87392341
Mar 30, 2017
Aug 28, 2018
FORCEPOINT FEDERAL HOLDINGS LLC
Active Trademark
Computer hardware; computer software, namely, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and/or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; computer software for security and protection, namely, software for providing web security and protection, providing e-mail messaging security and protection, and for data loss prevention; computer software for the security and protection of data, networks and communications; downloadable electronic publications, namely, reference manuals, user guides, instructional guides, application notes and product specifications related to the foregoing
Electrical and Scientific ApparatusProviding computer software services, namely, web, hardware, network, computer and internet security services by restricting and monitoring access to unauthorized areas in a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security; providing temporary use of non-downloadable computer software, namely, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and/or controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of information across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of non-downloadable computer software for security and protection, namely, software for use in maintaining and monitoring web security, data security and e-mail security; Software as a Service (SaaS) services, namely, hosting cloud and datacenter infrastructure software for use by others in relation to security and protection computer software; cloud computing services featuring computer software for use in security and protection; providing non-downloadable computer software services for the security and protection of data, networks, and communications
Computer and Scientific