87591424
Aug 31, 2017
Computer software and hardware for performing security, threat, and risk-management assessments, analyses, and investigations; computer software, namely, software for management of security breach incidents and responses; computer software, namely, software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses; computer software, namely, software to monitor and collect systems and network data; computer hardware, namely, hardware to monitor and collect systems and network data
Electrical and Scientific ApparatusProviding and hosting a secure electronic online platform and website featuring software that allows cyber surveillance to assist in providing defense against data breaches and privacy violations; computer security consultancy in the fields of scanning and penetration testing of computers and networks to assess information security vulnerability; platform as a service (PAAS) featuring computer software platforms for security information services and customized computer security that provides real-time analysis of security alerts generated by network hardware and software; computer security consultancy; computer software testing to identify security vulnerability; computer forensic services; computer security consulting services in the field of maintaining the security and integrity of databases; computer network security services and communications network security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, and network threat analysis; computer and network incident response and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; computer security consulting services intended to identify, pursue, and deter threat actors; computer security services for protecting data and information from unauthorized access, namely, accessing, scanning, and monitoring of reports, the Internet, public records, and computer activity and accounts to facilitate the detection and prevention of data breaches, identity theft, and fraud; computer security services for protecting data and information, namely, providing monitoring of customer computer systems against unauthorized access; consulting services in the field of data breach, identity theft, and fraud risk-management and assessment services, fraud detection, and data breach response, namely, data breach threat assessment and simulation, data breach vulnerability analysis and mitigation, and data breach emergency response; consulting services in the field of security data breach threat assessment, namely, consulting services intended to identify, pursue, and deter data breach threat actors
Computer and Scientific