78390565
Mar 25, 2004
Sep 6, 2005
Active Trademark
Electric and electronic devices and components, namely, computer software and computer hardware for providing security solutions in the field of information technology; computers; data processing equipment, namely, data processors; computer hardware; computer accessories, namely, computer peripherals used for network and data processing security; computer hardware components for protecting computers, networks, data processing systems; computer hardware modules for defeating intrusion in computers, networks, data processing systems; computer hardware modules for detecting hacker attacks, tracking hacker attacks, for detecting vulnerabilities of data processing systems; research systems comprised of computer hardware and software for use in securing information technology; intrusion detection systems, comprised of computer software and hardware for detecting intrusions into computer systems and networks; computer hardware for security management in information technology; computer software for providing security solutions in the field of information technology; computer software for providing computer, network and data processing security; computer software components for protecting computers, networks, and data processing systems; computer software modules for defeating intrusion in computers, networks, and data processing systems; computer software modules for detecting hacker attacks, tracking hacker attacks, and for detecting vulnerabilities of data processing systems; and computer software for security management in information technology; interacting computer hardware and software components for providing security solutions in the field of information technology
Electrical and Scientific ApparatusScientific and technological services and research, in the field of computer, network and data processing security; technical consulting related to security solutions in the field of information technology; design and development of security architectures and security solutions in the field of computer, network and data processing security; programming of computer software modules for others for security solutions in the field of information technology; installation, updating, maintenance of software; technical project studies and technical project management in the field of computer, network and data processing security; technical project studies and technical computer project management for defeating intrusion in computers, networks, data processing systems; technical project studies and technical computer project management for detecting hacker attacks, for tracking hacker attacks, for detecting vulnerabilities of data processing systems
Computer and ScientificMonitoring of computer systems for security purposes, namely, performing security audits in the field of information technology
Personal