87884076
Apr 19, 2018
Dec 25, 2018
Active Trademark
Computer network configuration services; Computer network design for others; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer services, namely, integration of computer software into multiple systems and networks; Development of software for secure network operations and artificial intelligence; Integration of computer systems and networks; Technical support, namely, monitoring of network systems; Providing planning and engineering services in the field of information networks, communications networks, and artificial intelligence; Computer security consultancy; Design and development of electronic data security systems; Testing of security systems; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts; Computer monitoring service which tracks application software performance, performs periodic maintenance and provides reports and alerts concerning such performance; Monitoring the computer systems of others for technical purposes and providing back-up computer programs and facilities; Remote computer network technical monitoring and software maintenance services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Maintenance of computer software relating to computer security and prevention of computer risks; Computer software design for others; Computer software development; Computer modeling services, namely, computer simulation from computer programs for others; Consulting in the field of information technology; Planning, design and management of information technology systems; Advanced product research in the field of artificial intelligence; Consulting in the field of artificial intelligence; Computer security threat analysis for protecting data; Data mining; Fraud detection services in the field of government entitlement programs, namely, electronic monitoring of government entitlement program activity to detect fraud via the internet
Computer and ScientificFraud detection services in the field of government entitlement programs, namely, government entitlement program fraud investigation services; Compiling and analyzing statistical health data in order to uncover and identify health care fraud and claims errors; Health care fraud investigations
Personal