HONEY TRAP
Mark Identification

HONEY TRAP

Serial Number

86532389

Filing Date

Feb 11, 2015

Registration Date

Apr 11, 2017

Trademark by

STEALTH SECURITY INC.

Classification Information

Computer application software for risk management and risk mitigation, namely, software for detecting and mitigating against threats to computer networks, web servers, enterprise systems, electronic components, computer peripherals and proprietary data; Computer hardware and software systems for detecting and mitigating against threats to computer networks, web servers, enterprise systems, electronic components, computer peripherals and proprietary data; Computer programs for detecting and mitigating against threats to computer networks, web servers, enterprise systems, electronic components, computer peripherals and proprietary data; Computer software and hardware for risk management and risk mitigation, namely, software for detecting and mitigating against threats to computer networks, web servers, enterprise systems, electronic components, computer peripherals and proprietary data, by serving fictitious data and content to computer hackers, in typical arrays and formats, such that the hackers are unable to differentiate fictitious data and content from actual proprietary data and content; Computer software for accessing information directories that may be downloaded from the global computer network; Computer software for creating searchable databases of information and data; Computer software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data and information; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for risk management and risk mitigation, namely, software for detecting and mitigating against threats to computer networks, web servers, enterprise systems, electronic components, computer peripherals and proprietary data, by serving fictitious data and content to computer hackers, in typical arrays and formats, such that the hackers are unable to differentiate fictitious data and content from actual proprietary data and content; Computer software for electronic data security that may be downloaded from a global computer network; Downloadable computer software for computer security and prevention of computer risks; Downloadable virtual goods, namely, computer programs featuring fictitious electronic data files and content for use in online virtual worlds; Electronic database in the field of computer security recorded on computer media; Electronic publications, namely, replicate databases, data and files which appear to be electronic mail, accounting and business records of a third party featuring false and fictitious electronic content such that computer hackers are unable to differentiate the fictitious files and data from the actual proprietary electronic records and files of another recorded on computer media

Electrical and Scientific Apparatus