79165798
Nov 7, 2014
Apr 5, 2016
Active Trademark
Scientific, checking apparatus and instruments for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer networks security; [ apparatus for recording, transmission and reproduction of sound and images; blank magnetic recording media, optical and sound recording disks; blank compact disks, DVDs and other digital recording media, namely, USB flash drives; ] computers, data processing equipment, namely, computers, computer peripherals, electronic modules, telecommunication apparatus, storage apparatus and devices and computer hardware for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; [ electronic tablets, smartphones, e-book readers; software, namely, software for computer security and software for protecting computer networks; computer peripheral devices; memory cards and integrated circuit cards ]
Electrical and Scientific Apparatus[ Telecommunications, namely, providing electronic telecommunication connections, providing data transmission and reception services via telecommunication means, providing telecommunications routing and junction gateway services in the field of computer networks security; communications via computer terminals, fiber-optic networks, computer networks, and hardware and devices for computer networks; provision of telecommunication connections between computer networks; rental of telecommunication apparatus; transmission of information between computer networks by cable, wireless and electronic communication networks; lending and rental of telecommunication apparatus ]
Telecommunications[ Scientific and technical research, in the field of network attacks and computer network security; design and development of computers and software; research and development of new products for others; computer and technical project studies particularly in the field of computer security and computer networks; design, installation, development, enhancement, updating, rental and maintenance of software particularly of software for computer security and for protecting computer networks; computer programming; computer system analysis; design of computer systems; conversion of computer programs and data, other than physical conversion; conversion of data and documents from physical to electronic media, as well as between electronic media; lending and rental of hardware, namely, computers, computer peripherals, electronic modules, storage apparatus and devices and computer hardware for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; consultancy relating to computer, software and computer hardware and device design and development; digitization of documents; software as a service (SaaS) for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; cloud computing, namely, cloud hosting provider services; information technology consultancy, particularly in the field of computer security and computer networks; authentication of works of art; electronic data storage ]
Computer and Scientific