COFENSE VALIDATOR
Mark Identification

COFENSE VALIDATOR

Serial Number

97238669

Filing Date

Jan 26, 2022

Trademark by

COFENSE INC.

Classification Information

computer software used to maintain security over or in computer networks, web applications and/or digital data; computer software for providing network, Internet, and computer security; computer software for emulating attack methods used by computer hackers over communications networks; computer software for computer security risk and threat analysis, assessment, and management; computer software for use in assessing deliverability of phishing attacks and other malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs through message gateways; computer software for emulating attack methods used by threat actors, and measuring the metrics and performance of software intended to prevent such attack methods

Electrical and Scientific Apparatus

software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers over communications networks; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in assessing deliverability of phishing attacks and other malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs through message gateways; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by threat actors, and measuring the metrics and performance of software intended to prevent such attack methods

Computer and Scientific