87834323
Mar 14, 2018
Jun 25, 2019
Active Trademark
Downloadable software for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and testing the effectiveness of cyber security applications and devices and systems to achieve optimal device and network security, in the field of cyber security vulnerability testing of networked devices; computer software for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and testing the effectiveness of cyber security applications and devices and systems to achieve optimal device and network security for providing cyber security for global computer networks
Electrical and Scientific ApparatusCloud computing featuring software for use in providing security for computer systems, servers, computer networks, laptops, mobile devices and tablet computers; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (saas) featuring software for use in providing threat prevention, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, laptops, mobile devices and tablet computers; software as a service (saas) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, laptops, mobile devices and tablet computers; platform as a service (paas) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (paas) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, laptops, mobile devices and tablet computers; providing online non-downloadable software for use, including on a real-time basis, in providing operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, and laptops, mobile devices and tablet computers; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, laptops, mobile devices and tablet computers, including on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis
Computer and Scientific