COMPUTER SOFTWARE CYBERSECURITY

Brand Owner (click to sort) Address Description
ALIENAPPS AlienVault, Inc. 1875 S. Grant Street, Suite 200 San Mateo CA 94402 computer software for cybersecurity, data analytics, computer security information and event management (SIEM); computer software for monitoring, gathering, analyzing and presenting information from computer network and security devices for computer and network vulnerability management and security compliance and for real-time analysis and monitoring of security alerts;ALIEN APPS;
ALIENAPPS AlienVault, Inc. 1875 S. Grant Street, Suite 200 San Mateo CA 94402 computer software for cybersecurity, data analytics, computer security information and event management (SIEM); computer software for monitoring, gathering, analyzing and presenting information from computer network and security devices for computer and network vulnerability management and security compliance and for real-time analysis and monitoring of security alerts;ALIEN APPS;
DRAGONFLY MACHINE LEARNING ENGINE LIVEACTION, INC. 960 San Antonio Road, Suite 200 Palo Alto CA 94303 Computer software for cybersecurity, detecting and mitigating network attacks using artificial intelligence, machine learning and/or deep learning; computer software for continuous monitoring, identifying, verifying, analyzing, comparing, classifying, sorting and scoring of collected or acquired data from network traffic, network communication, network flow data, and network intercommunication using artificial intelligence, machine learning and/or deep learning; computer software for training artificial intelligence, machine learning and/or deep learning systems; all of the above run on a broad range of hardware and in physical, virtual container and/or cloud environments;MACHINE LEARNING ENGINE;
HAVENTEC Haventec Pty Ltd Level 27, 1 Market Street Sydney NSW 2000 Australia Computer software for cybersecurity, namely, identity security, access management, e-commerce security, and network security; encoded computer programs for cybersecurity, namely, identity security, access management, e-commerce security, and network security;Hosting of software as a service for use by others for cybersecurity, namely, identity security, access management, e-commerce security, and network security; online provision of non-downloadable web-based software for cybersecurity, namely, identity security, access management, e-commerce security, and network security; software as a service featuring software for cybersecurity, namely, identity security, access management, e-commerce security, and network security;
HUNTIR Alphasec Labs 215 Woodberry Rd. NE Leesburg VA 20176 Computer software for cybersecurity;HUNT IR;
NURD Mavecap Limited Partnership 1255 Broad Street Clifton NJ 07013 computer software for cybersecurity;Research and development of computer software; Research, development, design and upgrading of computer software;
THREATEYE LIVEACTION, INC. 960 San Antonio Road, Suite 200 Palo Alto CA 94303 Computer software for cybersecurity, detecting and mitigating network attacks using artificial intelligence, machine learning and/or deep learning; computer software for continuous monitoring, identifying, verifying, analyzing, comparing, classifying, sorting and scoring of collected or acquired data from network traffic, network communication, network flow data, and network intercommunication using artificial intelligence, machine learning and/or deep learning; computer software for training artificial intelligence, machine learning and/or deep learning systems; all of the above run on a broad range of hardware and in physical, virtual container and/or cloud environments;THREAT EYE;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.