90634448
Apr 9, 2021
Mar 29, 2022
Active Trademark
Downloadable computer software for identifying information systems' security vulnerability, for maintaining the security and integrity of computer networks and data storage facilities, for real-time analysis of security alerts, for defending against data breaches and privacy violations, for conducting network intrusion protection testing and for vulnerability management and assessment, risk management and assessment, data breach threat analysis and network threat analysis; Downloadable computer software for allowing users to access and participate in educational classes in the field of computer programming
Electrical and Scientific ApparatusCommunication services, namely, electronic transmission of data and documents among users of computers; Communication services, namely, transmission of voice, audio, visual images and data by telecommunications networks, wireless communication networks, the Internet, information services networks and data networks; E-mail forwarding services; Electronic data transmission; Electronic delivery of images and photographs via a global computer network; Electronic messaging services; Instant messaging services; Voice mail services; Voice over internet protocol (VOIP) services
TelecommunicationsEducational services, namely, providing live and on-line classes, tutoring, workshops and boot camps in the fields of computer programming, cyber security, computer technology and web design; Education services, namely, mentoring in the field of computer programming, computer technology and web design; Educational services, namely, providing training in the fields of technology, in the nature of providing a technology-based skills instructional course about computer programming to promote career readiness and professional development in the technology sector
Education and EntertainmentProviding a website featuring non-downloadable software for identifying information systems' security vulnerability, for maintaining the security and integrity of computer networks and data storage facilities, for real-time analysis of security alerts, for defending against data breaches and privacy violations, for conducting network intrusion protection testing and for vulnerability management and assessment, risk management and assessment, data breach threat analysis and network threat analysis
Computer and Scientific