FRENOS
Mark Identification

FRENOS

Serial Number

98456108

Filing Date

Mar 19, 2024

Trademark by

FRENOS INC.

Classification Information

Downloadable software and mobile applications; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Downloadable cybersecurity software; downloadable software for adaptive risk-based decision making in the field of computer security; downloadable software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; downloadable software for computer security testing; downloadable software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; downloadable software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; downloadable software for implementing algorithms and programs in the fields of artificial intelligence, generative AI, and machine learning; downloadable software for industrial attack surface management; downloadable software for computer system and computer network vulnerability testing; downloadable software for computer system security analysis using digital twins; downloadable software for segmenting computer systems and networks; downloadable data analytics software for cybersecurity and computer system threat intelligence; downloadable software for computer system and network threat detection and response; downloadable software for simulating computer system and network security breaches and attacks

Electrical and Scientific Apparatus

Providing online non-downloadable software; Software as a service (SaaS) services; Providing online non-downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Providing online non-downloadable cybersecurity software; Providing online non-downloadable software for adaptive risk-based decision making in the field of computer security; Providing online non-downloadable software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; Providing online non-downloadable software for computer security testing; downloadable software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; Providing online non-downloadable software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; Providing online non-downloadable software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; Providing online non-downloadable software for implementing algorithms and programs in the fields of artificial intelligence, generative AI, and machine learning; Providing online non-downloadable software for industrial attack surface management; Providing online non-downloadable software for computer system and computer network vulnerability testing; Providing online non-downloadable software for computer system security analysis using digital twins; Providing online non-downloadable software for segmenting computer systems and networks; Providing online non-downloadable data analytics software for cybersecurity and computer system threat intelligence; Providing online non-downloadable software for computer system and network threat detection and response; Providing online non-downloadable software for simulating computer system and network security breaches and attacks; Computer security and computer network security consultancy; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer programming consultancy in the field of cybersecurity; Computer security consultancy in the field of scanning and penetration testing of computers and networks to access information security vulnerabilities; Computer security services, namely, restricting unauthorized access to computer networks; Computer security threat analysis for protecting data and critical computer systems; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Monitoring of computer system operation by remote access; Technical support services, namely, troubleshooting computer software problems, and services for the updating, maintenance, installation, repair, and customization of computer software; Planning, design and implementation of computer technologies for others

Computer and Scientific