SILENT PUSH
Mark Identification

SILENT PUSH

Serial Number

98142711

Filing Date

Aug 21, 2023

Trademark by

SILENT PUSH INC.

Classification Information

Software as a service (SAAS) services featuring software for computer and network security; Software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; Application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; Computer security consultancy in the field of administration of digital keys and digital certificates; Computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Computer security consultation; Consulting in the field of information technology; Computer consultation in the field of computer and network security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Maintenance and updating of computer software relating to computer and network security and prevention of computer risks; Computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; Computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies; Cloud computing featuring software for use in computer and network security; Cloud computing services in the field of computer and network security; Computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Computer systems analysis; Implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Identifying malware on computer systems; Identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Computer systems analysis; Consultation for protecting data and information from unauthorized access in the field of computer and network security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; Computer security consultancy for protecting data and information from unauthorized access; Computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; Computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; Cloud computing featuring software for use in computer and network security; Cloud computing services in the field of computer and network security; Computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Maintenance and updating of computer software relating to computer and network security and prevention of computer risks; Monitoring of computer systems for protecting data and information from unauthorized access

Computer and Scientific

Monitoring of computer systems for security purposes; Provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; Implementing plans for improving computer and network security for businesses and governmental agencies, namely, computer security assurance, administration of digital keys and digital certificates, providing fraud detection services for electronic funds transfer, and credit and debit card and electronic check transactions via a global computer network

Personal