POWERED BY PROFICIO
Mark Identification

POWERED BY PROFICIO

Serial Number

87332996

Filing Date

Feb 13, 2017

Trademark by

PROSOC INC.

Classification Information

Computer hardware and software in the fields of computer security for use in keeping computers, software and networks secure; computer software for computer security policy assessment; computer software for computer technical support services; computer software for computer vulnerability assessments; computer software for cybersecurity diagnostics services; computer software for cybersecurity maintenance services; computer software for maintaining cybersecurity of computers, software and hardware; computer software for cybersecurity policy assessment; computer software for cybersecurity technical support services; computer software for cybersecurity vulnerability assessments; computer software for data security diagnostics services; computer software for data security maintenance services; computer software for maintaining data security of computers, software and hardware; computer software for data security policy assessment; computer software for data security technical support services; computer software for data security vulnerability assessments; computer software for endpoint detection and response; computer software for firewall security assessments; computer software for firewall security diagnostics services; computer software for firewall security maintenance services; computer software for firewall security; computer software for firewall security policy assessment; computer software for firewall security technical support services; computer software for firewall security vulnerability assessments; computer software for computer hardware diagnostics services; computer software for computer hardware maintenance services; computer software for computer hardware security; computer software for computer hardware security policy assessment; computer software for computer hardware technical support services; computer software for hardware vulnerability assessments; computer software for information technology diagnostics services; computer software for information technology maintenance services; computer software for information technology security; computer software for information technology security policy assessment; computer software for information technology technical support services; computer software for information technology vulnerability assessments; computer software for managed detection and response to cyber-attacks, data security exceptions and policy exceptions; computer software for a managed security service provider; computer software for computer network diagnostics services; computer software for computer network maintenance services; computer software for computer network security; computer software for computer network security policy assessment; computer software for computer network technical support services; computer software for computer network vulnerability assessments; computer software for software or hardware password diagnostics services; computer software for software or hardware password maintenance services; computer software for software or hardware password security; computer software for software or hardware password security policy assessment; computer software for software or hardware password technical support services; computer software for software or hardware password vulnerability assessments; computer software for preventing cybersecurity and unauthorized data access; computer software for software-implemented security policy assessment; computer software for support services, namely, diagnosing computer software and hardware problems, diagnosing computer security problems; computer software for cyber and data vulnerability assessments; computer software for penetration testing of cyber threats and data access threats; computer software for cyber and data security operations center management; computer software for software diagnostics services; computer software for software maintenance services; computer software for software security policy assessments; computer software for software technical support services; computer software for software vulnerability assessments; computer software for computer operating software, applications software, computer hardware and computer network vulnerability assessments

Electrical and Scientific Apparatus

Educational courses and training in the fields of computer security; Education and training in the fields of computer security, namely, educational courses and training in the field of computer security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of computer technical support services for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of computer vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of data security diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of data security maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of data security; Education and training in the fields of computer security, namely, educational courses and training in the field of data security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of data security technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of data security vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of endpoint detection and response; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware diagnostic; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware security; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology security; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of managed detection and response; Education and training in the fields of computer security, namely, educational courses and training in the field of managed security service provider; Education and training in the fields of computer security, namely, educational courses and training in the field of network diagnostic services; Education and training in the fields of computer security, namely, educational courses and training in the field of network maintenance services; Education and training in the fields of computer security, namely, educational courses and training in the field of network security; Education and training in the fields of computer security, namely, educational courses and training in the field of network security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of network technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of network vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of password diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of password maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of password security; Education and training in the fields of computer security, namely, educational courses and training in the field of password security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of password technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of password vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of computer security; Education and training in the fields of computer security, namely, educational courses and training in the field of security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of penetration testing; Education and training in the fields of computer security, namely, educational courses and training in the field of security operations center management; Education and training in the fields of computer security, namely, educational courses and training in the field of software diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of software maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of software security policy assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of software technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of software vulnerability assessments

Education and Entertainment

Computer services in the fields of computer security, namely, computer security consulting; computer security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; computer support services, namely, help desk services; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity computer diagnostic services; cybersecurity computer software maintenance services; cybersecurity, namely, computer security threat analysis for protecting data; cybersecurity policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity support services, namely, help desk services; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security computer diagnostic services; data security computer software maintenance services; data security consulting; data security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security support services, namely, help desk services; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; endpoint detection and response, namely, monitoring of computer systems to detect intrusions and breakdowns; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; firewall security computer diagnostic services; firewall security services, namely, computer security threat analysis for protecting data; firewall security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes; firewall security support services, namely, help desk services; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; hardware diagnostic services, namely, troubleshooting in the nature of diagnosing computer hardware problems; hardware security, namely, computer security threat analysis for protecting data; hardware security policy assessment, namely, reviewing policies, scanning hardware, and reviewing human compliance with policies to assess information security vulnerability for computer security purposes; hardware support services, namely, troubleshooting in the nature of diagnosing computer hardware problems; hardware vulnerability assessments, namely, diagnosing computer hardware security problems; information technology computer diagnostic services; information technology software maintenance services; information technology security, namely, computer security threat analysis for protecting information technology data; information technology security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with policies to assess information security vulnerability for computer security purposes; information technology support services, namely, help desk services; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; managed detection and response, namely, monitoring of computer systems to detect breakdowns and security vulnerabilities; managed security service provider, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; network computer diagnostic services; network maintenance services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security policy assessment, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes; network support services, namely, help desk services; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, review and testing of computer hardware security involved in computer networks, review and testing of network hardware security of computer networks; computer diagnostic services relating to passwords; computer software maintenance services relating to passwords; password security, namely, maintenance of computer software relating to computer security and prevention of computer risks for passwords; password security policy assessment, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes, scanning, review and testing of computer and network password policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with password policies to assess information security vulnerability for computer security purposes; password support services, namely, help desk services; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password information security vulnerability for computer security purposes, , scanning, review and testing of computer and network password policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with password policies to assess information security vulnerability for computer security purposes; security, namely, computer consultation in the field of computer security; security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; vulnerability assessments, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes, , scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; penetration testing of computers and networks to assess information security vulnerability for computer security purposes; security operations center management, namely, monitoring technological functions of computer network systems; software diagnostic services, namely, troubleshooting of computer software and computer security problems; computer software maintenance services; software security policy assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software support services, namely, troubleshooting of computer software problems; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes

Computer and Scientific

Security guarding of facilities; security policy assessment, namely, physical security consultation; physical security support services in the nature of consulting; vulnerability assessments, namely, security threat analysis for protecting tangible corporate property; penetration testing, namely, security threat analysis for protecting tangible corporate property; vulnerability assessment, namely, verifying and monitoring the credentials of security personnel for corporate offices to ensure public safety and building security

Personal