RADICALLY OPEN SECURITY
Mark Identification

RADICALLY OPEN SECURITY

Serial Number

86291495

Filing Date

May 26, 2014

Trademark by

RIEBACK MELANIE ROSE

Classification Information

Computer consultation in the field of computer security; Computer forensic services; Computer hardware and software design; Computer network configuration services; Computer network design and computer software design for the computer security; Computer programming and computer system analysis; Computer programming and software design; Computer programming consultancy; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design; Computer software design for others; Computer software development; Computer software development and computer programming development for others; Computer software development in the field of computer security; Computer software development, computer programming and maintenance of computer software for computer security; Computer systems analysis; Computer virus protection services; Consulting in the field of configuration management for computer hardware and software; Design and development of computer software; Design and development of computers and programs for computers; Design and development of electronic data security systems; Development and creation of computer programmes for data processing; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit Computer consultation in the field of computer security; Computer forensic services; Computer hardware and software design; Computer network configuration services; Computer network design and computer software design for the computer security; Computer programming and computer system analysis; Computer programming and software design; Computer programming consultancy; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design; Computer software design for others; Computer software development; Computer software development and computer programming development for others; Computer software development in the field of computer security; Computer software development, computer programming and maintenance of computer software for computer security; Computer systems analysis; Computer virus protection services; Consulting in the field of configuration management for computer hardware and software; Design and development of computer software; Design and development of computers and programs for computers; Design and development of electronic data security systems; Development and creation of computer programmes for data processing; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Planning, design and implementation of computer technologies for others; Programming of computer software for others; Recovery of computer data; Rental of computers relating to computer security and prevention of computer risks; Research and development of computer software; Research in the field of intelligence and security technology; Technical advice relating to operation of computers; Technical support, namely, monitoring technological functions of computer network systems; Technological consultation in the technology field of computer security; Technological planning and consulting services in the field of computer security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risksplanning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Planning, design and implementation of computer technologies for others; Programming of computer software for others; Recovery of computer data; Rental of computers relating to computer security and prevention of computer risks; Research and development of computer software; Research in the field of intelligence and security technology; Technical advice relating to operation of computers; Technical support, namely, monitoring technological functions of computer network systems; Technological consultation in the technology field of computer security; Technological planning and consulting services in the field of computer security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks

Computer and Scientific