87917799
May 11, 2018
Mar 15, 2022
Active Trademark
Security and cybersecurity software in the nature of computer software for protecting and securing computer networks and applications, for anticipating, detecting and removing computer viruses and threats, and for encrypting and authenticating data; computer hardware in the nature of firewalls, application servers, database servers, web servers, file servers, co-location servers, redundancy servers, media servers and load balancers and software for creating firewalls, and controlling, monitoring and managing access to application servers, database servers, web servers, file servers, co-location servers, redundancy servers, media servers, and load balancers; network access server operating software; computer software for controlling and managing access server applications; cybersecurity appliances, namely, messaging and network security appliances comprising computer hardware and operating software for detecting, blocking and removing computer viruses and threats, encrypting and authenticating data, preventing data-loss, recovering data, securing networks, and detecting, filtering, analyzing, managing and blocking electronic communications
Electrical and Scientific ApparatusComputer services, namely, detecting, blocking and removing computer viruses and threats, preventing data-loss, recovering data, securing networks, and monitoring of network systems for technical and computer security purposes; computer services, namely, infrastructure as a service (IAAS) featuring computer software platforms for managing computer hardware, computer software, servers, computer networks and data storage; consultancy in the field of internet security, data security, computer security, and network security; computer consultation in the field of computer and data security; application service provider (ASP) services featuring security and cybersecurity software in the nature of computer software for protecting and securing computer networks and applications, for anticipating, detecting and removing computer viruses and threats, and for encrypting and authenticating data, computer software for creation of firewalls, and controlling, monitoring and managing access to application servers, database servers, web servers, file servers, co-location servers, redundancy servers, media servers and load balancers, and computer software for controlling and managing access server applications; design and development of electronic data security software and systems; cybersecurity consultation services in the field of internet security, data security, computer security, and network security; internet security consultancy; computer security threat analysis for protecting data and information; Computer security threat analysis for protecting personal safety, personal property and public safety
Computer and Scientific