SECMENTIS
Mark Identification

SECMENTIS

Serial Number

87676831

Filing Date

Feb 23, 2018

Registration Date

Feb 14, 2023

Trademark by

SECMENTIS LIMITED

Active Trademark

Classification Information

Downloadable software for use in providing cyber security, computer security and computer network security services; Computer software for cyber security assessment, security hardening, vulnerability management, vulnerability assessment, vulnerability exploitation, and penetration testing; Computer software for cyber threat detection and prevention; Computer software for detection, blocking and remediation of cyber-attacks; Computer software for detecting, documenting, analyzing, remediating, and blocking cyber threats including Trojans, worms, viruses, malware, adware, spyware, botnets, and advanced persistent threats (APTs); Computer software for monitoring, detection, and prevention of cyber security threats in computer networks, network devices, applications, electronic devices, computer systems; Computer software for computer and computer network intrusion detection and intrusion prevention; Computer software and hardware for use in providing digital security; Computer software for use in providing network security, computer security, information security, data security, cyber threat intelligence, cyber threat prevention, computer surveillance, network surveillance, and network traffic monitoring, none of the foregoing relating to software for use in business fields for the purpose of driving decision making and improving business operations, performance and strategy

Electrical and Scientific Apparatus

Software As a Service (SAAS) and non-downloadable cloud-based software featuring software for use in providing cyber security, computer security and computer network security; Technical advisory and consulting services in the field of cyber security, external network penetration testing, internal network penetration testing, web application penetration testing, wireless penetration testing, mobile application penetration testing, physical penetration testing, hardware penetration testing, Payment Card Industry (PCI) compliance reviews, computer security assessments, computer network security assessments, computer hardware security assessments; Managed cyber security services in the fields of intrusion detection, intrusion prevention, cyber security threat detection and prevention, namely, online scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices and network traffic monitoring for cyber security purposes; Implementation and integration of technology solutions, namely, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices in the field of cyber security; Computer security consultancy in the fields of security assessment and penetration testing of computers, network devices, servers, desktops, computer networks to assess information security vulnerability; Advisory, information and consulting services in the fields of cyber security, network security, data security, computer security; Providing temporary use of non-downloadable cloud-based software for use in providing cyber security, computer security and computer network security; Computer technology support services, namely, providing remote service desk and cyber security helpdesk services; Managed computer security services delivered through security operations centers, namely, managing and optimizing computer security software for security information and event management (SIEM), firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC), data loss prevention, application security, endpoint security, and forensics and incident response; Software As a Service (SAAS) services featuring cyber security software for computer and network security assessment, vulnerability assessment and vulnerability management; Research and implementation of cyber security software for computer network and application security, vulnerability assessment, vulnerability exploitation, threat detection and threat prevention; Research and development of computer software in the fields of cyber security, computer security, data and information security, and computer network security; Onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes; Providing a web site featuring information about cyber security, none of the foregoing relating to software for use in business fields for the purpose of driving decision making and improving business operations, performance and strategy

Computer and Scientific