79203107
Nov 28, 2016
Jun 26, 2018
Active Trademark
Downloadable computer software applications, for documenting and analyzing IT risks, developing mitigation plans, defining controls, and managing ongoing risk assessments; recorded computer software for documenting and analyzing IT risks, developing mitigation plans, defining controls, and managing ongoing risk assessments; recorded computer programs for documenting and analyzing IT risks, developing mitigation plans, defining controls, and managing ongoing risk assessments; downloadable computer programs for documenting and analyzing IT risks, developing mitigation plans, defining controls, and managing ongoing risk assessments
Electrical and Scientific ApparatusTelecommunications technology consultancy; computer technology consultancy; consultancy and research services in the field of information technology; consultancy and information services relating to information technology architecture and infrastructure; computer software consultancy; computer security consultancy; computer software design; maintenance of computer software; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software; rental of computer software; installation of computer software; duplication of computer programs; computer system design; Software as a service (SaaS) services featuring software for documenting and analyzing IT risks, developing mitigation plans, defining controls, and managing ongoing risk assessments for use in risk assessment and risk treatment, cyber security management, security strategy and policy; information technology research in the fields of documenting and analyzing IT risks, developing mitigation plans, defining controls, and managing ongoing risk assessments, and testing and analysis of IT risks, cyber security to determine conformity with certification standards; technical testing of IT and cyber security processes of others to determine conformity with certification standards and quality control services; technological consultancy in the technology field of cyber security, cyber security management, security strategy and policy, risk assessment and risk management; design and development of testing and analysis methods, namely, for risk assessmenta nd risk management; testing, analysis and evaluation of the goods and services of others for the purpose of certification to determine conformity with security policy; computer system analysis; technical research in the field of IT; outsource service providers in the field of information technology; off-site data backup; electronic data storage; recovery of computer data; data conversion of computer programs and data not physical conversion; conversion of data or documents from physical to electronic media; cloud computing featuring software for use in database management
Computer and Scientific