IMMERSIVE SIMULATION ENGINE
Mark Identification

IMMERSIVE SIMULATION ENGINE

Serial Number

97278706

Filing Date

Feb 22, 2022

Trademark by

IMMERSIVE LABS HOLDINGS LIMITED

Classification Information

Downloadable computer software for cyber security, namely, software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; computer hardware; downloadable computer software in the field of cyber security; downloadable computer software platforms for cyber security

Electrical and Scientific Apparatus

Business consultancy relating to cyber security; business data gathering and analysis services in the field of cyber security; business and marketing research; business risk assessment services; business information services; strategic business consultation in the field of computer software, network management and network security; business risk assessment and management

Advertising and Business

Technical support services, namely, technical advice relating to the installation, maintenance and repair of computer hardware and cyber security installations; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security hardware systems for others

Building Construction and Repair

Education and training services, namely, offering courses of instruction in cyber security, cyber skills training and cyber security education; provision of online training, namely, administering online courses and seminars to teach participants cyber security skills and how to protect themselves from cyber threats; provision of virtual training labs on the subject of cyber security skills; providing information, consultation, research and advice in relation to cyber security education services; providing information via a global computer network in relation to cyber security education services; preparation of reports relating to cyber security education services

Education and Entertainment

Software as a Service (SAAS) services featuring software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; Platform as a Service (PAAS) services featuring software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; Software as a Service (SAAS) services featuring software for use in cyber security for the detection and mitigation of advanced persistent threat attacks; developing computer software and computer software platforms for online learning environments to teach participants cyber security and how to protect themselves from cyber threats; providing online information in the field of cyber security and cyber threats via a computer database or the Internet; design, development, and implementation of technology solutions for the purposes of cyber security; design, development and implementation of the creation of computer solutions for cyber, computer, data and Internet security threats; technological advisory services relating to cyber, computer, Internet and data security management information; technological consultancy services relating to cyber, computer, Internet and data security; technological advisory services relating to measurement of cyber risks; providing online non-downloadable software for cyber skills and threats training and education; technological advisory services relating to cyber, computer, Internet and data security, protection and restoration services; computer system monitoring for detecting unauthorized access or data breach; technical support, namely, monitoring technological functions of computer network systems; computer system analysis; advisory services relating to computer systems analysis; compilation of technological information relating to cyber security; testing, analysis, monitoring, software maintenance and technological advisory services regarding cyber security and data security services; design and development of computer software and computer systems for monitoring computer network behavioral patterns to discover risks; design and development of computer software and computer systems for monitoring computer network behavioral patterns to correlate security information; design and development of computer software and computer systems for monitoring computer network behavioral patterns to assess vulnerabilities, and managing and communicating compliance; provision of IT consultancy services to protect against and remedy cyber security breaches and incidents; consultancy, design, testing, research and technological advisory services, all relating to computer security and computer networks; technical consultation in the field of computer software, network management and network security; technical support services, namely, technical advice relating to the installation, maintenance and repair of computer software and cyber security software; technical support services relating to computer software networks and the Internet; design and development of Internet security software programs; testing of computer programs; technological advising services, namely, cyber security threat analysis for protecting data; monitoring services for enhancing the performance, function and security of computer networks; provision of security services for computer networks in the nature of administering digital keys; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security software systems for others; monitoring of computer network behavioral patterns for detecting and removing security threats; monitoring of computer network behavioral patterns for security purposes for detecting, classifying and removing computer viruses and security threats; computer services, namely, creating an online virtual computer, namely, training labs to educate users on cyber security threats; advisory services relating to data security; monitoring of computer systems for data breach and security purposes; provision of a computer monitoring service which tracks computer hardware and computer software performance and sends out historical reports and alerts

Computer and Scientific

Security threat analysis, namely, due-diligence checks of prospective employees relating to cyber security; licensing of computer software and technology solutions, namely, software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks

Personal