COMPUTER SOFTWARE ASSESSING RISKS

Brand Owner (click to sort) Address Description
ESO eSecurityOnline Kansas City MO 64105 computer software for assessing risks of security breaches in electronic commerce applications, and to maintain controls for electronic commerce transactions to prevent security breaches or viruses;providing an online database containing research on electronic commerce security, computer hacking vulnerability, computer viruses, and computer system configurations; customization for others of computer software for electronic commerce security; technical support services, namely, assessment of computer hardware and software vulnerabilities in electronic commerce security and computer viruses via the internet and e-mail; computer consulting, namely, benchmarking services in the field of electronic commerce security, and providing reports in connection therewith; language translation;
PFMIPRO Jewish Family & Children's Service of Pittsburgh 5743 Bartlett Street Pittsburgh PA 15217 Computer software for assessing risks associated with nursing home admissions;Platform as a service (PAAS) featuring computer software platforms for allowing users to perform health assessments, namely, for assessing risks associated with nursing home admissions;
VISIBLE SECURITY SecurityWorks, Inc. 4144 N. Central Expressway, Suite 600 Dallas TX 75204 Computer software for assessing risks to the confidentiality, integrity, and availability of information and information systems in the field of information security and risk management;Information security consulting services as it relates to the confidentiality, integrity, availability, and regulatory compliance of information systems such as computers, computer networks, computer applications, computer operating systems, computer storage devices, as well as the processes and procedures used to support them;SECURITY;Application service provider (ASP) featuring software for assessing risks to the confidentiality, integrity, and availability of information and information systems in the field of information security and risk management; and consulting services in the field of design, implementation, and use of computer hardware and software systems for others; computer consultation in the field of computer networks, applications and security, namely, computer application security assessments;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.