87062528
Jun 7, 2016
May 16, 2017
Active Trademark
Computer hardware; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; downloadable computer data-security programs; computer software for use in threat-reduction scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; computer compliance software, namely, software for use in tracking and managing of compliance with security policies; computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; downloadable electronic publications, namely, articles, brochures, and downloadable electronic data files in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices
Electrical and Scientific ApparatusComputer security consultancy; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software, namely, software for use in tracking and managing of compliance with security policies; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer services, namely, detecting unauthorized electronic messages and related computer attacks and providing notification thereof; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
Computer and Scientific