ASSUREDSCANDKV
Mark Identification

ASSUREDSCANDKV

Serial Number

86760373

Filing Date

Sep 17, 2015

Registration Date

Nov 1, 2016

Trademark by

ASSURED ENTERPRISES INC.

Active Trademark

Classification Information

Computer software for the detection of known software vulnerabilities residing/hidden within an IT Infrastructure, software or software applications; Computer software for identifying remedial action needed to eliminate detected vulnerabilities in software residing on an IT environment; Computer software for use in computer, data, and mobile device security, namely, software for scanning and detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities, and prioritizing the order in which the vulnerabilities ought to be eliminated; Computer software for use in cloud security, namely, software for scanning and detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities, and prioritizing the order in which the vulnerabilities ought to be eliminated; Cybersecurity software, namely, software for detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities and prioritizing the order in which the vulnerabilities ought to be eliminated; Computer programs for detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities, and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities, and prioritizing the order in which the vulnerabilities ought to be eliminated; Downloadable reports featuring information regarding cybersecurity; Downloadable reports featuring information regarding computer, data, and mobile device security; Downloadable reports featuring information regarding cloud security; Downloadable reports concerning the detection of software vulnerabilities in an IT environment, information regarding the vulnerabilities and their criticality, the remedial action necessary to eliminate such vulnerabilities, recommendations regarding the order in which to eliminate the vulnerabilities and information regarding potential cyberattacks

Electrical and Scientific Apparatus