90704880
May 11, 2021
Aug 8, 2023
Active Trademark
Downloadable and recorded computer software for network security, system security, file security, and data security; downloadable and recorded computer software for management and monitoring of computer networks, systems, files, and data; downloadable and recorded computer software for detection, analysis, reporting, and restoration of changes to computer networks, systems, applications, files, and data; downloadable and recorded computer software for managing and optimizing hardware and software in an information technology environment; downloadable and recorded computer software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices
Electrical and Scientific ApparatusDevelopment of software for secure network operations; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Computer security threat analysis services for protecting data, namely, security information and event management (SIEM) in the nature of monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior; Software as a service (SAAS) services featuring software for security information and event management; Providing temporary use of online non-downloadable computer software for network security, system security, file security, and data security; providing temporary use of online non-downloadable computer software for management and monitoring of computer networks, systems, files, and data; providing temporary use of online non-downloadable computer software for detection, analysis, reporting, and restoration of changes to computer networks, systems, applications, files, and data; providing temporary use of online non-downloadable computer software for managing and optimizing hardware and software in an information technology environment; providing temporary use of online non-downloadable computer software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices
Computer and Scientific