86668538
Jun 19, 2015
Apr 25, 2017
Active Trademark
Computer hardware; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies in the field of network security, data security, and computer security; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; downloadable computer programs for use in protecting computers and networks in the field of network security, data security, and computer security; computer software for use in scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints to reduce threats from malware and intrusion; computer compliance software in the field of network security, data security, and computer security; computer software for use in filtering Internet content, for use in managing, checking, and protecting networks, computers, and mobile devices; downloadable electronic publications in the nature of weblogs, blogs, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices
Electrical and Scientific ApparatusComputer security consultancy; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies in the field of network security, data security, and computer security; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable software for ensuring compliance in the field of network security, data security, and computer security; providing on-line, non-downloadable software for use in filtering Internet content; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
Computer and Scientific