COMPUTER SOFTWARE COLLECTING NETWORK

Brand Owner (click to sort) Address Description
ATTRIBUTION INTELLIGENCE Voreas Laboratories, Inc. c/o Troutman Pepper Hamilton Sanders LLP 600 Peachtree St. NE, Ste. 3000 Atlanta GA 30308 Computer software for collecting network and security data for the purpose of detecting, verifying, tracking, managing, preventing, and responding to security breach incidents;Information technology security services in the nature of identifying malicious cyber operators and providing visibility into malicious cyber operator actions for the purpose of detecting, verifying, tracking, managing, preventing, and responding to security breach incidents;
CYBER ATTRIBUTION INTELLIGENCE Voreas Laboratories, Inc. c/o Troutman Pepper Hamilton Sanders LLP 600 Peachtree St. NE, Ste. 3000 Atlanta GA 30308 Computer software for collecting network and security data for the purpose of detecting, verifying, tracking, managing, preventing, and responding to security breach incidents;Information technology security services in the nature of identifying malicious cyber operators and providing visibility into malicious cyber operator actions for the purpose of detecting, verifying, tracking, managing, preventing, and responding to security breach incidents;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A virtual private network service provider, wherein virtual private network ("VPN") software for setting up a virtual private network connection is delivered from a server computer to one or more client computers over a computer network, such as the Internet. Once the VPN software is delivered to the client computers, it can be executed so that data communications are made as virtual private network communications under control of the VPN software. Because the VPN software is stored and maintained on a server computer, and preferably delivered to the various client computers on an as-needed basis, the distribution, integrity and updating of the VPN software is improved because the "master" version of the VPN software can be controlled and revised by merely accessing the server computer system, rather than by attempting to control and revise numerous copies of the VPN software resident on various, scattered client computers.