88589670
Aug 22, 2019
Aug 11, 2020
Active Trademark
Educational services, namely, providing training in the form of seminars and workshops in the field of computer security; educational services, namely, providing training of security professionals for certification in the field of computer security
Education and EntertainmentComputer security consultancy; statement of work driven computer software consulting services in the field of computer security; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Managed computer security services delivered through security operations centers, namely, managing and optimizing computer security software, namely, security information and event management (SIEM), firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC), data loss prevention, application security, endpoint security, and forensics and incident response; Computer services, namely, managing and monitoring computer infrastructure for others in the field of computer security; Computer software and hardware design in the nature of advanced content and correlation and advanced engineering to maintain the health of computer infrastructure in the field of computer security; computer technical support services, namely, monitoring of technological functions of computer network systems in the nature of computer infrastructure for security purposes delivered through security operations centers; platform as a service (PAAS) featuring computer software platforms for data storage, data manipulation and data analysis in the field of computer security and for security surveillance that allow for the use of practical and accurate algorithms to automate the filtering process around event types that are less relevant and less actionable to security that are not necessary to process in traditional security technologies, namely, the security information and event management (SIEM) and to learn the difference between normal and abnormal user behavior, specific to that distinctive organization
Computer and Scientific