HEXIS CYBER SOLUTIONS
Mark Identification

HEXIS CYBER SOLUTIONS

Serial Number

86020728

Filing Date

Jul 26, 2013

Trademark by

HEXIS CYBER SOLUTIONS INC.

Classification Information

Computer software and computer hardware for testing and evaluating computers, computer networks and information technology systems for security vulnerability and risk relating to hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for cyber-security, cyber-defense, information security and assurance, data security, computer security, network security and prevention of hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for monitoring, detecting, inspecting, processing, analyzing, mitigating and remediating computers, computer networks and information technology systems for hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for risk mitigation and remediation, integrity and threat analysis, cyber event data analysis, digital data intelligence gathering and analysis and dispatch of security countermeasures relating to hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for data warehousing, data analysis, threat detection, measurement and evaluation of security process effectiveness and security management controls relating to computer security, network security and information technology systems security; computer software for security information and event management and defense against hacking, cyber-attacks, computer crimes and computer viruses, namely, monitoring computer, network and information technology system activity and identifying, investigating and responding to information security threats; computer programs for collecting, storing and managing network/enterprise log records and call detail record retention and retrieval relating to computer and network security

Electrical and Scientific Apparatus

Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; updating and maintaining computer software relating to computer security, network security, information technology security and data security, and prevention of computer risks, including hacking, cyber-attacks, computer crimes and computer viruses; consultation in the fields of computer security, network security, information technology security and data security; and providing information in the field of computer security, network security, information technology security and data security; design and development of computer software

Computer and Scientific

Monitoring of computer systems and networks for security purposes

Personal