PROSOC
Mark Identification

PROSOC

Serial Number

90747363

Filing Date

Jun 1, 2021

Registration Date

Jan 17, 2023

Trademark by

PROSOC INC.

Active Trademark

Classification Information

Computer services in the fields of computer security, namely, computer security consulting; computer security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity computer diagnostic services; cybersecurity, namely, computer security threat analysis for protecting data; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security computer diagnostic services; data security consulting; endpoint detection and response, namely, monitoring of computer systems to detect intrusions and breakdowns; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; firewall security computer diagnostic services; firewall security services, namely, computer security threat analysis for protecting data; firewall security support services, namely, help desk services; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; information technology security, namely, computer security threat analysis for protecting information technology data; information technology security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes, and scanning hardware; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; managed detection and response, namely, monitoring of computer systems to detect breakdowns and security vulnerabilities; managed security service provider, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; network security services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security policy assessment, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, review and testing of computer hardware security involved in computer networks, review and testing of network hardware security of computer networks; vulnerability assessments, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software security policy assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes

Computer and Scientific