EXOHAWK
Mark Identification

EXOHAWK

Serial Number

87904871

Filing Date

May 2, 2018

Registration Date

Jun 25, 2019

Trademark by

80/20 LABS LLC

Active Trademark

Classification Information

Computer consultation, namely, computer technology consultancy and computer software consultation; computer security consultancy; computer consultation in the field of network security in the nature of restricting unauthorized access to computer networks, restricting unauthorized network access by users without credentials, and enforcing, restricting and controlling access privileges of users of computing resources for network resources based on assigned credentials; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; security as a service provider in the nature of software as a service (SAAS) services featuring software which is able to monitor computer and computer network environments as related to the field of computer and network security; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; cloud computing security services featuring non-downloadable computer software for scanning computers, computer network and computer software infrastructure for configuration changes and unprotected access thereto; cloud computing security services featuring the provision of virtual computer systems through cloud computing for scanning computers, computer network, and computer software infrastructure for configuration changes and unprotected access thereto; cloud computing services in the field of computer and network security, namely, consulting services in the field of cloud computing as related to computer and network security; monitoring of computer systems for security purposes, namely, monitoring of computer systems to detect weaknesses and vulnerabilities, monitoring technological functions of computer network systems, and monitoring computer systems by remote access to ensure proper functioning; provision of systems in the nature of providing virtual computer systems and virtual computer environments through cloud computing for the management of computer and network threats, and the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software

Computer and Scientific