SOFTWARE APPLIED

Brand Owner (click to sort) Address Description
HYBRIDSHIELD SecurityDAM Ltd. 24 Raoul Wallenberg Tel-Aviv 69719 Israel Software applied to (a) a customer-premise equipment that monitors network traffic, detects and cleans anomalies and distributed denial of service attacks and other security risks and alerts management equipment; (b) a cloud based server to redirect network traffic, when a customer-premise equipment is under a distributed denial of service attacks and other security risks, to a scrubbing center to mitigate the attack and transmit clean traffic to its original destination; and (c) the management equipment that enables provisioning, real-time monitoring, reporting and analysis of traffic during attacks;HYBRID SHIELD;A network traffic monitoring service that monitors and cleans network traffic from distributed denial of service attacks and other security risks at (a) a customer-premise equipment; (b) a cloud based server to redirect network traffic, when a customer-premise equipment is under a denial of service attack and other security risks, to a scrubbing center to mitigate the attack and transmit clean traffic to its original destination; and (c) a management equipment that enables provisioning, real-time monitoring, reporting and analysis of traffic during attacks;
SECURITYDAM SecurityDAM Ltd. 24 Raoul Wallenberg Tel-Aviv 69719 Israel Software applied to (a) a customer-premise equipment that monitors network traffic, detects and cleans anomalies and distributed denial of service attacks and other security risks and alerts management equipment; (b) a cloud based server to redirect network traffic, when a customer-premise equipment is under a distributed denial of service attacks and other security risks, to a scrubbing center to mitigate the attack and transmit clean traffic to its original destination; and (c) the management equipment that enables provisioning, real-time monitoring, reporting and analysis of traffic during attacks;SECURITY DAM;A network traffic monitoring service that monitors and cleans network traffic from distributed denial of service attacks and other security risks at (a) a customer-premise equipment; (b) a cloud based server to redirect network traffic, when a customer-premise equipment is under a denial of service attack and other security risks, to a scrubbing center to mitigate the attack and transmit clean traffic to its original destination; and (c) a management equipment that enables provisioning, real-time monitoring, reporting and analysis of traffic during attacks;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. To perform conformance checking of a software implementation with a (possibly non-deterministic) specification, a software implementation and a software specification are applied to produce a CT enabled implementation. Nondeterministic choices of the software specification result in assigning a corresponding choice of the CT enabled implementation to a variable. The CT enabled implementation includes a test that the variable then comprises one of the nondeterministic choices of the software specification. To perform conformance testing where the software specification includes ordered steps, and calls to methods of other classes (mandatory calls), a software object is produced and organized such that each step of the software specification has a corresponding code section in the software object. The software object includes instructions to generate an identification of a mandatory call comprised by the software specification, and instructions to test that the state of the implementation conforms to the software specification during the mandatory call.