88239445
Dec 21, 2018
Mar 3, 2020
Active Trademark
Downloadable computer security software, namely, software for cybersecurity monitoring and control of network activities on a computer; downloadable computer security software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; downloadable computer software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; downloadable computer software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; downloadable computer software for integrating employees' awareness, including employees' behavioral response patterns; downloadable computer software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; downloadable computer software for adjusting and prioritizing security roadmap; downloadable computer software restricting unauthorized access to computer systems as part of information security management
Electrical and Scientific ApparatusSoftware as a service (saas) services, namely, hosting computer software for use by others for cybersecurity monitoring and control of network activities on a computer; software as a service (saas) services, namely, hosting computer security software for use by others for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cyber security; software as a service (saas) services, namely, hosting computer software for use by others for calculating and simulating security breaches while providing suggestions to protect cybersecurity; software as a service (saas) services, namely, hosting computer software for use by others for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; software as a service (saas) services, namely, hosting computer software for use by others for integrating employees' awareness, including employees' behavioral response patterns; software as a service (saas) services, namely, hosting computer software for use by others for providing real-time, on-demand comprehensive configuration and vulnerability assessments; software as a service (saas) services, namely, hosting software for use by others for adjusting and prioritizing security roadmap; software as a service (saas) services, namely, hosting computer software for use by others for restricting unauthorized access to computer systems as part of information security management
Computer and Scientific