HONEYTRACE
Mark Identification

HONEYTRACE

Serial Number

90635946

Filing Date

Apr 9, 2021

Trademark by

PENTEN PTY LTD

Classification Information

Downloadable computer security software applications; downloadable computer software for detecting and reporting computer network intrusions, and computer network security management; downloadable computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; downloadable computer software for detecting fraudulent transactions and activities; downloadable computer software for investigating and responding to fraud and to network and enterprise threat incidents; downloadable computer software for use in analyzing and monitoring computer networks; downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data

Electrical and Scientific Apparatus

Data processing services

Advertising and Business

Technical consulting related to the customization, installation and maintenance, of cybersecurity systems in the nature of networking hardware for others; Consultancy and research relating to the installation, maintenance and repair of computer hardware

Building Construction and Repair

Providing access to local area computer networks for cyber-threat intelligence

Telecommunications

Providing temporary use of non-downloadable computer security software applications; Providing temporary use of non-downloadable computer software for detecting and reporting computer network intrusions, and computer network security management; Providing temporary use of non-downloadable computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; Providing temporary use of non-downloadable computer software for detecting fraudulent transactions and activities; Providing temporary use of non-downloadable computer software for investigating and responding to fraud and to network and enterprise threat incidents; Providing temporary use of non-downloadable computer software for use in analyzing and monitoring computer networks; Providing temporary use of non-downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; Technology consultation in the field of artificial intelligence; Implementation of computer software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of online non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of online non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of online non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of online non-downloadable software and applications for use in analysing and monitoring computer networks; providing temporary use of online non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; provision of information in the field of computer and internet security risk; consultation in the field of computer and internet security risks; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating and managing of computer cyber-security systems in the nature of software for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security, and preventing and mitigating computer risks; updating and maintaining computer security software for others; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer consultation and research in the field of the design and development of computer hardware, computer security software and network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; information technology security services in the nature of computer security analysis of network traffic, emails, files, media computer software, and mobile applications to assess information security vulnerability; information technology security services in the nature of detecting cyberattacks through the providing of authentication, issuance, validation and revocation of digital certificates

Computer and Scientific