90033934
Jul 2, 2020
Jul 20, 2021
Active Trademark
Downloadable computer software that detects software issues, defects, bugs and vulnerabilities in application software; Downloadable cybersecurity software for preventing malicious attacks and advanced persistent threats against application software; Downloadable computer application and downloadable software for security testing, namely software for detection, analysis, and facilitation of computer vulnerabilities remediation in software from cyberattacks, malicious attacks, and advanced persistent threats; Downloadable electronic publications in the nature of e-books, datasheets, solution briefs, reports, whitepapers, online magazines, online newspapers, electronic journals, blogs, and podcasts in the field of cybersecurity
Electrical and Scientific ApparatusPromoting the use of security testing as a security assurance best practices to others in the field of cloud computing; Business risk management services, namely, continuity of operations business planning; Business consultation in the field of turnaround and crisis management; Business risk management services in the fields of information technology and information technology enterprises; Providing a live forum for companies to showcase, display, demonstrate and promote ideas, products and services; business consultancy and advisory services
Advertising and BusinessEducational services, namely, conducting conferences, webinars and workshops in the field of cyber and cyber-physical security threats, vulnerabilities, risks and events and distribution of course material in connection therewith; Educational services, namely, conducting conferences, seminars and workshops in the fields of internal auditing, data privacy and data security, cybersecurity, data privacy and security regulations and compliance, information technology governance and management, and data privacy and security risk management; Non-downloadable electronic publications in the nature of e-books, online magazines, online newspapers, electronic journals, blogs, and podcasts in the field of cybersecurity
Education and EntertainmentSoftware as a service (SAAS) services featuring software for detecting issues, defects, bugs, and vulnerabilities in application software; Software as a service (SAAS) service featuring cybersecurity software for preventing malicious attacks and advanced persistent threats against application software; Application computer security and application software security services, namely, nondownloadable cybersecurity software for protecting application software against malicious attacks and advanced persistent threats; Computer security vulnerability analysis; Consultancy in the fields of internet security, data security, computer security, and cyber security; Monitoring and testing computer terminals, servers, networks and end points directed toward the detection of cybersecurity exploits and protecting against information security vulnerability; Collaborative computer programming for others in the nature of hackathons; Providing information in the fields of technology and software development via an on-line website; Technology consultation in the field of cybersecurity; Information technology consulting services, namely, regulatory compliance consulting with the information and technology security; Providing cyber security compliance services, namely, detection, analysis, blocking, and facilitation of computer vulnerabilities remediation in software from cyberattacks, malicious attacks, and advanced persistent threats; Security services, namely, testing of computer systems, application, and software for addressing potential threats, vulnerabilities, risks and security events; Consulting services in the field of cyber security threat assessment and cyber security intelligence
Computer and ScientificProviding online resources, namely, providing a website featuring information in the field of physical security threats, vulnerabilities, risks and events; Technology licensing of security hardware and software; Providing an on-line searchable database featuring information concerning physical security threats, vulnerabilities, risks and events
Personal