PROLEXIC TECHNOLOGIES
Mark Identification

PROLEXIC TECHNOLOGIES

Serial Number

85788868

Filing Date

Nov 27, 2012

Registration Date

Oct 14, 2014

Trademark by

AKAMAI TECHNOLOGIES INC.

Classification Information

Internet security systems, namely, computer software applications and hardware for cleansing computer network infrastructure from malware, network terrorism, distributed denial of service attacks, worms, and exploits

Electrical and Scientific Apparatus

maintaining computer hardware security systems for computer networks and network servers

Building Construction and Repair

providing third party users with access to telecommunication infrastructure

Telecommunications

security system services for computer networks and network servers, namely, detecting distributed denial of service attacks and mitigating distributed denial of service attacks; Computer security services, namely, filtering illegitimate computer network traffic through routing and network traffic scrubbing services, automated routing via border gateway protocol, DNS redirect, and providing direct physical connection of networks to traffic scrubbing centers

Computer and Scientific

security system services for computer networks and network servers, namely, monitoring of computer network systems for security purposes relating to computer network traffic for detecting a distributed denial of service attack; operating computer hardware security systems for computer networks and network servers, namely, monitoring network appliances for security purposes; Monitoring of computer systems for security purposes by operating computer hardware security systems for computer networks and network servers, namely, flow-based monitoring of routers; Monitoring of computer networks and network services for security purposes by monitoring of the technological function of computer network systems relating to computer network traffic for detecting a distributed denial of service attack; Monitoring of computer networks and network services for security purposes through application-based monitoring for detecting application-layer attacks

Personal