86614460
Apr 29, 2015
Jan 24, 2017
Active Trademark
Procurement services in the form of purchasing computer hardware and software for others; purchasing, procurement and sourcing services, namely, procuring and sourcing computers, computer hardware, computer software and components for electronic data storage centers for others; consulting services in the field of procuring and sourcing computers, computer hardware, computer software, and components for electronic data storage centers
Advertising and BusinessConsulting and advisory services in the fields of computer and network security, data security and information technology security; computer security consultancy in the field of electronic data and networks; computer network and data security services, namely, computer network vulnerability assessments and penetration testing, computer network security review, computer network security policy assessment, web application security assessments, firewall rule review, domain password audits, social engineering assessments, wireless network security assessments, and payment card industry (PCI) hardware compliance review in the nature of testing and evaluating payment card industry hardware; managed security services, namely, data loss prevention and computer network vulnerability management in the nature of scanning and penetration testing of computers and networks to assess information security vulnerability; computer services, namely, testing of data storage centers for others; computer services, namely, testing electronic components, computer hardware, and storage capacity of computer hard drives
Computer and ScientificSecurity incident investigation, response, and remediation services, namely, monitoring of computer systems for security purposes and responding to computer security incidents by notifying individuals of a changed status or condition of a sensing device in a security system via electronic message alerts; managed security services, namely, network and systems intrusion prevention and detection in the nature of monitoring of computer and network systems for security purposes, monitoring of computer security systems featuring next generation firewalls for security purposes, file integrity monitoring in the nature of monitoring of computer files for security purposes, security system monitoring, and social media website threat monitoring for security purposes
Personal