88880726
Apr 21, 2020
Jun 14, 2022
Active Trademark
Computer hardware and downloadable computer software for monitoring, auditing, testing, detecting, analysing, evaluating, diagnosing, and managing the security of, vulnerabilities of, and intrusions to computer networks, computer operating systems, computer network security infrastructures, and computer applications and files; downloadable computer software for testing vulnerability in computers and computer networks; digital intruder identification apparatus in the nature of downloadable computer software for detecting unauthorized network access; downloadable computer software for use in the encryption and decryption of digital files, namely, audio, video, text, binary, still images, graphics, and multimedia files; downloadable cloud computing software for the purpose of computer security; downloadable computer programmes and computer software for electronically trading securities
Electrical and Scientific ApparatusBusiness advisory services, namely, business advisory services relating to information security and technology escrow agreements; business consultancy services relating to information security and technology agreements; business consultancy, analysis, research and appraisal services relating to information security; business risk management consultation; business strategic planning services; commercial assessment and risk evaluation services, namely, business risk assessment services relating to payment card transactions on the internet; consultancy regarding intellectual property business risk mitigation processes; data processing services; database management services, namely, compilation of business directories and reports in a computer database; provision of expert appraisals relating to computing in the nature of analyses and appraisals of enterprises in the field of cyber security; preparing business reports in relation to cyber security
Advertising and BusinessEscrow as a service in the nature of cloud computing software resilience being maintenance of customer data in escrow accounts; escrow services in connection with the computer and computer software industries in the nature of a secure deposit service; escrow services in relation to source codes, namely, the provision of a secure deposit service; maintaining escrow accounts for domain name escrow services for the purpose of securely holding and transferring title to domain names; maintaining escrow accounts for investments, sales transactions, domain names; maintaining escrow accounts for the sale or exchange of data or services; on-line escrow service for exchange of services
Insurance and FinancialConsulting in the field of telecommunication services, namely, transmission of voice, data, and documents via telecommunications networks; consulting services in the field of telecommunications; providing information in the field of telecommunications and telecommunication systems over computer networks, wireless networks and global communication networks; providing telecommunications connections to a global computer network; providing virtual private network (VPN) services; electronic transmission of messages and data; telecommunications services, namely, access services, gateway services
TelecommunicationsCoaching in cyber security matters; computer education training in the field of computer security; educational services, namely, providing classes, seminars, workshops in the field of IT, IT security, Internet security, cyber security and domain name registration; organization of seminars, providing an in-person educational forum, arranging and conducting educational conferences, all in the field of IT, IT security, Internet security, cyber security and domain name registration; providing of training, namely, courses, seminars, workshops in the field of IT, IT security, Internet security, cyber security and domain name registration; training of personnel to ensure maximum security protection; training personnel in full spectrum attack responses and procedure; writing of articles for online resources other than for advertising and publicity and publication of texts all in the fields of IT, IT security, internet security, cyber security, and domain registration; writing of articles for professional journals other than for advertising or publicity all in the fields of IT, IT security, Internet security, cyber security and domain name registration; publication of texts, books, journals in the field of IT, IT security, Internet security, cyber security and domain name registration
Education and EntertainmentComputer services, namely, cloud hosting provider services; computer access and computerized transactions in the nature of computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or networking resources based on assigned credentials; computer and network protection services in the nature of managed detection and response services; computer security consultancy relating to IT security; computer disaster recovery planning; computer forensic services; computer related anti-fraud services, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security consultancy services for protection against illegal network access; computer security consultancy services in the nature of administering digital certificates; computer security consultancy services, namely, scanning and penetration testing of computers and networks to assess information security vulnerability and restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security software development; computer security consultancy services in the nature of system monitoring services; computer security consultancy services in the nature of threat analysis for protecting data; computer services, namely, design, development, implementation, testing, analysis and consultancy of IT security solutions software; computer services, namely, monitoring the web sites of others to improve their scalability and performance; computer services, namely, monitoring, testing, analyzing and reporting on the Internet traffic control and content control of the web sites of others; computer services, namely, providing technical information relating to computer technology and design of computer databases for the security of data, monitoring the privacy and confidentiality of data on a website, and evaluating website security; computer services, namely, remote and on-site management of information technology (IT) systems of others by testing IT systems infrastructure to assess security controls; computer services, namely, the design and maintenance of computer software in the field of domain names; computer software development in the field of encryption and Internet security services; computer systems analysis for detection of threats; computer systems integration services; consultancy in the field of computer technology and computer software consulting; consulting services in the field of cloud computing; consulting services in the field of computer security, namely, access authorization and computer identification systems for users of computer networks; computer security consulting services in the nature of cyber-security, network security, computer security, cyber-threat assessment and remediation; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; data encryption and decoding services; data security consultancy; data security consultancy services, namely, evaluation of the data security practices of others to determine conformity with established accreditation standards; data security services in the nature of data security consultancy; design and development of computer software; design and development of electronic data security systems; design and development of security software for cloud computing networks; design, development and implementation of software for IT security solutions; computer software testing, analysis and consultancy relating to IT security solutions; domain registry operator services; electronic data back-up services; evaluation of performance of computer systems and websites against benchmark references in the nature of testing of cyber security posture; testing on machines, apparatus and instruments in the nature of testing of equipment which connects to the Internet; Internet security consultancy; maintenance and updating of computer software relating to Internet security and prevention of Internet and ecommerce risks and fraud; maintenance of computer software relating to computer security and prevention of computer risks; network vulnerability detection and mitigation services in the nature of managed detection and response cyber security services; non-destructive testing services in the nature of product quality testing services; Computer security consultancy, namely, provision of computer security risk management and mitigation services in the nature of cyber security review and remediation services; provision of professional consultancy relating to computer security; providing quality assurance consultancy services in the field of IT, IT security, Internet security, cyber security and domain name registration; recovery of computer data; remote computer backup services; computer security consultation in the nature of scientific research, development, design, implementation and testing services in the fields of computer and computer network security, authorization, authentication, encryption and identification; server hosting; software as a service (SAAS) services, namely, hosting software for use by others for use in database management in the field of domain names; technical advice relating to computer operations, namely, data encryption services and Internet security consultancy services; technical data analysis in the nature of computer forensics services; technical support and consulting services in the nature of computer security consultancy related to security, and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, mobile devices and end-point devices; technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; technical verification and validation services in the fields of software, technology and security, namely, verification and validation of computer hardware; technical verification and validation testing of software; technological services, namely, technological consultation in the technology fields of computer hardware systems and computer software; testing analysis and evaluations of the goods and services of others to determine conformity with established accreditation standards; testing, analysis and evaluation of the goods and services of others to assure compliance with industry standards; testing of security systems, namely, computer security systems; advisory services in the field of quality improvement of software in the nature of computer system consultancy; testing of computer software, electronic document and email authentication services and quality control services for others; security operation centre, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications in the nature of provision of technical support in the operation and supervision of computing networks; testing of physical, digital and personnel security defenses in the nature of testing of security controls; computer network communication consultancy services in the nature of computer technology consultancy; Computer security consultancy, namely, managed data security responses in the nature of data security breach response services; physical and digital security consultancy in the nature of data security consultancy; response and mitigation of data and network security incidents in the nature of data security consultancy; Monitoring of computer systems for detecting unauthorized access or data breach
Computer and ScientificConsultancy services in the field of public safety; licensing of computer software; providing business vulnerability reconnaissance and surveillance services in the nature of providing security surveillance of premises for businesses and governmental agencies; registration of domain names for identification of users on a global computer network; regulatory compliance auditing; security consultancy services in the field of workplace safety
Personal