COMPUTER SOFTWARE PROTECTING COMPUTERS

Brand Owner (click to sort) Address Description
DETECT REJECT PROTECT Preventon Technologies Limited Baylis House Stoke Poges Lane Slough Berkshire SL1 3PB United Kingdom Computer software for protecting computers from unauthorized or undesirable communications over a network; anti-virus software; computer software for providing computer network security; computer software for controlling access to computers; pre-recorded magnetic or optical data carriers, namely, computer tapes and computer disks, compact disks, CD roms, and DVDs, carrying the aforesaid computer software for use with computer;
LIVECALL Hauri Inc. Seoul 156-754 Republic of Korea Computer software for protecting computers against viruses, downloadable software for use in protecting computers against viruses, and prerecorded floppy disks containing computer software for protecting computers against viruses;LIVE CALL;
SAFEAGENT Security-7 (Software) Ltd. Industrial Park Building 7, P.O. Box 107 Yoqneam 20692 Israel computer software for protecting computers and networks from unauthorized programs, in particular, from undesired executable objects;SAFE AGENT;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A virtual private network service provider, wherein virtual private network ("VPN") software for setting up a virtual private network connection is delivered from a server computer to one or more client computers over a computer network, such as the Internet. Once the VPN software is delivered to the client computers, it can be executed so that data communications are made as virtual private network communications under control of the VPN software. Because the VPN software is stored and maintained on a server computer, and preferably delivered to the various client computers on an as-needed basis, the distribution, integrity and updating of the VPN software is improved because the "master" version of the VPN software can be controlled and revised by merely accessing the server computer system, rather than by attempting to control and revise numerous copies of the VPN software resident on various, scattered client computers.