CYBERACTIVE R3SPOND
Mark Identification

CYBERACTIVE R3SPOND

Serial Number

97149856

Filing Date

Nov 30, 2021

Trademark by

CYBERACTIVE TECHNOLOGIES LLC

Classification Information

Software as a service (SAAS) featuring software for ensuring internet security; software as a service (SAAS) featuring software for ensuring enterprise security; software as a service (SAAS) featuring software for ensuring computer network security and analyzing network traffic; software as a service (SAAS) featuring software for collecting and transmitting cyber-security related telemetry; software as a service (SAAS) featuring software for enforcing of computer security policies; software as a service (SAAS) featuring software for preventing and disrupting malicious activity; software as a service (SAAS) services featuring software for ensuring computer network security; Software as a service (SAAS) services, namely, hosting software for use by others for ensuring computer network security; software as a service (SAAS) services featuring software for analyzing network traffic; Software as a service (SAAS) featuring software for analyzing security of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; Software as a service (SAAS) featuring software for analyzing tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; Software as a service (SAAS) featuring software for ensuring computer and network system detection defenses and preventing of compromise, pre-, and post-compromise; Software as a service (SAAS) featuring software for ensuring network defense and offense of compromise, pre-, and post-compromise tactics; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for ensuring network security, endpoint security and cloud security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, detection, analysis, and response to compromise, malicious activity, malware, and zero-day exploits

Computer and Scientific