79337122
Dec 17, 2021
Nov 7, 2023
Active Trademark
Downloadable computer software and hardware for digital security for use in network management, controlling networked devices in the internet of things (IoT), authenticating user identification, ensuring the security of electronic mail, controlling building environment, access and security systems sold as a unit; computer security products, namely, computer peripherals; computer hardware and software, namely, network security appliances, email security appliances, digital data and media security appliances and security software applications, namely, computer hardware, and recorded software for computer hardware, and downloadable software for controlling networked devices in the internet of things (IoT); downloadable computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer malware, cyber-attacks, malicious attacks, and advanced persistent threats sold as a unit; downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable computer software and hardware providing monitoring and management of secure networks, virtual computer systems and virtual computer environments sold as a unit; downloadable software for use in managing online consumer privacy issues, namely, for controlling networked devices in the internet of things (IoT), authenticating user identification, ensuring the security of electronic mail; downloadable computer software that performs collection of security information and analyzes it based on multiple algorithms to identify security risks; downloadable security analytics software for monitoring network security and identifying threats and vulnerabilities
Electrical and Scientific ApparatusManagement of computer databases; computerised data processing services; office functions in the nature of providing data searches in computer files for others; data logging and data retrieval services, namely, computer data entry and re-entry services; business data analysis services, namely, capturing, exploring, identifying, aggregating and modelling of data in the nature of data compiling and analyzing relating to business management, searching for data in computer files for others, analyzing of data, data processing, managing, electronic data storing, monitoring network data for business purposes; business data analysis and analytics; business research services; business process modelling, namely, business data analysis, business management consulting with relation to strategy, marketing, sales, operation, product design particularly specializing in the use of analytic and statistic models for the understanding and predicting of consumers, businesses, and market trends and actions; business modelling to support operational risk analysis, namely, business data analysis, business management consulting with relation to strategy, marketing, sales, operation, product design particularly specializing in the use of analytic and statistic models for the understanding and predicting of consumers, businesses, and market trends and actions; business risk management services; business consultancy services relating to security, cyber security, computer security, security software, encryption, information assurance, product assurance, information technology and computer risk; business risk assessment services in the nature of preparation of business risk reports, commercial reports and economic reports; information, advisory and consultancy services relating to all the aforesaid services
Advertising and BusinessTechnical support and consulting services related to security and vulnerability of, and cyberattacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analysing, integrating, repairing, and managing of cyber-security software systems; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks for use in detecting and analyzing cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; computer security threat analysis for protecting data in the nature of monitoring and collecting cyber security intelligence; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; development, updating and maintenance of software for networks and standalone computers in the fields of security; computer consulting services in the field of analysing security intelligence data to uncover threats and prioritize, prevent against future attacks, simplify management of security data; providing services in the field of unified security analytics, namely, computer security threat analysis to measure, track and reduce cyber security risks and identify anomalous activity across computer networks; computer security consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software
Computer and Scientific