88238383
Dec 21, 2018
Feb 22, 2022
Active Trademark
Computer software, namely, downloadable computer programs and mobile device applications for use in controlling, monitoring, and managing user access to computer systems and software; computer software, namely, downloadable computer programs and mobile device applications for use in providing remote information technology support services; computer software programs and hardware to assist in security and privilege management for computer operating systems, communication protocols, and software applications; computer software programs to assist in systems administration and security on operating systems that support remote access protocols; computer software programs to assist in integrating host credentials into directory services; computer software programs that provide access to multiple applications in different operating systems; computer software programs to assist in data leak protection; computer software programs to assist in cloud and virtualization monitoring and management; computer software for management of application software configuration settings; computer software for privileged account and vulnerability management; computer software for management, analytics and reporting and asset discovery and profiling in the fields of security and privilege management
Electrical and Scientific ApparatusComputer educational and training services in the field of implementing and configuring privileged access and vulnerability management solutions
Education and EntertainmentSoftware as a service (SAAS) services featuring computer software for controlling, monitoring, and managing user access to computer systems and software; software as a service (SAAS) services featuring computer software for use in providing remote information technology support services; computer services, namely, technical consultation and assistance in the design, selection, implementation and use of computer networks and computer hardware and software systems for others with respect to implementing privileged access and vulnerability management systems; providing technical information in the field of computer system administration for others; computer security consulting services in the field of privileged access and vulnerability management solutions; computer consultation in the field of computer, network and software application security; non-downloadable computer software for management of application software configuration settings
Computer and Scientific