88864321
Apr 8, 2020
Aug 3, 2021
COMMISSARIAT A L'ENERGIE ATOMIQUE ET AUX ENERGIES ALTERNATIVES
Active Trademark
Downloadable and recorded Software for detecting security system defects; downloadable and recorded computer programs for detecting and mitigating against threats to computer networks, computer servers, computer peripherals and electronic components, systems and data; downloadable software, namely, computer programs for providing computer security, network security, cybersecurity and data security; downloadable and recorded software platforms for providing computer security, network security, cybersecurity and data security; downloadable and recorded computer software for risk management and risk mitigation, namely, software for detecting and mitigating against threats to computer networks, computer servers, computer peripherals and electronic components, enterprise systems and data; downloadable and recorded software development tools; downloadable and recorded computer software for managing, monitoring, tracking, analyzing and optimizing software performance and efficiency; downloadable and recorded computer software and hardware for detection of threats to computer network systems and protection against viruses, trojans and cyber-attacks; downloadable and recorded computer software for the creation of firewalls
Electrical and Scientific ApparatusScientific laboratory services; engineering; computer programming in the field of computer security, network security, cybersecurity, data security and risk management; software as a service (SAAS) for computer security, network security, cybersecurity and data security; software as a service (SAAS), featuring software for providing security of computer data and personal and financial information, information protection, data loss prevention, and concerning access detection unauthorized access to data and information; computer security consultancy, namely, advanced threat protection services; computer security services for information protection and data loss prevention; computer security threat analysis for protecting data; design and development of electronic data security systems; information technology consulting services in the field of data security; providing temporary use of non-downloadable computer anti-virus software; computer virus protection services; data encryption services; electronic surveillance of personally identifiable information for the detection of identity theft via the internet
Computer and Scientific