87290729
Jan 5, 2017
Feb 13, 2018
Active Trademark
Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, remote management of information technology (IT) systems of others comprised of Unified Threat Management (UTM) devices, firewalls, Wireless Detection (WDS) monitors and other network access solutions that guard and protect network gateways, network communications, email communications and data integrity; Computer services, namely, internet protocol address management; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer virus protection services; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Internet Protocol (IP) address verification services; Online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Software as a service (SAAS) services featuring software for comprehensive email security, intrusion prevention, event alerting, log capture, log analysis, network reporting and cybersecurity management; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of Cyber security management and email security
Computer and Scientific