CYBEATS SBOM STUDIO
Mark Identification

CYBEATS SBOM STUDIO

Serial Number

97220769

Filing Date

Jan 14, 2022

Trademark by

CYBEATS TECHNOLOGIES INC.

Classification Information

Downloadable security software, namely, computer software for encrypting and authenticating data; Downloadable computer software, namely, cyber security software being software for identifying cybersecurity risks and software vulnerabilities; downloadable computer software for computer security, computer network security and information security purposes being software for identifying cybersecurity risks and software vulnerabilities; downloadable computer software in the field of the security risk industry, namely, computer security software being software for identifying cybersecurity risks and software vulnerabilities; downloadable computer software for managing computer security strategy and resources; downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; downloadable cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing devices; downloadable computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; downloadable computer software for managing cyber incident response, alert management, response management, cyber incident investigation, and cyber incident data collection and analysis; downloadable application programing interfaces (APIs), namely, computer software comprising a set of subroutine definitions, protocols, and tools for building application software, for integrating external systems into detection and incident response management systems; downloadable computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats

Electrical and Scientific Apparatus

Services for enhancing the performance, function and security of computer networks, namely, installation and maintenance of computer hardware; troubleshooting of computer hardware, namely, troubleshooting in the nature of the repair of computer hardware; maintenance and repair of computer hardware; installation, maintenance and repair of computer hardware; upgrading of computer hardware; computer consultation in the fields of computer networks security, cyber security, cyber threat detection, cybercrime, and prevention and mitigation of cyber risk consultation about the repair of computer hardware, consultancy relating to the maintenance of computer hardware

Building Construction and Repair

Computer network security services, namely, computer network security consultancy, restricting unauthorized access to computer networks; computer security consultancy; design and development of electronic data security systems; developing computer software; internet security consultancy; maintenance of computer software relating to computer security and prevention of computer risks; monitoring of computer systems for detecting unauthorized access or data breach; computer security consultation in the fields of computer networks security, cyber security, cyber threat detection, cybercrime, and prevention and mitigation of cyber risk; providing online non-downloadable software in the field of computer security; Software as a Service (SAAS) services featuring software for performing computer security and risk assessment and remediation; Platform as a Service (PAAS) services featuring software for computer security and risk assessment and remediation; providing online non-downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; providing online non-downloadable cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing firmware based devices; providing online non-downloadable computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; providing online non-downloadable computer software for managing cyber incident response, alert management, response management, cyber incident investigation and cyber incident data collection and analysis; providing online non-downloadable computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; providing temporary use of on-line non-downloadable security software, namely, computer software for encrypting and authenticating data; providing temporary use of on-line non-downloadable computer software, namely, cyber security software being software for identifying cybersecurity risks and software vulnerabilities; providing temporary use of on-line non-downloadable computer software for computer security, computer network security and information security purposes being software for identifying cybersecurity risks and software vulnerabilities; providing temporary use of online non-downloadable computer software in the field of the security risk industry, namely, computer security software being software for identifying cybersecurity risks and software vulnerabilities; providing temporary use of on-line non-downloadable computer software for managing computer security strategy and resources; providing temporary use of on-line non-downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; providing temporary use of on-line non-downloadable cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing devices; providing temporary use of on-line non-downloadable computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; providing temporary use of on-line non-downloadable computer software for managing cyber incident response, alert management, response management, cyber incident investigation, and cyber incident data collection and analysis; providing temporary use of on-line non-downloadable application programing interfaces (APIs), namely, computer software comprising a set of subroutine definitions, protocols, and tools for building application software, for integrating external systems into detection and incident response management systems; providing temporary use of on-line non-downloadable computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; installation, maintenance and repair of computer software

Computer and Scientific