Mark Identification

Serial Number

98781702

Filing Date

Oct 2, 2024

Trademark by

TAURUSEER INC.

Classification Information

Technology services, namely, computer software development; Computer security consultation; Data security consultation; Computer security consultancy services; Information technology consulting services, relating to the installation, maintenance, and repair of computer security software; Cybersecurity technology consultation services; Technology advisory services related to computer security software; Software as a service (SAAS) services featuring software for network security monitoring and analysis and cloud security services; Software as a service (SAAS) services featuring device security posture management software; Software as a service (SAAS) services featuring software for cybersecurity, evaluating an organization's governance, danger management, and compliance (GRC) practices; Cloud computing featuring software for use for risk management, for regulatory compliance, for financial and operational performance management, for optimization and prediction and simulation and data visualization; Providing an online non-downloadable Internet based system application featuring technology which allows implementation and management of a cybersecurity governance, danger management, and compliance (GRC) program; Platform as a service (PAAS) services featuring computer software platforms for network security monitoring and analysis and cloud security services; Platform as a service (PAAS) services computer software platforms for device security posture management software; Platform as a service (PAAS) services featuring computer software platforms for cybersecurity, evaluating an organization's governance, danger management, and compliance (GRC) practices; Providing temporary use of on-line non-downloadable software to store, manage, track, analyze, and report data for regulatory compliance and risk management used for automated risk assessment; Technology consultation related to cybersecurity assessments for identifying vulnerabilities and providing tactical remediation strategies; Managing cyber security services for others, namely, updating and maintenance of computer software relating to computer security and prevention of computer risks; Maintaining and updating computer software for others relating to cyber security and prevention of computer risks; Monitoring of computer systems for others for detecting data breaches and other unauthorized access of cybersecurity events.

Computer and Scientific