90721564
May 19, 2021
May 24, 2022
Active Trademark
Negotiation and settlement of commercial transactions for third parties as it relates to computer security services, namely, ransomware attacks; Negotiation of commercial transactions for third parties relating to cyber-attacks
Advertising and BusinessTechnology consultation in the field of cybersecurity, cybersecurity services in the nature of restricting unauthorized access to computer systems, computer security threat analysis for protecting data, and computer security consultancy in the field of searching and monitoring the deep web, dark net, Internet sources, online channels, open source platforms, URLS and domain names, social media, and custom sources to identify and respond to stolen and misappropriated information, data, credentials, and assets of third-party entities; Technology consultation in the field of cybersecurity, cybersecurity services in the nature of restricting unauthorized access to computer systems, computer security threat analysis for protecting data, and computer security consultancy in the field of searching and monitoring the deep web, dark net, Internet sources, online channels, open source platforms, URLS and domain names, social media, and custom sources to identify and respond to third-party data breaches, and planned cyber and digital breaches and attacks; Computer technology consultancy in the field of computer and cyber security; development of customized software for others in the field of risk assessment, business analysis and information, credentials, data, and asset security; software development for others in the field of computer and cyber security; design and implementation of software and technology solutions for the purpose of product and document authentication and tracking, and brand monitoring and protection, to protect against counterfeiting, tampering, and diversion, and to ensure the integrity of genuine products and documents; monitoring of computer systems for detecting unauthorized access or data breaches; computer security threat analysis for protecting data; computer security consultancy in the field of threat intelligence program development; providing temporary use of on-line non-downloadable software for searching and monitoring supply chains and supply chain entities, organizations, vendors, service providers, partners, subsidiaries, and franchises in order to analyze, identify, assess, and respond to digital threats and attacks, data breaches, and digital, technological, and cybersecurity risks arising from supply chain and business partner relationships and interconnected technological systems; Technology consultation in the field of cybersecurity, cybersecurity services in the nature of restricting unauthorized access to computer systems, computer security threat analysis for protecting data, and computer security consultancy in the field of cybersecurity with respect to supply chain and business partner relationships and interconnected technological systems; Technology consultation in the field of cybersecurity, cybersecurity services in the nature of restricting unauthorized access to computer systems, computer security threat analysis for protecting data, and computer security consultancy in the field of digital and technological risks arising from supply chain and business partner relationships and interconnected technological systems; Computer security consultancy in the field of computer security, including ransomware and cyber extortion; Computer security threat analysis for protecting data, namely, identifying and analyzing threats regarding protecting data in ransomware attacks; Backup services for computer hard drive data for recovering and restoring computer data; software as a service (SAAS) services featuring computer security software, anti-ransomware software, and software for providing computer security and incident data to users, including insurance underwriters
Computer and ScientificVerification of personal identity as part of personal background investigations and legal research in the field of cybersecurity for attribution, data breaches, incident response and data exfiltration; Anti-counterfeiting consulting in the fields of product and document authentication and tracking, and brand monitoring and protection, to protect against counterfeiting, tampering, and diversion, and to ensure the integrity of genuine products and documents
Personal