FindOwnerSearch
Brands and Their Owners
BETA Systems Software AG contact information is shown below | |
Owner: | BETA SYSTEMS SOFTWARE AG |
---|---|
Owner Address: | Alt-Moabit 90d Berlin 10559 Germany |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
BETA |
---|---|
Description: | computer programs for automating management and control of large scale data processing systems;business management consultation in the field of data processing;computer programming and software design of computer programs for automating management and control of large scale data processing systems; |
Category: | COMPUTER PROGRAMS AUTOMATING MANAGEMENT |
Brand: |
BETASYSTEMS |
---|---|
Description: | computer programs for automatic management and control of large-scale data processing systems;BETA SYSTEMS;business management consultation in the field of computer programs for automatic management and control of large-scale data processing systems;computer programming and software design of computer programs for others for automating management and control of large-scale data processing systems; |
Category: | COMPUTER PROGRAMS AUTOMATIC MANAGEMENT |
Brand: |
GARANCY |
---|---|
Description: | Computer software for electronic data security and compliance, in particular, computer software designed to generate, issue and manage digital user identities, access management and access control and privilege information for computers, computer networks and cloud computing environments; computer software for identification and authentication of users; computer software for encryption and decryption of data; computer software to integrate cryptographic security features into software applications; computer software for computer network administration and software for cloud computing; computer software for identifying risk to computer network and cloud computing application and database security configurations; computer security products, namely, blank smart cards, digital tokens, electronic tokens, servers, clients, computer hardware and software, all for protection of data from unauthorized access; electronic data carriers containing software for electronic data security and compliance, in particular, computer software designed to generate, issue and manage digital user identities, access management and access control and privilege information for computers, computer networks and cloud computing environments, identification and authentication of users, encryption and decryption of data, integrate cryptographic security features into software applications, computer network administration and software for cloud computing, identifying risk to computer network and cloud computing products and user manuals sold in connection therewith;Providing access time to computer networks; leasing of access time to computer networks;Business organizational consultancy and business consultancy, in particular in the field of electronic data security and information technology data security;Consulting services in the field of maintaining the security and integrity of databases; authentication, issuance and validation of digital certificates;Consultancy in the field of information technology; consultancy in the field of computer software, in particular, in the field of computer software for electronic data security; computer software programming; design, development, installation and maintenance of computer software; creating complete software concepts for others; design, development and preparation of software for electronic data security; design, development, preparation of computer software to integrate cryptographic security features into software applications; design, development and preparation of computer software designed to generate, issue and manage digital user identities, access management and access control and privilege information for computers, computer networks and cloud computing environments; design and development of computer software for identification and authentication of users; design, development of computer software for encryption and decryption of data; design, development of computer network administration software and cloud computing software, in particular, design, development of software for identifying risk to computer network and cloud computing application and database security configurations; design, development of computer security products, namely, blank smart cards, tokens, servers, clients, computer hardware and software for protection of data from unauthorized access; design, development, and administration of systems for controlling and managing heterogeneous computing networks, consisting of computer networks, computers and mainframe computer systems, and for controlling and managing mainframe computer systems, and for controlling and managing client/server systems; rental of computer software; providing computer technology support services, namely, help desk services, relating to computer software and information and advice concerning the design and development of hardware; cloud computing services, in particular, public and private cloud computing services featuring software for data security and compliance and integration of private and public cloud computing environments; encrypted data recovery services; data encryption and decoding services; design, development of electronic data security systems; internet protocol (ip) address verification services; providing electronic verification of on-line orders of digital content and generating electronic permission codes which then allow users to access said digital content; providing online, non-downloadable software for installation and maintenance of computer software, electronic data security, identification and authentication of users, encryption and decryption of data, identifying risk to computer network and cloud computing application and database security configurations, computer security products, namely, smart cards, tokens, servers, clients, electronic data security systems; providing online, non-downloadable software to integrate cryptographic security features into software applications, and to generate, issue and manage digital user identities, rights and privileges to information, and privilege information for computers, computer networks and cloud computing environments; providing online non-downloadable computer software for protection of data from unauthorized access, for controlling and managing heterogeneous computing networks, consisting of computer networks, computers and mainframe computer systems, and for controlling and managing mainframe computer systems, and for controlling and managing client/server systems; |
Category: | COMPUTER SOFTWARE ELECTRONIC DATA |
Brand: |
I-S-ONE |
---|---|
Description: | computer programs;making computer programs to customer order;organization and management consulting; |
Category: | COMPUTER PROGRAMS |
Brand: |
ONE 2 |
---|---|
Description: | computer programs for the integration of computer applications; computer programs enabling the communication between computer applications even across various data processing platforms;IN THE STATEMENT, COLUMN 2, LINE 7, 10253719WZ SHOULD BE DELETED, AND 102537/9WZ SHOULD BE INSERTED.; 1 2;business management consultation in the field of data processing;computer programming for others; computer software design for others; |
Category: | COMPUTER PROGRAMS INTEGRATION |
Brand: |
PLAN B |
---|---|
Description: | Computer software, namely, software utilities to be implemented on computer mainframes utilizing the OS/390 operating system;PLAN BETA; |
Category: | COMPUTER SOFTWARE |
Brand: |
ROLE MINER |
---|---|
Description: | Computer software for creating and maintaining firewalls and preventing unauthorized access, data theft, data or computer system damage or misuse by unauthorized computer users for security systems for linked information technology resources; [computers; computer networks comprising computers and servers];Management and consultation in the nature of information technology and information technology security[; computer programming for others]; |
Category: | COMPUTER SOFTWARE CREATING |
Brand: |
SAM JUPITER |
---|---|
Description: | Computer programs, namely, access control programs for security systems;[ internet and intranet network access server operating programs; ] access-control-based information technology security systems consisting of data processors, machine readable data media, and access-based security system computer programs;In the statement, Column 1, before line 1, BETA SYSTEMS SOFTWARE AG (FED REP GERMANY CORPORATION) ALT-MOABIT 90D BERLIN, FED REP GERMANY 10559 should be inserted.;Installation of information technology security systems;Consultation in the field of access-control-based information technology security systems;Design and development of computer programs for data processing, analysis, evaluation and input of information into computer databases for information technology security systems; |
Category: | COMPUTER PROGRAMS |