90837165
Jul 19, 2021
Oct 25, 2022
Active Trademark
Reseller services, namely, distributorship services in the fields of online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware, and malware, computer firewalls, VPN hardware and software, identity access management hardware and software, Endpoint Detection and Response (EDR) platforms, and video surveillance systems; business consulting services, namely, developing corporate computer policies for others; providing referrals in the fields of cybersecurity insurance, network vulnerability assessments and testing to assess information security vulnerability, firewall and VPN solutions, identity access management solutions, antivirus and Endpoint Detection and Response (EDR) platforms, video surveillance systems
Advertising and BusinessComputer security consultancy; designing custom comprehensive cybersecurity infrastructure for enterprise businesses and computer project management services related thereto; integration platform as a service (IPAAS) featuring computer software platforms for integrating, managing, implementing and optimizing computer network and cybersecurity infrastructure and applications; software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; computer security threat analysis for protecting data, namely, providing information updates on security threats to computer networks; providing a website featuring educational information in the field of computer security; providing security threat management services, namely, monitoring and tracking of security vulnerabilities and problems in computer software, the Internet, and computer networks; conducting computer network vulnerability assessments and testing to assess information security vulnerability; e-mail security services, namely, e-mail authentication services and filtering of unwanted e-mails; managed network access control, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, managing and monitoring computer infrastructure for others to ensure proper functioning; advanced engineering services to maintain the health of computer infrastructure; remote monitoring of computer infrastructure for security purposes delivered through security operations center; managed computer security services delivered through security operations centers, namely, optimizing computer security software in the nature of security information and event management (SIEM) software, firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC) software, data loss prevention (DLP) software, application security software, endpoint security software, and forensics and incident response software
Computer and Scientific