88785343
Feb 5, 2020
Apr 20, 2021
Active Trademark
Business consulting services in the field of cybercrime; Business risk assessment services in the fields of computer, network, and data security and privacy; Business compliance, audit services and technical assessment in the field of information governance and security
Advertising and BusinessComputer consulting services in the field of computer and computer network security; Computer consulting services in the field of critical incident response to information, computer, network, and internet security breaches; Computer forensic services and computer network forensic services; Computer security consulting services the field of security and vulnerability of computers, computer systems, and computer networks; Computer security consulting services in the field of scanning of computers and networks to assess information security vulnerability; Computer security consulting services in the field of malware, intrusion and penetration testing and diagnosis of computers and computer networks, and restricting and controlling access privileges of users of computing resources based on assigned credentials; Computer security services, namely, assessing information technology security and vulnerability of computers and networks; Computer services, namely, providing forensic services to recover lost and deleted data; Information technology system security remediation services, namely, recovery of computer data; Security audits, namely, computer security consultancy in the field of scanning and penetration testing of computer and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Information technology restoration of systems, data, application; Information security consulting services including secure awareness training and social engineering; Web application, mobile application and API testing and code review; Dark web investigation and analysis of sensitive data; Managed Cyber Security Services for intranet, servers, networks and applications providing monitoring services, intrusion detection, active threat hunting, testing and training, encryption, ransomware, and advance threat protection
Computer and ScientificConsulting services in the field of maintaining the security and integrity of computers, networks, and databases; Monitoring of computer systems for evidence of external criminal attacks; Analyzing data in computer databases for criminal activity; Private investigations concerning information technology system security; Cyber risk and resilience consulting services with active response to emerging cyber security threats to computer systems, networks, applications, users and mobile devices; eDiscovery identifying, collecting and producing electronically stored information in response to a request for production in a law suit or investigation
Personal