ANTI INTRUSION

Brand Owner (click to sort) Address Description
BAG BUDDY Mills, James E. 1223 William Ln Florence SC 29501 anti-intrusion, anti-theft alarms for sport and athletic bags, including golf bags, bowling bags, boxing bags, lacrosse bags, ski boot bags, sportsman bags, fishing bags, hunter bags, gym bags; luggage and travel bags, including carry-on bags, duffel bags, overnight bags, suitcases; handbags, including purses, clutch bags, shoulder bags, evening bags, tote bags; book bags; ammunition bags; shopping bags; briefcases; attaches; tool boxes;BAG;
COMPUTECT HOLMES PROTECTION GROUP, INC. 130 EAST 59TH STREET NEW YORK NY 10001 anti-intrusion, fire and security alarm equipment, namely electronic controllers and sensors for detecting security breaches;COMPUTER TECHNICAL;
JET JET CO. 1303 North 13th Street Humboldt IA 50548 anti-intrusion, burglar, fire and personal alarms;canvas tarpaulins;
LIGHTSPEED Visol, Inc. 15652 Indian Queen Drive Odessa FL 33556 anti-intrusion, fire, and burglar alarms;LIGHT SPEED;
LIGHTSPEED SECURITY SYSTEMS AND SENSORS Dijkstra, Johannes c/o Beth Weiss 34 Pearsall Ave., App. 3 B Glenn Cove NY 11542 anti-intrusion, fire and burglar alarms;SECURITY SYSTEMS AND SENSORS;
X-28 Kompusur S.A. Rivadavia 10009 (1408) Capital Federal Argentina anti-intrusion, anti-theft and fire alarms for houses, manufacturing plants and commercial establishments;anti-intrusion and anti-theft alarms for vehicles;
X-28 Kompusur S.A. Rivadavia 10009 (1408) Capital Federal Argentina anti-intrusion, anti-theft, and fire alarms for houses, manufacturing plants, and commercial establishments;X TWENTY EIGHT;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Disclosed is a method for configuring an intrusion detection system in a network which comprises determining a location in the network for a deployed intrusion detection sensor of the intrusion detection system, deploying the intrusion detection sensor in the determined location, enabling the intrusion detection sensor to monitor communication in a portion of the network, tuning the intrusion detection sensor to an appropriate level of awareness of the content in the communication in the network, prioritizing responses generated by the intrusion detection sensor to achieve an appropriate response to a detected intrusion in the network, configuring intrusion response mechanisms in the network to achieve an appropriate response by the mechanisms; and re-tuning the intrusion detection sensor in response to a prior intrusion detection.