87708384
Dec 5, 2017
May 12, 2020
Active Trademark
Computer hardware; Computer hardware, namely, firewalls and networks security devices; Computer software for security and protection, namely, software for providing web security and protection, detecting suspicious or malicious user activity and cyber-related threats, monitoring of computer systems for detecting unauthorized access or data breach; Computer software, namely, software for protecting applications by concealing or reshaping the interfaces of a website; Computer software for providing security and protection of data, networks and communications; Downloadable computer software for providing security and protection of data, networks and communications; Computer software for identifying and preventing malicious attacks, unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; Computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, boot kits, backdoors, cyber-attacks, malicious attacks and advanced persistent threats; Computer hardware, namely, network security appliances in the nature of network access server hardware, and network management stations in the nature of computer network server; Computer software, namely, network security software applications for controlling and managing access server applications; Computer software featuring self-protection mechanisms for detecting and removing computer viruses for vulnerable systems, effectively extending the defense perimeter of enterprises; Computer security and information technology products, namely, computer software for authorizing access to databases
Electrical and Scientific ApparatusComputer security consultancy; Computer technology consultancy; Providing temporary use of non downloadable computer software services, namely, web security and protection services, detection of suspicious or malicious user activity, unauthorized access or data breach, and cyber-related threats, monitoring of computer systems; Computer security services, namely, restricting unauthorized network access by concealing or reshaping the interfaces of a website; Providing a secure electronic online system featuring technology of areal time proactive defense mechanisms for vulnerable systems; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems by remote access to ensure proper functioning; Cloud computing services featuring software and databases for use in database management for computer security and prevention and mitigation of computer risks; Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; Provision of information in the field of computer security risk and internet security risk consultancy; Computer and internet security testing services, namely, threat analysis for protecting data and risk control services in the field of internet security for prevention and mitigation of computer risks; Design and development of computer hardware and software for use in computer network security and protection; Technological consultation in the field of computer networking and network security; Technical support, namely, monitoring of network systems and servers related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Technical consulting related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Technical support services, namely, 24/7 monitoring application services related to the design, development and management of cyber-security systems for others; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Software development in the field of network security, incident and fraud prevention and response, digital forensics, intrusion prevention; Maintenance of computer software; Software as a service (SAAS) services featuring software for providing security and protection for use in computer network security; Software as a service (SAAS) services, namely, hosting software for use by others for providing security and protection for use in computer network security; Software as a Service (SaaS) services, namely, hosting cloud and datacenter infrastructure software for use by others for providing security and protection in relation to security and protection computer software
Computer and Scientific