88608619
Sep 8, 2019
Aug 4, 2020
Active Trademark
Cloud computing featuring software for use in managing cyber security in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to sensitive or restricted data; Computer security services, namely, restricting unauthorized network access by unauthorized users through monitoring cyber threats, network vulnerabilities, data privacy and regulatory compliance; Computer security threat analysis for protecting data; Computer diagnostic services; Computer programming; Computer programming consultancy; Computer programming and computer system analysis; Computer programming and maintenance of computer programs; Computer programming and rental of computer programs; Computer simulation based on computer programs for others; Computer site design; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design, computer programming, and maintenance of computer software; Computer systems analysis; Computer technology consultancy; Computer technology consultancy in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Consultancy in the design and development of computer hardware; Consultation about the maintenance and updating of computer software; Consulting in the field of configuration management for computer hardware and software; Consulting services for others in the field of design, planning, and implementation project management of computer software testing in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Consulting services, namely, designing, creating, implementing and maintaining computer software for owners, managers and other personnel to set-up, open, operate and manage a commercial climbing facility; Application service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of healthcare, benefits programs, employee productivity, risk management; Computer services, namely, cloud hosting provider services; Computer services, namely, encrypted data recovery services; Computer services, namely, integration of private and public cloud computing environments; Customizing computer software; Data encryption and decoding services; Data encryption services; Data security consultancy; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Design and development of computer software for in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Internet security consultancy; Leasing of computer programs; Maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Providing a secure, web-based service featuring technology that enables individuals to remotely create and manage their own accounts so that whatever private content they upload now can be encrypted, then delivered to their intended recipients, at the time and in the manner requested; Providing technology information updates for home security systems via the global computer network; Providing temporary use of non-downloadable cloud-based software for cybersecurity management in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Providing temporary use of non-downloadable cloud-based software for connecting, operating, and managing networks in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance in the internet of things (IoT); Providing temporary use of on-line non-downloadable cloud computing software for cybersecurity testing in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Providing virtual computer systems and virtual computer environments through cloud computing; Recovery of computer data; Rental of computers relating to computer security and prevention of computer risks; Repair of computer software; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technological consultation in the technology field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Technological planning and consulting services in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Testing of security systems; Testing, analysis, and evaluation of cyber threats, network vulnerabilities, data privacy and regulatory compliance to assure compliance with technology industry standards; Updating and maintaining cloud-based computer software through in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Updating of computer software; Updating of computer software relating to computer security and prevention of computer risks
Computer and Scientific