APOLYTA
Mark Identification

APOLYTA

Serial Number

97348635

Filing Date

Apr 6, 2022

Trademark by

APOLYTA INC.

Classification Information

Downloadable computer security software; downloadable computer software for validating security controls of computer terminals, servers, endpoints and networks through simulating cyber-attacks in real world scenarios; Downloadable software for measuring the security maturity level and improving security controls' efficacy of personal computers, servers, mobile, or IoT device through adaptive cyberattack simulations and emulations; downloadable software for measuring the security maturity level and improving security controls' efficacy of computer networks or entire organizations through adaptive cyberattack simulations and emulations; Downloadable computer software for conducting adaptive penetration tests for computer terminals, servers, endpoints and networks for determining and identifying information security weaknesses, assessing security gaps and recommending plans for preventing cybersecurity attacks; Downloadable software for proactively assuring security controls' effectiveness and preparedness against different types of cyber threats; downloadable software for continuously simulating adaptive cyber-security attacks and recommending practical mitigation strategies; downloadable software for predicting and preventing computer and electronics security issues prior to their occurring; downloadable software for adaptive attack emulation and/or simulation; downloadable software for measuring security controls' efficacy; downloadable software for security benchmarking; downloadable software for automated remediation of detected gaps; downloadable software for adaptive security validation

Electrical and Scientific Apparatus

Providing online non-downloadable cloud-based security software; providing online non-downloadable cloud-based software for validating security controls of computer terminals, servers, endpoints and networks through simulating cyber-attacks in real world scenarios; providing online non-downloadable cloud-based software for measuring the security maturity level and improving security controls' efficacy of a given system, namely, personal computer, server, mobile, or IoT device through adaptive cyberattack simulations and emulations; providing online non-downloadable cloud-based software for measuring the security maturity level and improving security controls' efficacy of a group of systems, namely, a network or multiple networks, or entire organizations through adaptive cyberattack simulations and emulations; providing online non-downloadable cloud-based computer software for conducting adaptive penetration tests for computer terminals, servers, endpoints and networks for determining and identifying information security weaknesses, assessing security gaps and recommending plans for preventing cybersecurity attacks; providing online non-downloadable cloud-based software for proactively assuring security controls' effectiveness and preparedness against different types of cyber threats; providing online non-downloadable cloud-based software for continuously simulating adaptive cyber-security attacks and recommending practical mitigation strategies; providing online non-downloadable cloud-based software for predicting and preventing computer and electronics security issues prior to their occurring; providing online non-downloadable cloud-based software for adaptive attack emulation and/or simulation; providing online non-downloadable cloud-based software for measuring security controls' efficacy; providing online non-downloadable cloud-based software for security benchmarking; providing online non-downloadable cloud-based software for automated remediation of detected gaps; providing online non-downloadable cloud-based software for adaptive security validation; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security weaknesses, gaps, and security maturity level; computer security services for protecting data and information from unauthorized access, namely, monitoring computer terminals, servers, endpoints and networks directed toward the prevention, detection or other action with respect to security threats and malicious activities

Computer and Scientific