AERIS SECURE
Mark Identification

AERIS SECURE

Serial Number

86299780

Filing Date

Jun 4, 2014

Trademark by

AERIS SECURE LLC

Classification Information

Providing computer network security services and managed security services in the field of computing, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; computer security consultancy, namely, detecting, analyzing, and providing detailed assessment of and countermeasures against the invasion of intruders into computer networks; computer security services in the nature of incident mitigation and response, namely, detecting, analyzing and responding to the invasion of intruders into computer networks by providing detailed assessment and countermeasures; computer security services in the form of firewall security management, namely, detecting, analyzing, and providing detailed assessment of and countermeasures against firewall intrusion; content security management, namely, detecting, analyzing, and providing detailed assessment of and countermeasures against viruses, spyware, malicious code and malicious content on computer networks; information security management, namely, implementation of systems and procedures to protect the integrity and security of data and information on computer networks; computer security services, namely, network security architecture review and design for information systems, communication systems, telecommunication systems and wireless networks

Computer and Scientific

Computer network security and managed security services in the field of computing, namely, firewall monitoring and monitoring of computer systems for security purposes; regulatory compliance and security consultancy in the field of payment card industry (PCI) data security laws and regulations for information systems, communication systems, telecommunication systems and wireless networks; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes

Personal