SOFTWARE HARDWARE THREAT MANAGEMENT

Brand Owner Address Description
ARMOR DESKTOP Linsafe, Inc 11 Drinking Brook Road Monmouth Junction NJ 08852 Software and hardware threat management, intrusion detection and prevention systems, comprising of computer anti virus software; internet security software; enterprise security software; intrusion detection software; fire wall software; privacy control software; content filtering software; encryption software for protecting data in files, to enable transmission of digital information, namely confidential, financial and credit card information, for protecting the operating system, programs, and data in files, hard disks and memory; cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software for reconfiguring personal computers; computer software for the creation of virtual private networks; computer software and downloadable computer software, namely, utility software; computer utility software for removal of computer applications; computer software and downloadable computer software for use in updating other computer software; computer software for sending and receiving facsimile transmissions from computers and notebook computers; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software for use with a home or remote office; computer software for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; computer databases recorded on computer media for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; user manuals supplied with all of the foregoing; computer hardware; computer hardware appliances that provide fire wall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions that include and integrate behavior anomaly detection as well as signature based detection and protection against all types of cyber attacks of network and computer systems;The color Black appears in the design element of the Penguin; the color White appears in the design element of the Penguin, as well as bands of the wording ARMOR; the color Grey appears in the design element of the Penguin, as well as bands of shading within the wording ARMOR and the two small bars on the side of the wording DESKTOP; the color Red appears as the design element attached to the back of the helmet; the color Yellow appears as the wording DESKTOP, as well as part of the face and feet of the design element; the color Orange appears as part of the face and feet of the design element.;The colors Black, White, Grey, Red, Yellow and Orange are claimed as a feature of the mark.;DESKTOP;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Disclosed is a dynamically configurable threat scanning machine management system that utilizes a network to connect threat scanning machines with a central control computer. The central control computer can transmit, among other things, operational software and threat profiles to the threat scanning machines, while the threat scanning machines can transmit, among other things, images and performance data to the central computer. The threat scanning machine management system can be arranged in a hierarchical manner, which enables threat scanning machines at various locations to be connected into regional, national or international control centers for greater management efficiency. The network may be wireless and the control computer may be portable, enabling a supervisor to remotely manage the threat scanning machines while remaining mobile about the facility, or elsewhere. Additionally, the threat scanning machine management system can be accessed and monitored remotely from a web browser via secure Internet access.