Brands and Their Owners
FORTRA, LLC contact information is shown below | |
Owner: | FORTRA, LLC |
---|---|
Owner Address: | Suite 100 11095 Viking Drive Eden Prairie MN 55344 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
A |
---|---|
Description: | In the Statement, Column 2, lines 3-5, are deleted, and, The mark consists of the capital letter A having the color white, contained within a blue circle representing a sphere, having a white circle around the inside edge of the sphere and a blue circle around the outside edge of the sphere. is inserted, and, the drawing is amended to appear as follows: PUBLISH NEW CUT;The mark consists of the capital letter A having the color white, contained within a blue circle representing a sphere, having a white circle around the inside edge of the sphere and a blue circle around the outside edge of the sphere.;Automation computer software for streamlining business processes, workflows, IT, data flows, and operations across data networks;AUTOMATON;The color(s) blue and white is/are claimed as a feature of the mark.; |
Category: | STATEMENT |
Brand: |
AUTOMATE |
---|---|
Description: | Automation computer software for streamlining business processes, workflows, IT, data flows, and operations across data networks;AUTO MATE; |
Category: | AUTOMATION COMPUTER SOFTWARE STREAMLINING |
Brand: |
AUTOMATE INTELLIGENT CAPTURE |
---|---|
Description: | Downloadable computer software, namely, downloadable software for managing, monitoring and organizing data, document management, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, streamlining business processes and operations;INTELLIGENT CAPTURE; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE |
Brand: |
BOKS |
---|---|
Description: | Downloadable computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development, account management, compliance facilitation; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE |
Brand: |
BOLDON JAMES |
---|---|
Description: | Downloadable computer software for managing, monitoring and organizing information technology infrastructure, systems management, performance management, security management, data access, batch management, job scheduling and cross platform automation;Providing temporary use of online non-downloadable software for managing, monitoring and organizing information technology infrastructure, systems management, performance management, security management, data access, batch management, job scheduling and cross platform automation; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE MANAGING |
Brand: |
BUILD A BETTER IT |
---|---|
Description: | Downloadable computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development;Providing online non-downloadable computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing online, non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE |
Brand: |
COBALT STRIKE |
---|---|
Description: | Computer software for penetration testing, namely, for evaluating the security of a computer or network; |
Category: | COMPUTER SOFTWARE PENETRATION TESTING |
Brand: |
CORE ACCESS |
---|---|
Description: | Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;ACCESS;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network; |
Category: | COMPUTER SECURITY SOFTWARE |
Brand: |
CORE ACCESS INSIGHT |
---|---|
Description: | Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;ACCESS;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network; |
Category: | COMPUTER SECURITY SOFTWARE |
Brand: |
CORE COMPLIANCE |
---|---|
Description: | Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;COMPLIANCE;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network; |
Category: | COMPUTER SECURITY SOFTWARE |
Brand: |
CORE IMPACT |
---|---|
Description: | Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network; |
Category: | COMPUTER SECURITY SOFTWARE |
Brand: |
CORE IMPACT |
---|---|
Description: | Software for providing network security and penetration testing services; computer software for exploiting and conducting post-exploitation efforts of vulnerabilities discovered in a target computer network; computer software for the automation of repeatable penetration test exploit techniques; computer software for conducting penetration tests for computer terminals, services, networks and end points for determining and identifying information security exploits; software for identifying vulnerability trends and tracking vulnerabilities identified by manual testing and other assurance activities, namely, penetration tests, code reviews, and threat modeling;Providing network security and penetration testing services; update, installation and maintenance of computer security software; providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computer and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, computer incident response, network incident response, and forensics and penetration testing; |
Category: | SOFTWARE PROVIDING NETWORK SECURITY |
Brand: |
CORE NETWORK INSIGHT |
---|---|
Description: | Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; computer software for use to compile, manage, encrypt and store personal information; computer software for use to access, collect and modify network user identification; computer software for workflow, helpdesk and network security management; computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; computer software for registering and authenticating digital certificates; computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;NETWORK;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network; |
Category: | COMPUTER SECURITY SOFTWARE |
Brand: |
CORE PASSWORD |
---|---|
Description: | Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;PASSWORD;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network; |
Category: | COMPUTER SECURITY SOFTWARE |
Brand: |
CORE PROVISIONING |
---|---|
Description: | Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;PROVISIONING;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network; |
Category: | COMPUTER SECURITY SOFTWARE |
Brand: |
CORE SECURITY |
---|---|
Description: | The mark consists of the word CORE on top, in which the O is a stylized orb with two orthogonal rings lying at right angles, and the word SECURITY beneath, the orb in the color purple and the wording elements in the color dark purple.;Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions;The color(s) purple and dark purple is/are claimed as a feature of the mark.;SECURITY;Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network; |
Category: |