PRIVACY CONCIERGE
Mark Identification

PRIVACY CONCIERGE

Serial Number

88507170

Filing Date

Jul 10, 2019

Registration Date

Aug 11, 2020

Trademark by

RED 5 HOLDINGS INC.

Active Trademark

Classification Information

computer security consultancy; computer security consultancy in the field of cyber and physical protection; computer security threat analysis for protecting data; data security consultancy; development of security systems and contingency planning for information systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; engineering and system analysis in the field of home security systems; testing of security systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer network and data security services, namely, computer network vulnerability assessment; providing temporary use of non-downloadable computer software for internet security, security vulnerability assessment, and managed security solutions; computer systems and network management for others in the fields of Internet security, security vulnerability assessment, and managed security solutions in the nature of management of wireless computer networks for others; remote monitoring of computer systems and networks for others to ensure internet security and protection from vulnerability from viruses, malware and hackers; providing temporary use of on-line non-downloadable computer software for security awareness training, simulation of security attacks, and vulnerability assessments; conducting security audits of computer network systems in the nature of monitoring technological functions of computer network systems; providing cybersecurity consulting and threat assessment in the nature of computer security threat analysis for protecting data; computer security consultancy services, namely, providing assessment of crisis action planning comprised of cyber security audits to assess computer security vulnerability, vulnerability and threat detection analysis, monitoring of computer systems and computer networks for computer security purposes, computer network traffic monitoring and analysis, computer network identity monitoring and management, computer network access and authentication monitoring and management, and continuity of operations response, namely, conducting recovery operations for the recovery of computers; computer security consulting services in the field of computer security threat assessment for protecting data

Computer and Scientific