advice relating to the repair of computer hardware, computer networking hardware, and computer systems for managing and monitoring document libraries; information and advisory services relating to the aforementioned services;GLASS WALL FILE TRUST;Computer diagnostic services; updating, and design of computer software and computer programs; computer programming services; rental of computer software; customised design and creation of computer software and computer programs; all of the above services connected to the provision of systems for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails, blocking, filtering and control of computer malicious software and viruses and managing and monitoring document libraries; development of computer software relating to computer security and prevention of computer risks; computer security consultancy; computer virus protection services; computer services, namely, on-line scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, and unauthorized data and programs on computers and electronic devices; information and technical advisory services relating to all the aforementioned services; installation, maintenance and repair of security software for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails; installation, maintenance and repair of security software for blocking, filtering and control of computer malicious software and viruses; installation, maintenance and repair of security software for managing and monitoring document libraries; consultation about the repair of security software for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails; consultation about the repair of security software for blocking, filtering and control of computer malicious software and viruses; technical support services, namely, technical advice relating to the repair of security software for inspecting, filtering, sanitising, repairing and rebuilding data, files and emails; technical support services, namely, technical advice relating to the repair of security software for blocking, filtering and control of computer malicious software and viruses; technical support services, namely, technical advice relating to the repair of security software for managing and monitoring document libraries;
HDSM MOTOROLA SOLUTIONS, INC. 500 West Monroe Street, 43rd Floor Chicago IL 60661 security software, namely, user and/or operator software for control and monitoring of live images from security surveillance cameras both on a local area network and remotely from the Internet and software for automated recording, storage, retrieval and enhancement of images from security surveillance cameras;
HIGH DEFINITION STREAM MANAGEMENT (HDSM) Avigilon Corporation Box 378 #101-1001 West Broadway Vancouver BC V6H4E4 Canada security software, namely, user and/or operator software for control and monitoring of live images from security surveillance cameras both on a local area network and remotely from the Internet and software for automated recording, storage, retrieval and enhancement of images from security surveillance cameras;
INFINISECURE INFINICON SYSTEMS, INC. 700 American Avenue Suite 101 King of Prussia PA 19406 Security software;INFINITY SECURE;
ITSP, INNOVATIVE TOOLS FOR SECURITY PROFESSIONALS Innovative Tools for Security Professionals 1742 Manning Street Jacksonville FL 32207 Security Software;
LOCKPRO PSafe Tecnologia S.A. Rua Siqueira Campos, 43 Cobertura 02 Copacabana Rio de Janeiro 22031-072 Brazil security software, software for improving device performance, and software for managing privacy, all for mobile phones, tablets, and personal computers; software for securing access, hiding access, or preventing unauthorized access to apps, photos, video, messages, and other data contained on mobile phones, tablets, and personal computers;LOCK PRO;
PERSISTENCE Absolute Software Corporation Suite 1400, 1055 Dunsmuir Street Vancouver, B.C. V7X1K8 Canada Security software, computer disks and erasable programmable read only memories (EPROMS) for security systems for computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices, and manuals sold as a unit therewith;Monitoring and tracking services for locating lost or stolen computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices programmed with software designed to contact the monitoring service center on a regular basis or in the event of theft or loss of the computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices;
PHISH-O-METER Revbits Suite 1R 2 Twelvepence Court, Melville NY 11747 security software, namely, anti-malware, anti-phishing, and anti-hacking software, security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; software for blocking detected phishing sites in email links and web browsing;
PREMONITION Field Effect Software Inc. 207-825 Exhibition Way Ottawa, Ontario K1S5J3 Canada security software;providing on-line non-downloadable security software; providing on-line non-downloadable security software featuring analytic optimization and operational scaling for use in identification, assessment and response to security risks and threats; computer, network and internet security services; automated security software and hardware testing; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; computer host and network security services; automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security; automated security software and hardware testing;
PSAFE DFNDR PSAFE TECHNOLOGY, INC. 45 Belden Place, Suite 300 San Francisco CA 94104 Security software, namely, anti-malware, anti-phishing, and anti-hacking software, security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices, software for managing security and privacy on social media, computer anti-virus software, software for improving device performance, software for managing device battery usage, software for managing privacy, and software for managing storage space, all for mobile phones, tablets, and personal computers;
QOHASH RECON Qohash Inc. 394 rue de Sainte-Hélène Québec, QC G1K3L7 Canada Security software; software for maintaining data security; software for conducting tamper-proof digital logs, digital audit trails and forensic analysis of data; software for detecting unauthorized access and data breach; software to store, retrieve and detect data from computers and computer hardware; software for management, protection and monitoring of personal, health, corporate and financial data; software for eliminating duplicated personal, health, corporate and financial data;Software as a service (SaaS) featuring security software; Software as a service (SaaS) featuring software for maintaining data security; Software as a service (SaaS) featuring software for conducting tamper-proof digital logs, digital audit trails and forensic analysis of data; Software as a service (SaaS) featuring software for detecting unauthorized access and data breach; Software as a service (SaaS) featuring software to store, retrieve and detect data from computers and computer hardware; Software as a service (SaaS) featuring software for management, protection and monitoring of personal, health, corporate and financial data; Software as a service (SaaS) featuring software for eliminating duplicated personal, health, corporate and financial data;
QOSTODIAN Qohash Inc. 394 rue de Sainte-Hélène Québec, QC G1K3L7 Canada Security software, namely, software for maintaining data security, software for conducting tamper-proof digital logs, digital audit trails and forensic analysis of data, and software for detecting unauthorized access and data breach;Software as a service (SAAS) provider in the field of security software; Software as a service (SAAS) provider in the field of maintaining data security; Software as a service (SAAS) provider in the field of conducting tamper-proof digital logs, digital audit trails and forensic analysis of data; Software as a service (SAAS) provider in the field of software for detecting unauthorized access and data breach; Maintenance, development and updating of aforementioned software;
SMART PATH Ava Security Limited Upper Ground Floor, The Charter Building Charter Place, Uxbridge Middlesex UB81JG United Kingdom Security software; security software with artificial intelligence; security software with machine learning; downloadable computer security software; artificial intelligence apparatus; cloud computing software; downloadable cloud computing software;Security services; health and safety risk management; surveillance services;Software as a service; software as a service featuring software for machine learning; computer network services; cloud computing service for video surveillance; computer network design for others; configuration of computer networks using software; providing artificial intelligence computer programs on data networks; provision of security services for computer networks; cloud computing services; cloud hosting provider services;
SMART-AV Cyber Defence QCD Corporation #308 - 1505 Laperriere Avenue Ottawa, Ontario K1Z7T1 Canada security software;computer security services;
SPACEEGG ROBERT BOSCH GMBH Robert-Bosch-Platz 1 Gerlingen 70839 Germany Security software, namely, downloadable software for controlling and monitoring portable wireless security alarms for indoor and outdoor use and for vehicles and motor vehicles, and for sending notifications to smartphones or mobile computer devices; downloadable security software for controlling and monitoring a portable wireless fire alarm or gas alarm and for sending notifications to smartphones or mobile computer devices; security, safety, protection and signaling apparatus and equipment, namely, portable security alarm for indoor and outdoor use and for vehicles and motor vehicles that connects to a wireless network, portable fire or gas alarm that connects to a wireless network; security alarms; personal security alarms; security alarm installations; measuring, detecting and monitoring instruments, namely, fire detectors, carbon monoxide detectors, and gas detectors; monitoring devices, namely, air quality meters for monitoring indoor and outdoor air quality and monitoring controllers, namely, wireless controllers to monitor and control the functioning of other electronic devices;SPACE EGG;Security alarms and alarm installations for vehicles and motor vehicles; anti-theft, safety and security apparatus and installations for vehicles and motor vehicles, namely, anti-theft automotive alarms and motor vehicle alarm systems;Security services for the protection of property, namely, monitoring of alarms and home security systems for protecting personal property; physical security consultancy;Development of security software;
SYCURIO Sycurio Limited Pannell House, Park Street Guildford, Surrey GU1 4HN United Kingdom Security software; computer software relating to security, namely, cyber security and e-commerce security; computer software relating to payment processing; computer software, firmware and hardware; communication software, communications software; telephone software, telephony software; telephone and/or telephony apparatus, appliances, devices, equipment, instruments, installations, modems, receivers, recorders, sets, switchboards, switching systems, systems and transmitters; telephone cables, keyboards, wires; electronic financial transaction apparatus, instruments and equipment; communication apparatus, devices, installations, instruments, modems, networks, processors, programs, systems; data security apparatus, appliances, devices, equipment, instruments, installations, systems; telephone security apparatus, appliances, devices, equipment, instruments, installations, systems; telecommunications security apparatus, appliances, devices, equipment, instruments, installations, systems; data transmission networks; computer interfaces; computer interface cards, devices, instruments, units; electrical interfaces, electrical interface apparatus; electronic interfaces, electronic interface apparatus; publications in electronic format; downloadable publications; parts and fittings for all the aforesaid;Communication services; telecommunication services; rental, hire and/or leasing of communications and/or telecommunication apparatus, appliances, devices, equipment, installations, instruments and systems; data transmission services; data bank interconnection services; computer data transmission services; data streaming services; services for the electronic transmission of data; providing access to computer databases; provision of communication facilities for the interchange of data by electronic means; provision of communication facilities for the interchange of digital data; provision of electronic data links; remote transmission of data by means of telecommunications; advisory, information and consultancy services relating to all the foregoing;Installation, maintenance, repair and servicing of hardware, telephone and/or telephony apparatus, appliances, devices, equipment, instruments, installations, modems, receivers, recorders, sets, switchboards, switching systems, systems and transmitters, telephone cables, keyboards, wires; installation, maintenance, repair and servicing of communication apparatus, devices, installations, instruments, modems, networks, processors, programs, systems; installation, maintenance, repair and servicing of data security apparatus, appliances, devices, equipment, instruments, installations, systems; installation, maintenance, repair and servicing of telephone security apparatus, appliances, devices, equipment, instruments, installations, systems; installation, maintenance, repair and servicing of telecommunications security apparatus, appliances, devices, equipment, instruments, installations, systems; installation, maintenance, repair and servicing of data transmission networks, computer interface cards, devices, instruments, units; installation, maintenance, repair, development, updating and servicing of computer hardware, data communications hardware, communications network and/or data network apparatus and instruments; installation, maintenance, repair and servicing of phoneware, computer interfaces, electrical interfaces, electrical interface apparatus, electronic interfaces and electronic interface apparatus; advisory, information and consultancy services relating to all the foregoing;Advisory services relating to payment processing;Business assistance; business administration; business data analysis; advisory services relating to electronic data processing; data processing; collection of data; analysis, updating, management, collection and/or verification of business data; database management services; commercial information services provided by access to a computer database; operation and management of telephone call centres; call center services being the provision of business information; advisory, information and consultancy services relating to all the foregoing;Computer programming; creation, writing, installation, maintenance, rental, configuration, development and updating of computer software and/or firmware; design of computer software, hardware and/or firmware relating to security, cyber security, payment processing and e-commerce security; design of telephone and/or telephony apparatus, appliances, devices, equipment, instruments, installations, modems, receivers, recorders, sets, switchboards, switching systems, systems and transmitters; data encryption services; data security services; installation, maintenance, repair and servicing of computer software, communication software, communications software, telephone software, telephony software; professional consultancy relating to computer security; software as a service for monitoring on-line financial transactions; advisory, information and consultancy services relating to all the foregoing;
THREATCAST GuardSquare NV Tervuursevest 362/1 Leuven 3000 Belgium Security software; software reliability software; threat data detection software; threat data analysis software; threat monitoring software; cloud network monitoring software; real-time threat monitoring software with intuitive dashboards and customs alert; software for scanning, detecting, removing viruses, worms, trojan horses, adware, spyware and malware; software to protect software applications against suspicious activity and malicious users; software for providing mobile phone security; software for providing intrusion detection and prevention; software for data communications applications, and for the encryption and authentication of electronic information; fraud protection software; encryption software to enable secure transmission of digital information; software in the field of data security functions; application software; application software for mobile phones; computer software for controlling and managing access server applications; data processing software; software for secure storage; software for checking the security of the device and the application environment; software for optimizing applications; software for risk estimation;THREAT CAST;Software as a service; software development, programming and implementation; computer programming; database design; design services relating to computer software; design services for data processing systems; design of software packages; development, design, implementation, testing, analysis and consulting services in the field of security, access, authorization, authentication, encryption and identification software systems for computers, networks, mobile phones and other electronic devices; development of technologies for the protection of software applications; computer systems integration services; development of operating system software and administration of user rights in computer networks; computer support services, namely, computer software technical support services and software updating services; maintenance of software; technological services related to network, internet, computer, mobile phone security testing; surveying, technological research and studies; arranging and conducting technical surveys; surveying and providing scientific expertise; computer security threat analysis for protecting data;
UNISSEY UNISSEY 2 bis rue Alfred Nobel F-77420 CHAMPS SUR MARNE France Security software; software for managing the flow of persons; biometric scanners; biometric software; biometric passports; biometric identification apparatus; biometric identification systems; biometric identity cards; biometric hand readers; biometric voice recognition systems; biometric fingerprint readers; biometric retinal scanners; biometric iris scanners; biometric iris scanners; biometric access control systems; software for biometric systems for the identification and authentication of people; access control apparatus; apparatus and instruments for storing data; biometric, video surveillance apparatus, systems, equipment and software; Apparatus, instruments and software for the automatic identification or recognition of persons, finger or palm prints, features of the iris, veins, voice, facial features or other biometric features; systems (apparatus, software) biometric identification and control; computer software for checking and identifying secure digital data; computers and computer software for biometric apparatus for the identification and authentication of persons; software for biometric systems for the identification and authentication of persons; software for detecting persons; software for interpreting finger or palm prints, features of the iris, veins, voice, facial features or other biometric features; software for processing the signal used for detecting and identifying persons or the biometric characteristics of persons in the field of security and access control; databases; terminals for controlling access by prints in particular fingerprints; biometric terminals; devices for controlling access to buildings, equipment or networks by means of verifying finger or palm prints, features of the iris, veins, voice, facial features or other biometric features; optical, optoelectronic or electroacoustic sensors for capturing fingerprints, palm prints, features of the iris, veins, voice, face or facial features or other biometric features; short, medium and long-distance proximity (computer) readers; systems (apparatus, software, applications) for protecting information or communications by checking fingerprints, palm prints, features of the iris, veins, voice, face or facial features or other biometric features;Security services; Consulting services relating to security; information services relating to security; security services for protection of property and individuals; security consultancy; advice for others in the field of security for the protection of sensitive sites, businesses, property and individuals; Security services for the protection of property and individuals (excluding the transport thereof); identity checking services, notably offering authentication of intelligence on personal identification; identity checking services, notably providing authentication of intelligence on personal identification; identity checking services, notably authenticating identity cards, driving licenses, passports and other identity documents; identity checking services, namely, the registration, checking, issuing, authentication and management of personal and digital identities using one or more identity features, including biometrics, document authentication and data checking; computer software licensing (legal services);Technical research relating to automatic identification systems; engineering services; data security engineering; expert appraisals (engineering) and advice (engineering) in the field of biometric data; computer programming services for data processing; design, development, installation, maintenance, updating and servicing of software; consultancy in the field of computers and software; technical support services with respect to software; encryption of data; services relating to data encryption and decryption; computer data recovery; monitoring of computer systems for the purpose of surveillance and security of property and individuals; software as a service (SaaS) services; software as a service featuring software for identity checking using biometric and biographical identifiers; software as a service featuring software for the authentication of documents and identification information; software as a service featuring software for interpreting fingerprints, palm prints, features of the iris, veins, voice, face or facial features or other biometric features in the field of access control or authentication of persons; offering personal identification and checking services using biometric hardware and software for e-commerce transactions; platform as a service featuring software platforms for identity checking using biometric and biographical identifiers; platform as a service featuring software platforms for the authentication of documents and identification information; platform as a service featuring computer software platforms for securing the checking, management and authentication of digital identity; technical assistance, technical advice for the implementation of systems of identification and the authentication of people; platform as a service (PAAS) featuring computer software platforms for use by others to register, check, issue, authenticate and manage personal and digital identities safely;
UNIVERSAL ISSUER Danube Tech GmbH Wattgasse 48 A-1170 Wien Austria Security software; utility, security, and cryptographic software; computer programs for enabling access or entrance control; computer software in the field of cryptographic network security and data security functions; computer software for automating a process for authentication of identity in connection with the issuance, management, and verification of digital credentials; computer software for providing secure remote access to computer and communication networks; downloadable software for authentication, verification of identity, security, privacy, and login; downloadable software for cryptographic key generation and management; downloadable software for cryptographic signature creation and verification; downloadable software to issue, verify, transmit, send, receive, share, store, manage, control, encrypt, and decrypt digital credentials, digital identity data, digital documents, digital files, and digital representations of qualifications, certifications, entitlements, and memberships; downloadable blockchain and distributed ledger technology (DLT) software;Authentication services for computer security; authentication, issuance and validation of digital certificates; certification services of data transmitted via telecommunications; certification services of messages transmitted via telecommunications; computer security services for managing digital certificates; computer security services in the nature of administering digital certificates; computer security services in the nature of managing digital certificates; computer security services in the nature of providing digital certificates; computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; electronic cryptology services in the nature of digital certificate and digital signature verification services; encryption, decryption and authentication of information, messages and data; digital signature verification services [electronic cryptology services]; software as a service (SaaS) for authentication, verification of identity, security, privacy, and login; software as a service (SaaS) for cryptographic key generation and management; software as a service (SaaS) for cryptographic signature creation and verification; software as a service (SaaS) to issue, verify, transmit, send, receive, share, store, manage, control, encrypt, and decrypt digital credentials, digital identity data, digital documents, digital files, and digital representations of qualifications, certifications, entitlements, and memberships; software as a service (SaaS), namely, blockchain and distributed ledger technology (DLT) software; hosting, rental, and leasing of software for authentication, verification of identity, security, privacy, and login; hosting, rental, and leasing of software for cryptographic key generation and management; hosting, rental, and leasing of software for cryptographic signature creation and verification; hosting, rental, and leasing of software to issue, verify, transmit, send, receive, share, store, manage, control, encrypt, and decrypt digital credentials, digital identity data, digital documents, digital files, and digital representations of qualifications, certifications, entitlements, and memberships; hosting, rental, and leasing of blockchain and distributed ledger technology (DLT) software; development, installation, integration, maintenance, and support services of software for authentication, verification of identity, security, privacy, and login; development, installation, integration, maintenance, and support services of software for cryptographic key generation and management; development, installation, integration, maintenance, and support services of software for cryptographic signature creation and verification; development, installation, integration, maintenance, and support services of software to issue, verify, transmit, send, receive, share, store, manage, control, encrypt, and decrypt digital credentials, digital identity data, digital documents, digital files, and digital representations of qualifications, certifications, entitlements, and memberships; development, installation, integration, maintenance, and support services of blockchain and distributed ledger technology (DLT) software;
UNIVERSAL VERIFIER Danube Tech GmbH Wattgasse 48 A-1170 Wien Austria Security software; utility, security, and cryptographic software; computer programs for enabling access or entrance control; computer software in the field of cryptographic network security and data security functions; computer software for automating a process for authentication of identity in connection with the issuance, management, and verification of digital credentials; computer software for providing secure remote access to computer and communication networks; downloadable software for authentication, verification of identity, security, privacy, and login; downloadable software for cryptographic key generation and management; downloadable software for cryptographic signature creation and verification; downloadable software to issue, verify, transmit, send, receive, share, store, manage, control, encrypt, and decrypt digital credentials, digital identity data, digital documents, digital files, and digital representations of qualifications, certifications, entitlements, and memberships; downloadable blockchain and distributed ledger technology (DLT) software;Authentication services for computer security; authentication, issuance and validation of digital certificates; certification services of data transmitted via telecommunications; certification services of messages transmitted via telecommunications; computer security services for managing digital certificates; computer security services in the nature of administering digital certificates; computer security services in the nature of managing digital certificates; computer security services in the nature of providing digital certificates; computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; electronic cryptology services in the nature of digital certificate and digital signature verification services; encryption, decryption and authentication of information, messages and data; digital signature verification services [electronic cryptology services]; software as a service (SaaS) for authentication, verification of identity, security, privacy, and login; software as a service (SaaS) for cryptographic key generation and management; software as a service (SaaS) for cryptographic signature creation and verification; software as a service (SaaS) to issue, verify, transmit, send, receive, share, store, manage, control, encrypt, and decrypt digital credentials, digital identity data, digital documents, digital files, and digital representations of qualifications, certifications, entitlements, and memberships; software as a service (SaaS), namely, blockchain and distributed ledger technology (DLT) software; hosting, rental, and leasing of software for authentication, verification of identity, security, privacy, and login; hosting, rental, and leasing of software for cryptographic key generation and management; hosting, rental, and leasing of software for cryptographic signature creation and verification; hosting, rental, and leasing of software to issue, verify, transmit, send, receive, share, store, manage, control, encrypt, and decrypt digital credentials, digital identity data, digital documents, digital files, and digital representations of qualifications, certifications, entitlements, and memberships; hosting, rental, and leasing of blockchain and distributed ledger technology (DLT) software; development, installation, integration, maintenance, and support services of software for authentication, verification of identity, security, privacy, and login; development, installation, integration, maintenance, and support services of software for cryptographic key generation and management; development, installation, integration, maintenance, and support services of software for cryptographic signature creation and verification; development, installation, integration, maintenance, and support services of software to issue, verify, transmit, send, receive, share, store, manage, control, encrypt, and decrypt digital credentials, digital identity data, digital documents, digital files, and digital representations of qualifications, certifications, entitlements, and memberships; development, installation, integration, maintenance, and support services of blockchain and distributed ledger technology (DLT) software;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. In one embodiment, the present invention provides for receiving security events from a network device by a distributed software agent of a network security system, determining a priority of each received security event, and storing the security events in a plurality of prioritized event buffers based on the determined priorities for a period of time determined by a timer. Upon expiration of the timer, a batch of security events for transport to a security event manager of the network security system can be created by including security events in the batch in order of priority until the batch is full.