87712446
Dec 7, 2017
Jul 24, 2018
Active Trademark
Business consulting and information services, namely, preparation of technology assessments, budget analysis, compliance-based risk assessments, and quarterly and annual business reviews; Disaster recovery services, namely, technology business planning and continuity consulting
Advertising and BusinessComputer security consultancy; Computer security consultancy in the fields of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer network engineering, namely, designing, configuring and implementing computer networks for others; Computer technical support services, namely, on-site and remote service desk/help desk services for IT infrastructure and computer networks; Computer technical support services, namely, on-site and remote service desk/help desk services for voice over internet protocol (VOIP) computer networks; Design of video teleconferencing systems for secure and commercial VTC systems; Technical support services, namely, troubleshooting in the nature of diagnosing video teleconferencing system problems; Consulting services in the field of cloud computing; Computer services, namely, cloud hosting provider services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Technical support, namely, providing backup computer programs and facilities; Backup services for computer hard drive data; Monitoring of computer systems to detect breakdowns; Remote computer backup services; Technical support services, namely, migration of datacenter, server and database applications; Internet-based application service provider, namely, hosting, managing, developing, analyzing, and maintaining the code, applications, software, and web sites of others; Computer security services for protection data and information from unauthorized access; Computer security services, namely, providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer and technical support services, namely, remote and on-site management of information systems of others
Computer and Scientific