87901350
Apr 30, 2018
Nov 3, 2020
Active Trademark
Computer security consultancy and information technology security services in the nature of providing network and system risk assessment, testing, monitoring, evaluation and security incident response; cybersecurity consultancy; information technology strategy services, namely, security engineering; design of information technology security systems for clients; information technology security system consulting for clients concerning security gap and risk identification, recommendations and bespoke services; cybersecurity consultancy and information technology mapping services, namely, identifying gaps and risks in information technology systems matching them to recommended controls; cybersecurity consultancy and information technology implementation consulting services concerning security data collection for the purpose of monitoring information technology systems and security control implementation, namely, firewall rules, policies and procedures, cybersecurity threat sensors, and security control systems; security detection services, namely, computer security services, namely, restricting unauthorized access to hard drives, computer networks, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, administering digital certificates, and monitoring of computer systems for protecting data from unauthorized access and computer threat detection; software as a service (SAAS) services featuring software for computer system and network risk detection, assessment, management, gap and risk assessment, and risk management planning and policy implementation; providing temporary use of a non-downloadable web-based software application for computer risk detection, assessment, management, project management, compliance and governance reporting, policy and procedure templates to assist clients in implementing information security policies and procedures, maturity modeling, maturity trending and tracking, risk and gap reporting, threat identification, and risk scoring; computer security consulting services concerning computer security strategy and architecture
Computer and Scientific