88616566
Sep 13, 2019
Jul 28, 2020
Active Trademark
Computer diagnostic services; Computer forensic services; Computer programming; Computer programming and computer system analysis; Computer systems analysis; Application service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of healthcare, benefits programs, employee productivity, risk management; Computer network design and computer software design for the fields of cyber security, cyber vulnerabilities, threats and compliance; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of cyber security, vulnerabilities, threats and compliance; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to computer networks for the protection of cyber security, vulnerabilities, threat and compliance; Computer security services, namely, restricting unauthorized network access by users without credentials to computer networks for the protection of cyber security, vulnerabilities, threat and compliance; Computer security threat analysis for protecting data; Computer services, namely, creating computer network-based indexes of information, websites and resources; Computer services, namely, integration of computer software into multiple systems and networks; Computer services, namely, providing search engines for obtaining data on a global computer network; Computer services, namely, providing search engines for obtaining cyber security, vulnerabilities, threat and compliance information on a global computer network; Data security consultancy; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Design and development of electronic data security systems; Design and development of home security systems; Design, deployment and management of wireless computer networks for others; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of software for secure network operations; Engineering and system analysis in the field of home security systems; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Installing computer programs; Integration of computer systems and networks; Internet security consultancy; Maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Professional computer services, namely, network analysis, LAN/WAN design, wireless engineering, virtualization and computer project management; Providing a secure electronic online system featuring technology which allows vendors to submit electronic invoices to sales representative agencies for importing and processing of electronic invoices to save time and improve accuracy; Providing a secure electronic online system featuring technology which allows the customization of settings in the field of cyber security, vulnerabilities, threat and compliance; Providing a secure, web-based service enabling individuals to store and transmit information, including forensic tools, to assist law enforcement and search personnel should a child or dependent adult become a missing person; Providing a secure, web-based service featuring technology that enables individuals to remotely create and manage their own accounts so that whatever private content they upload now can be encrypted, then delivered to their intended recipients, at the time and in the manner requested; Providing a secured-access website that gives registered Internet networked institutions the ability to upload, view, copy, print, download and share documents and images for the purposes of conducting consumer-driven transactions; Providing a secured-access, members only website featuring technology that gives members the ability to detect threats in the field of cyber security, vulnerabilities, threat and compliance; Providing a website featuring technology enabling users to remotely view, monitor, program, operate and control large and small appliances, electrical systems and security systems in homes, offices and vehicles; Providing a website that features technology that enables the secure exchange of information by users; Providing an on-line network environment featuring technology that enables users to share data in the field of cyber security, vulnerabilities, threat and compliance; Providing an on-line network environment that features technology that enables users to share data; Providing online research and reference services via an on-line computer network by librarians and reference service specialists; Providing planning and engineering services in the field of information and communications networks; Providing technical information updates of industrial process control computer software via the global computer network; Providing technology information updates for home security systems via the global computer network; Recovery of computer data; Rental of computers relating to computer security and prevention of computer risks; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support, namely, monitoring technological functions of computer network systems; Telecommunications technology consultancy; Testing, analysis, and evaluation of the goods of others to assure compliance with industry standards; Testing, analysis, and evaluation of software in the field of cyber security, vulnerabilities, threat and compliance to assure compliance with industry standards; Testing, analysis, and evaluation of software in the field of cyber security, vulnerabilities, threat and compliance to assure compliance with cyber security, vulnerabilities, threat and compliance industry standards; Updating of computer software
Computer and Scientific