SOFTWARE PROVIDING NETWORK SECURITY

Brand Owner Address Description
CORE IMPACT FORTRA Suite 100 11095 Viking Drive Eden Prairie MN 55344 Software for providing network security and penetration testing services; computer software for exploiting and conducting post-exploitation efforts of vulnerabilities discovered in a target computer network; computer software for the automation of repeatable penetration test exploit techniques; computer software for conducting penetration tests for computer terminals, services, networks and end points for determining and identifying information security exploits; software for identifying vulnerability trends and tracking vulnerabilities identified by manual testing and other assurance activities, namely, penetration tests, code reviews, and threat modeling;Providing network security and penetration testing services; update, installation and maintenance of computer security software; providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computer and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, computer incident response, network incident response, and forensics and penetration testing;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. In one embodiment, the present invention provides for receiving security events from a network device by a distributed software agent of a network security system, determining a priority of each received security event, and storing the security events in a plurality of prioritized event buffers based on the determined priorities for a period of time determined by a timer. Upon expiration of the timer, a batch of security events for transport to a security event manager of the network security system can be created by including security events in the batch in order of priority until the batch is full.