SECURE LEFT
Mark Identification

SECURE LEFT

Serial Number

88916086

Filing Date

May 14, 2020

Trademark by

ARMOR DEFENSE INC.

Classification Information

Downloadable software for use in connection with data security, computer security, cybersecurity, software security, prevention of computer risks, and host-based intrusion detection; Downloadable software for detecting, monitoring, managing, and protection and defense against and response to data, computer network, and cyber breaches, threats, and invasions; downloadable computer software development security tools; downloadable computer software development tools for securing container and virtual machine images

Electrical and Scientific Apparatus

Providing information and online information in the fields of computer security, Internet security, data security, cybersecurity, information technology, computer systems, virtualization technologies, cloud computing and computing solutions and systems, datacenter architecture, and enterprise architecture; Computer security services, namely, providing security and anonymity for electronically transmitted protected health information, credit card and banking transactions; Computer security services, namely, identification of cyber threats through multi-source threat intelligence and analysis, development of mitigation strategies to minimize risk of computer system infection and data exfiltration, remote configuration of pre-integrated security tools to protect computer software and electronic data from viruses and cyber security threats, and infrastructure and security tool notification and configuration to return infrastructure to compliant state, all of the foregoing being for data, programming, equipment and software purposes; computer security services, namely, host-based intrusion detection services; Secure hosting of digital content on the internet and secure website hosting; Technical support services, namely, remote and on-site infrastructure management services for monitoring, protecting, administration, and management of public and private cloud computing IT and application systems; Technical consulting, analysis, advisory, support, and managed security services in the fields of computer security, Internet security, data security, cybersecurity, information technology, computer systems, virtualization technologies, cloud computing and computing solutions and systems, datacenter architecture, and enterprise architecture; Managed security services and computer security services in the nature of detecting, testing, analyzing, and managing and implementing countermeasures and mitigation strategies and tools against data, computer network, and cyber breaches, threats, and invasions; Planning, designing, integration, configuration, implementation, and management of information technology (IT) systems, and virtualization, cloud-based, and cloud-computing systems and technologies; Software as a service (SAAS), platform as a service (PAAS), and infrastructure as a service (IAAS) featuring software platforms and technical support for the protection and defense against and response to data, computer network, and cyber breaches, threats, and invasions; Internet Protocol (IP) address verification services; providing temporary use of on-line non-downloadable software development security tools; providing temporary use of on-line non-downloadable software development tools for securing container and virtual machine images

Computer and Scientific