BULLETPROOF
Mark Identification

BULLETPROOF

Serial Number

87323152

Filing Date

Feb 3, 2017

Trademark by

BULLETPROOF CYBER LIMITED

Classification Information

Security software, namely, software for use in controlling access to computer networks, transmitting secure email, authorizing access to databases, assessing and testing the cyber-security status of computer systems and networks; computer application software for mobile phones and tablet computers, namely, security software for use in authorizing access to databases, controlling access to computer networks, and protecting mobile internet-enabled devices against cyber threats by provision of anti-intrusion functionality; Downloadable computer security software, namely, anti-virus software; Software for ensuring the security of electronic mail; Software to control building environmental, access and security systems; Computer software for the remote control of security apparatus, namely, software to remotely control intrusion prevention systems for computer networks and systems; Magnetically encoded cards with security features for identification purposes; Security apparatus for processing audio signals, namely, alarms and alerting devices; Electronic security systems for home network, namely, computer hardware and software for the operation and control of home environmental automation systems, software and hardware to remotely operate door locks, computer hardware and software for the operation and control of IT infrastructure systems and networks; Electronic security tags; security alarms

Electrical and Scientific Apparatus

Computer and internet security services, namely, detecting, quarantining and eliminating unauthorized data and programs on computers and repair of damaged software files, assessing and testing the cyber-security status of computer systems and networks; Consultancy in the field of computer security software; Consultancy in the field of computer security; Programming of Internet security programs; Computer programming services for electronic data security; Computer security services for protection against illegal network access; Provision of security services, namely, monitoring computer systems and networks to control computer access, monitoring and controlling computer systems and networks to mitigate denial-of-service attacks, monitoring and controlling computer systems and networks to provide cyber -threat protection, and manage online financial transactions; Design and development of Internet security programs; Design and development of electronic data security systems; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Data security consultation services; remote monitoring of computer security system to ensure proper functioning; Website usability testing services; Safety technological testing services; Computer aided testing services; Testing services for alarm and monitoring systems to determine conformity with certification standards; Testing services relating to computer software, computer programs, computer hardware, IT security, computer infrastructure and network, computer configurations and electronic data processing systems to ensure compliance with industry standards; consultation services in the field of computer software applications system testing; testing of computer software applications to assess IT security and networks for access vulnerabilities; Configuration of computer systems and networks; Configuration of computer software; Configuration of computer firmware; Technical testing services, namely, assessing and testing the cyber-security status of computer systems and networks; Testing of computer systems and networks for the certification of quality or standards; Advisory services relating to computer security; cyber security services, namely, protection and monitoring of digital assets and users of computing resources for cloud, mobile, or network resources, and enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; Security threat analysis for protecting computer systems and networks; Security monitoring services, namely, monitoring of server, storage and network infrastructure, virtualisation software, and web, mobile and software applications for security events

Computer and Scientific