SOFTWARE PROVIDING SECURITY DURING

Brand Owner (click to sort) Address Description
CHECKFLOW TROY GROUP, INC. 940 South Coast Drive, Suite 260 COSTA MESA CA 92626 Software for providing security during electronic check processing;CHECK FLOW;
TROY SECURE CHECKFLOW - CORPORATE TROY GROUP, INC. 940 South Coast Drive, Suite 260 COSTA MESA CA 92626 software for providing security during electronic check processing at multi-user locations;TROY SECURE CHECK FLOW-CORPORATE;SECURE AND CORPORATE;
TROY SECURE CHECKFLOW - ENTERPRISE TROY GROUP, INC. 940 South Coast Drive, Suite 260 COSTA MESA CA 92626 software for providing security during electronic check processing at remote or branch locations;TROY SECURE CHECK FLOW ENTERPRISE;SECURE AND ENTERPRISE;
TROY SECURE FORMFLOW - ENTERPRISE TROY GROUP, INC. 940 South Coast Drive, Suite 260 COSTA MESA CA 92626 software for providing security during electronic data processing by a business;TROY SECURE FORM FLOW ENTERPRISE;SECURE AND ENTERPRISE;
TROY SECUREFLOW OUTPUT MANAGER TROY GROUP, INC. 940 South Coast Drive, Suite 260 COSTA MESA CA 92626 software for providing security during printing of electronic data;TROY SECURE FLOW OUTPUT MANAGER;OUTPUT MANAGER;
TROY SECUREFLOW SOFTWARE SOLUTIONS TROY GROUP, INC. 940 South Coast Drive, Suite 260 COSTA MESA CA 92626 software for providing security during electronic data processing;TROY SECURE FLOW SOFTWARE SOLUTIONS;SOFTWARE SOLUTIONS;
TROY SECUREPORT MONITOR TROY GROUP, INC. 940 South Coast Drive, Suite 260 COSTA MESA CA 92626 software for providing security during output or input of electronic data in computer system;TROY SECURE PORT MONITOR;MONITOR;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. In one embodiment, the present invention provides for receiving security events from a network device by a distributed software agent of a network security system, determining a priority of each received security event, and storing the security events in a plurality of prioritized event buffers based on the determined priorities for a period of time determined by a timer. Upon expiration of the timer, a batch of security events for transport to a security event manager of the network security system can be created by including security events in the batch in order of priority until the batch is full.