DRAGOS
Mark Identification

DRAGOS

Serial Number

90342905

Filing Date

Nov 25, 2020

Registration Date

Mar 28, 2023

Trademark by

DRAGOS INC.

Active Trademark

Classification Information

Downloadable software for industrial cybersecurity; Downloadable and recorded software for industrial cybersecurity; downloadable cybersecurity software for ensuring the security of industrial control systems and associated networks; Downloadable and recorded software for providing network, Internet, and computer security; Downloadable and recorded software for use in the management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Downloadable and recorded software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; Downloadable and recorded software for the encryption and authentication of electronic and digital information and data; Downloadable and recorded computer software for identity security; Downloadable and recorded software for authentication and identity management information security; Downloadable and recorded software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; Downloadable and recorded software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data; Downloadable electronic data files featuring data for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation; Computer hardware; Computer hardware for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices; electronic sensors for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices

Electrical and Scientific Apparatus

Business management consulting in the field of industrial cybersecurity; business monitoring services, namely, tracking the cybersecurity performance of industrial facilities for business purposes; Providing an online portal for use in business management of computer systems, industrial control systems, and networked devices for security purposes

Advertising and Business

Educational services, namely, providing classes, seminars and workshops in the field of industrial cybersecurity; Educational services, namely, providing classes, seminars and workshops in the field of cybersecurity; Training services in the field of cybersecurity; Providing online, non-downloadable educational publications in the nature of articles, webinars, whitepapers, solution briefs, reports, and datasheets in the field of cybersecurity

Education and Entertainment

Providing online non-downloadable software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; providing online non-downloadable cybersecurity software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Software as a service (SaaS) services featuring software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Platform as a service (PaaS) services featuring computer software platforms for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Software as a service (SaaS) services featuring cybersecurity software ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Platform as a service (PaaS) services featuring cybersecurity software platforms for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; providing online non-downloadable software for providing network, Internet, and computer security; providing online non-downloadable software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; providing online non-downloadable software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; providing online non-downloadable software for the encryption and authentication of electronic and digital information and data; providing online non-downloadable software for identity security; providing online non-downloadable software for authentication and identity management information security; providing online non-downloadable software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; providing online non-downloadable software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data; Providing an online portal for computer security threat analysis services for the protection of data in the nature of the management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and network security of computer systems, industrial control systems, and networked devices; Providing an online portal for computer security threat analysis for protecting data in the field of internet security, computer network security, computer security monitoring, computer network asset identification, computer security threat detection for protecting data, computer security threat intelligence for protecting data, computer security integration, computer network architecture, data encryption technology, data authentication technology, intrusion detection and prevention in the nature of computer security services for protecting data, and computer security and dysfunction incident remediation in the nature of computer security services for protecting data; electronic storage of data; Information technology consulting services; Technology consulting services in the field of cybersecurity; computer security consulting services in the field of IT project management, monitoring, evaluation, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Providing information concerning the encryption and authentication of electronic and digital data; Authentication, issuance and validation of digital certificates; issuance of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks being computer security services; Design, development, installation, and customization of software; Design and development of cybersecurity systems; Computer security consulting services relating to the development, design, implementation, testing, analysis of cybersecurity systems in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; Updating of computer software; Computer diagnostic services; Technical support services, namely, troubleshooting of industrial security monitoring software problems; Technical support services in the nature of monitoring, detecting, diagnosing, remediating, mitigating and resolving cybersecurity issues, namely, monitoring technological functions of industrial computer network systems ; Technical support services in the nature of network security architecture reviews, information security vulnerability assessments, testing of computers in the nature of device and application penetration tests, network penetration tests, and threat hunting for of computer systems, industrial control systems, and networked devices all to assess information security vulnerability in computers; Computer monitoring service which tracks application software performance, performs periodic maintenance and provides reports and alerts concerning such performance; Monitoring of computer systems, industrial control systems, and networked devices for computer security purposes in the nature of protecting data and information from unauthorized access; Monitoring and tracking of computer security vulnerabilities and problems in computer software products and computer networks for protecting data and information from unauthorized access; scientific investigation services for medical purposes; investigation of security threats to computer systems, industrial control systems, and networked devices in the nature of computer security threat analysis for protecting data for computer security purposes; Investigation of security vulnerabilities and problems in computer systems, industrial control systems, and networked devices in the nature of computer security threat analysis for protecting data for computer security purposes; Computer emergency response team services, namely, monitoring, tracking, and investigation of computer security vulnerabilities and problems in computer software products and computer networks devices in the nature of computer security threat analysis for protecting data

Computer and Scientific

Private investigation services; private investigation of security threats to computer systems, industrial control systems, and networked devices for cybersecurity purposes for the protection of computer networks and tangible property; private investigation of security vulnerabilities and problems in computer systems, industrial control systems, and networked devices for cybersecurity purposes for the protection of computer networks and tangible property; private investigation of industrial security

Personal