86122611
Nov 19, 2013
Nov 4, 2014
Active Trademark
Business research and data analysis services in the fields of cyber-security, security of organizations, data and individuals and reputation management; analyzing, processing, monitoring and compiling data for business purposes, namely, protecting the security and reputation of organizations and individuals, cyber-security, reputation management, brand monitoring and protection, identifying malicious behavior within organizations and online, and to protect against loss of data and intellectual property, reputational damage, espionage and competitive intelligence; business risk assessment services, namely, undertaking risk assessments and risk reporting for the purposes of protecting the security and reputation of organizations and individuals, cyber-security, reputation management, brand monitoring and protection, identifying malicious behavior within organizations and online, and to protect against loss of data and intellectual property, reputational damage, espionage and competitive intelligence; due-diligence services, namely, assessing and providing reports relating to the security, cyber risk, and data leakage of organizations and individuals on behalf of others for business purposes
Advertising and BusinessDesign, development, and implementation of software and technology solutions for the purposes of protecting the security and reputation of organisations and individuals, cyber-security, reputation management, brand monitoring and protection, identifying malicious behaviour within organisations and online, and to protect against loss of data and intellectual property, reputational damage, espionage and competitive intelligence; validation and testing of computer networks and information technology systems, namely, computer security consultancy in the field of scanning and penetration testing of computers, computer systems, computer networks and computer software to assess security vulnerabilities; consultancy in relation to computer security; incident management and investigation relating to malicious behaviour in connection with information technology and other computer systems, namely, incident management for business purposes in connection with breaches and threatened breaches of the security of computers, computer systems, computer networks, computer software; consultancy services in the field of data security
Computer and ScientificSecurity services, namely, monitoring, detecting and reporting on suspicious and abnormal data patterns, cyber security threats, weaknesses in computer systems and networks, and potential threats to organisations and individuals; security services for the protection of property and individuals; intellectual property protection, namely, identifying and reporting on potential cyber-threats to data and confidential information; due-diligence services, namely, assessing and providing reports relating to the security, cyber risk, and data leakage of organisations and individuals on behalf of others for security purposes; monitoring the internet for defamatory material, misuse of brand names, counterfeiting or trademark and other related infringements, and assisting in the removal or other mitigation of that material and alerting clients; licensing of software and technology solutions for the purposes of protecting the security and reputation of organisations and individuals, cyber-security, reputation management, brand monitoring and protection, identifying malicious behaviour within organisations and online, and to protect against loss of data and intellectual property, reputational damage, espionage and competitive intelligence; provision of a computer monitoring service which tracks online data and content, namely, monitoring of computer systems, computer networks and the Internet and worldwide web for security purposes; incident management consulting and investigation relating to malicious behaviour in connection with information technology and other computer systems, namely, investigation services related to malicious behavior in connection with information technology and other computer systems for security purposes
Personal