87793490
Feb 12, 2018
Apr 26, 2022
Active Trademark
Computer software used for the testing of security systems; Computer software for use in secure network operations; Computer software for use in computer security threat analysis for protecting computers, devices, security systems and applications; Computer software for use in computer security threat analysis and monitoring alerts for protecting data; Customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Computer software for the development of security systems and contingency planning for information systems; Computer software that restricts access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer software that enforces, restricts and controls the access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software and firmware for ensuring data security, network security and authenticating user identification, in the field of system security; Anti-spyware software; Network access server operating software; Computer software for application and database integration; Computer software for application and database integration in the field of system security; Computer software for the creation of firewalls; Computer software for authorizing access to databases; Computer software platforms for the testing of security systems; Computer software for controlling and managing access server applications; Computer programs and computer software for electronically trading securities; Computer software and firmware for operating system programs
Electrical and Scientific ApparatusEducational services, namely, conducting seminars, lectures, non-downloadable webinars and workshops about network security, internet security and data security and training for cyber analyst and IT security qualifications; Providing non-downloadable training videos and courses in the field of computer network security; Online electronic publishing of text and videos featuring information regarding computer network security; Online electronic publishing of text and graphic works of others featuring information regarding securities market services and securities trading activity, information regarding publicly-traded companies and other financial and business information
Education and EntertainmentSecurity Operation Centers (SOCs) As A Service, namely, computer network security services, namely, monitoring on premise networks, endpoints, as well as cloud-based services and infrastructure; Internet security consultancy; Data security consultancy; Computer security consultation services, namely, identifying and monitoring security alerts and the response capabilities of the system; Computer security threat analysis for protecting computers, devices, security systems and applications; Computer security threat analysis and monitoring alerts for protecting data; Design and development of computer networks featuring monitoring and alert security systems; Design and development of electronic data security systems; Development of software for secure network operations; Design and development of security threat identification and handling mechanism in the nature of computer systems; Designing and optimizing the monitoring systems for others for effective detection of security threats and response thereto; Design and development of home security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer consultation in the field of internet security; Computer consultation in the field of computer security; Testing of security systems; Engineering and system analysis in the field of online business security systems; Providing technology information updates for home security systems via the global computer network; Monitoring of computer systems featuring real-time organization monitoring of relevant devices, events, traffic and security systems and applications; Technical support, namely, monitoring technological functions of computer network systems; Technical support, namely, monitoring security technological functions of computer network systems; Providing a website that features technology that enables the secure exchange of information by users; Updating of computer software relating to computer security and prevention of computer risks; Maintenance of computer software relating to computer security and prevention of computer risks; Providing a secure, web-based service featuring technology that enables individuals to remotely create and manage their own accounts so that whatever private content they upload now can be encrypted, then delivered to their intended recipients, at the time and in the manner requested; Providing a website featuring technology enabling users to remotely view, monitor, program, operate and control large and small appliances, electrical systems and security systems in homes, offices and vehicles; Providing a secured-access website that gives registered Internet networked institutions the ability to upload, view, copy, print, download and share documents and images for the purposes of conducting consumer-driven transactions; Data encryption services for providing security and anonymity for electronically transmitted consumer transactions; Authentication, issuance and validation of digital certificates; Computer security services namely, administering digital certificates and digital keys; Computer security services, namely, providing authentication, issuance, validation and revocation of digital certificates; Internet-based service for the secure electronic storage of data featuring an ability to track and report all user interactions with the service; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security
Computer and Scientific