87496033
Jun 19, 2017
Aug 7, 2018
Active Trademark
Computer software for use in automating the real-time detection, mitigation and/or prediction of cyber-attacks; computer software for use in performing automated hunting, triaging and correlating of cyber-security threats within network packets, system log data, authentication log data, application log data, host data and customer supplied data; computer software for continuous monitoring, identifying, verifying, analyzing, comparing, classifying, sorting and scoring of collected or acquired data from network traffic, network communication, network flow data, and network intercommunication, acquisition and classification of data, event triage, threat analysis, threat correlation and system and application logs created and identified by artificial intelligence, machine learning and/or deep learning; computer software for cyber-security, detecting and mitigating advanced network attacks using artificial intelligence, machine learning and/or deep learning; computer software for continuous classification, assortment, sorting and grading of data collection, acquisition and compilation into specific areas, event triage, threat analysis, threat correlation and system and application logs created and identify by artificial intelligence, machine learning and/or deep learning; computer software for linking together multiple artificial intelligence, machine learning and/or deep learning systems to share or extend threat hunting, triage and correlation across a globally accessible network; all of the above relating specifically to analytical computing technologies that provide multi-modal natural language processing, generation, reasoning and machine learning for contextual analysis and natural interaction
Electrical and Scientific ApparatusComputer services for others for automating the real-time detection, mitigation and/or prediction of cyber-attacks; computer services for the development, implementation and delivery of artificial intelligence, machine learning and deep learning for use in controlling automated hunting, triaging and correlating of cyber-security threats within network packets, system log data, application log data, authentication log data, host data and customer supplied data; providing software as a service for cyber-security, detecting, mitigating and/or predicting advanced networks attacks using artificial intelligence, machine learning and/or deep learning; computer services for others for the development of artificial intelligence and machine learning computer systems, including deep learning for continuous data collection, acquisition, compilation, correlation, retrieval, analysis and classification of data from network traffic, network communication, network flow data, and network intercommunication; providing computer services for others, namely, developing customized artificial intelligence services for continuous monitoring, identifying, verifying, analyzing, correlating, comparing, classifying, sorting and scoring of data collection, acquisition from network traffic, network communication, network flow data, and network intercommunication, acquisition and compilation of data into specific areas, event triage, threat analysis threat correlation and system and application logs created and identified by artificial intelligence, machine learning and/or deep learning; computer services for others, namely, development of Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) computer systems which are capable of understanding general human queries and formulating responses; computer systems analysis; integration of computer systems and networks; Computer services, namely, computer system administration for others for systems used in commercial interactions over global computer networks; scientific and industrial research, namely, research and development of new cybersecurity products or threat intelligence systems; Technical research in the field of computers that integrate Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) which is capable of understanding general human queries and formulating responses, and scientific research for cyber-security purposes; computer consultation services for threat detection and response; Computer consulting services in the field of security operations; all of the above relating specifically to analytical computing technologies that provide multi-modal natural language processing, generation, reasoning and machine learning for contextual cyber-security threat analysis and response, and natural interaction
Computer and Scientific