FindOwnerSearch
Brands and Their Owners
Welcome to the Brand page for “DEEP DISCOVERY”, which is offered here for Computer security software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; computer network and data security software for use in protecting computers, computer networks, and mobile devices; computer software for use in monitoring, inspecting, analyzing and reporting on data traffic on computer networks; computer software for identifying, tracking, simulating and analyzing potential security threats to computers, computer data and computer systems; computer software for identifying malicious content, communications and computer and network behavior threatening computers and computer networks; computer software for detecting and responding to advanced persistent threats and targeted security attacks; computer hardware; computer security appliances, network security appliances, and unified threat management (utm) appliances, computer hardware and software for detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer data, computer networks, and mobile devices; virtual computer security appliances and virtual network security appliances, virtual machine images emulating computer hardware and software for detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer data, computer networks, and mobile devices;.
Its status is currently believed to be active. Its class is unavailable. “DEEP DISCOVERY” is believed to be currently owned by “Trend Micro Kabushiki Kaisha”.
Owner: |
TREND MICRO KABUSHIKI KAISHA
Owner Details |
---|---|
Description: |
Computer security software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; computer network and data security software for use in protecting computers, computer networks, and mobile devices; computer software for use in monitoring, inspecting, analyzing and reporting on data traffic on computer networks; computer software for identifying, tracking, simulating and analyzing potential security threats to computers, computer data and computer systems; computer software for identifying malicious content, communications and computer and network behavior threatening computers and computer networks; computer software for detecting and responding to advanced persistent threats and targeted security attacks; computer hardware; computer security appliances, network security appliances, and unified threat management (UTM) appliances, computer hardware and software for detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer data, computer networks, and mobile devices; virtual computer security appliances and virtual network security appliances, virtual machine images emulating computer hardware and software for detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer data, computer networks, and mobile devices;
|
Categories: | COMPUTER SECURITY SOFTWARE USE |