Serial Number

87083095

Filing Date

Jun 24, 2016

Registration Date

Nov 21, 2017

Trademark by

ECRIME MANAGEMENT STRATEGIES INC.

Active Trademark

Classification Information

Computer software for the collection and submission of cyber-attack data and malware for analysis and mitigation

Electrical and Scientific Apparatus

Education and training services, namely, providing workshops in the field of cybersecurity for improving employee awareness and defense against cyber-fraud; education services, namely, providing workshops in the field of cybersecurity; education services, namely, providing employee educational assessment and training in the field of cybersecurity; training with respect to detection of malware, unauthorized activities and intrusions, and remediation of security problems and vulnerabilities in computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; information technology training services

Education and Entertainment

Technological research and analysis in the field of computer cyber-threats; providing web-based intelligence services featuring technology that allows the user to generate reports for use in analyzing computer cyber-threats; research in the field of intelligence and security technology; computer security consultancy services for the purpose of providing technical analysis of cyber-threats, delivery of threat data, and generating and delivery of threat reports; engineering, computer technology, cybersecurity and computer technology consulting services; providing an internet website portal featuring information in the field of cybersecurity; non-downloadable computer software for the collection and submission of cyber-attack data and malware for analysis and mitigation; computer security consultancy in the field of cybersecurity for the purpose of collecting and aggregating data and intelligence; providing information related to security and vulnerability of, and cyber-attacks and threats against, computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices

Computer and Scientific

Computer security services, namely, monitoring and reporting on cyber-threats for others

Personal