97239690
Jan 26, 2022
Mar 28, 2023
Active Trademark
Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of asset discovery; Computer security consultancy in the field of continuous real-time threat monitoring, correlation, and alerting; Computer security audits, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of vulnerability assessment; Computer security consultancy in the nature of advising on appropriate compliance frameworks, policy documentation, process improvement, business continuity, and disaster recovery planning; Computer security consultancy in the field of threat intelligence, forensics, and response; Computer security consultancy in the field of network intrusion detection; Computer security threat analysis for protecting data; Computer services, namely, remote management of the information technology (IT) systems of others; Consulting in the field of information technology; Information technology consulting services; Planning, design and management of information technology systems; Computer network configuration services; Computer network design for others; Updating of computer software relating to computer security and prevention of computer risks; Professional computer services, namely, network analysis, LAN/WAN design, wireless engineering, virtualization and computer project management; Data security consultancy; Cybersecurity consulting services, namely, assessing and advising on cybersecurity audit processes, change management processes, and misconfigurations; Cybersecurity audits and risk assessments; Computer security consultancy in the field of cybersecurity roadmap development and cybersecurity policy development; Testing, analysis, and evaluation of cybersecurity policies, procedures and documentation processing to assure compliance with information security laws, regulations, and standards
Computer and Scientific