88945472
Jun 3, 2020
May 4, 2021
OPERATION AND DATA INTEGRITY LTD.
Active Trademark
Downloadable Computer software for computer systems for monitoring computer network behavioral patterns to detect and remove computer viruses and security threats; Downloadable Computer software for use in detecting viruses to enhance digital security; Downloadable Computer software and computer hardware for use in the detection, blocking, and facilitating the removal and remediation of computer viruses and security threats; Downloadable Computer software for use in identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; Downloadable Computer software and computer hardware for use in providing digital security and secure computer networks, virtual computer systems and virtual computer environments; Downloadable Computer anti-virus software
Electrical and Scientific ApparatusComputer services, namely, providing temporary use of non-downloadable computer software for protecting and securing the integrity of computing devices, mobile phones, and other electronic devices configurable to connect to the internet against viruses, malware and other threats; Computer security services, namely, providing security services in the nature of recovery of data from computing devices, mobile phones, and other electronic devices configurable to allow connections to the internet to a prior state of the system; Providing temporary use of on-line non-downloadable software and applications for detecting, collecting and analyzing patterns to identify cyber threats to network security; Providing temporary use of on-line non-downloadable software and for use in accessing databases for use in computer security and the prevention and mitigation of computer risks; Providing temporary use of on-line non-downloadable software for use in the detection, blocking, and facilitating the removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices
Computer and Scientific