CYBERVAR
Mark Identification

CYBERVAR

Serial Number

86431812

Filing Date

Oct 22, 2014

Trademark by

THE ROD BECKSTROM GROUP

Classification Information

Computer application software for financial risk management and risk mitigation, namely, software for calculating, determining and mitigating potential financial and security risks to computer networks, computer peripherals and electronic components and systems; Computer software and firmware for financial risk management and financial and security risk mitigation; Computer software for administration of computer local area networks; Computer software for application and database integration; Computer software for computer system and application development, deployment and management; Computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for determining and mitigating potential financial and security risks to computer networks, computer peripherals and electronic components and systems; Database management software for calculating and determining and mitigating potential financial and security risks to computer networks, computer peripherals and electronic components and systems; Downloadable cloud computer software for financial and security risk management, information technology and for enhancing security of computer networks and electronic assets; Downloadable software for risk management and for calculating and determining and mitigating potential financial and security risks to computer networks, computer peripherals and electronic components and systems; Software for monitoring and controlling communication between computers and automated machine systems

Electrical and Scientific Apparatus

Abstracting services in the nature of extracting and summarizing information from computer networks, information systems and electronic asset records; Business risk assessment services; Business risk management; Business risk management consultation; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing online business risk management service for use in project management

Advertising and Business

Financial advice and consultancy services; Financial analysis, namely, compiling and analyzing statistics, data and other sources of information for financial purposes; Financial risk assessment services; Financial risk management; Financial risk management consultation; Providing an on-line searchable database featuring financial information about risk mitigation and avoidance of risks to computer networks and electronic systems; Providing financial risk management services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Providing information and research in the field of finance and financial investments; Strategic financial advisory services

Insurance and Financial

Advice relating to the design of computer hardware; Computer consultation; Computer consultation in the field of computer security; Computer diagnostic services; Computer disaster recovery planning; Computer forensic services; Computer modeling services; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts; Computer network configuration services; Computer programming and computer system analysis; Computer programming services for commercial analysis and reporting; Computer programming services for others in the field of software configuration management; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, computer system administration for others; Computer services, namely, integration of computer software into multiple systems and networks; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, on-site management of information technology (IT) systems; Computer services, namely, remote management of the information technology (IT) systems of others; Computer software development and computer programming development for others; Computer systems analysis; Computer systems integration services; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting in the field of configuration management for computer hardware and software; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of computer-based information systems for businesses; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of testing of electronic components and electronic systems; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Design and development of electronic data security systems; Development and implementation of software, hardware and technology solutions for the purpose of testing of electronic components and electronic systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Development, updating and maintenance of software and database systems; Integration of computer systems and networks; IT integration services; Maintenance of computer software relating to computer security and prevention of computer risks; Planning and development of electronic communications networks; Planning, design and implementation of computer technologies for others; Planning, design and management of information technology systems; Providing a secure electronic online system featuring technology which allows businesses to determine and avoid potential financial and security risks to computer networks, data and electronic components; Providing an online non-downloadable Internet-based system application featuring technology enabling users to determine and mitigate potential financial and security risks to computer networks and electronic components; Providing information on computer technology and programming via a web site; Research in the field of intelligence and security technology; Research services in the field of information and telecommunications technology; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technological planning and consulting services in the field of computer hardware systems; Technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of IT security; Updating of computer software relating to computer security and prevention of computer risks

Computer and Scientific