97076250
Oct 15, 2021
Downloadable computer security software; downloadable computer software that protects businesses and customer data from malware and hackers; downloadable computer software for Internet security, security vulnerability assessment, security awareness training, compliance monitoring, compliance tracking, and managed security solutions; downloadable computer software for use in collecting, filtering, normalizing, enriching, processing, and analyzing system, application, and security event data from computers and computer networks; downloadable computer software for use in transmitting and receiving system, application, and security event data from computers and computer networks for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, and network attacks and breaches; downloadable computer software for monitoring, analyzing, and reporting on event data from computers and computer networks for analysis and action by security administrators or security software; downloadable computer software for use in providing a secure connection for security log and event data between computers, mobile devices, computer networks, and hosted security software; downloadable computer software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming event transmission
Electrical and Scientific ApparatusProviding consumer product information to others relating to downloadable and nondownloadable computer software for protection against cyber threats
Advertising and BusinessTechnical consulting in the field of cybersecurity risk management training
Education and EntertainmentComputer security consultancy; data and computer network security consultancy; cybersecurity and Internet security consultancy; computer security consultancy in the field of Managed Security Service Provider (MSSP); Managed Security Service Provider (MSSP) services, namely, securing, protecting, and monitoring computers, computer networks, and data for others; technical consulting services in the fields of cybersecurity and information security; computer security threat analysis for protecting data; computer security services, namely, providing computer network, cloud, and endpoint security for others; computer network and data security services, namely, computer network vulnerability assessment and restricting unauthorized access to computer systems and networks; nondownloadable computer security software; nondownloadable computer software that protects businesses and customer data from malware and hackers; nondownloadable computer software for Internet security, security vulnerability assessment, security awareness training, compliance monitoring, compliance tracking, and managed security solutions; nondownloadable computer software for use in collecting, filtering, normalizing, enriching, processing, and analyzing system, application, and security event data from computers and computer networks; nondownloadable computer software for use in transmitting and receiving system, application, and security event data from computers and computer networks for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, and network attacks and breaches; nondownloadable computer software for monitoring, analyzing, and reporting on event data from computers and computer networks for analysis and action by security administrators or security software; nondownloadable computer software for use in providing a secure connection for security log and event data between computers, mobile devices, computer networks, and hosted security software; nondownloadable computer software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming event transmission; software as a service (SAAS) services in the fields of information technology, cybersecurity, and Internet enabled devices in the Internet of Things (IOT), namely, hosting software for use by others in predicting, preventing, detecting, and responding to computer vulnerabilities, viruses, and threats, and providing protection from computer network intrusions; computer systems and network management for others in the fields of Internet security, security vulnerability assessment, and managed security solutions; security monitoring services, namely, monitoring of computer systems and networks for others to ensure Internet security and protection from vulnerability from viruses, malware, and hackers; conducting security audits of computer network systems in the nature of monitoring technological functions of computer network systems to assess computer security vulnerability, vulnerability and threat detection analysis, monitoring of computer systems and computer networks for computer security purposes, computer network traffic monitoring and analysis, computer network identity monitoring and management, and computer network access and authentication monitoring and management; providing information to others on computer network and data security
Computer and ScientificMonitoring of computer networks for unauthorized access and unauthorized activity for the benefit of others
Personal