88943563
Jun 2, 2020
Sep 13, 2022
Active Trademark
Downloadable computer software for identifying and evaluating cyber security and information security risks, and monitoring and protecting computer networks; downloadable software which allows users to identify information and cyber vulnerability; downloadable software for use with secure network and internet operations enabling users to review, manage, test, and analyze website security vulnerability, cyber vulnerability, cyber security analysis, and cyber security reporting; downloadable software which allows users to receive security analysis and reports; downloadable computer security software; downloadable software for computer security, security compliance reporting, security intelligence and log management; downloadable cyber security computer software to protect computer networks against unauthorized intrusion, data theft, compromise, infiltration and corruption by hackers, and other risks related to computer security; downloadable software for assessing cyber security threats in information technology infrastructure and computer network systems
Electrical and Scientific ApparatusProviding temporary use of non-downloadable computer software for identifying and evaluating cyber security and information security risks, and monitoring and protecting computer networks; providing temporary use of non-downloadable software which allows users to identify information and website security vulnerability and cyber vulnerability; providing temporary use of non-downloadable software for use with secure network and internet operations enabling users to review, manage, and analyze website security vulnerability, cyber vulnerability, cyber security analysis, and cyber security reporting; providing temporary use of non-downloadable software which allows users to receive security analysis and reports; providing temporary use of non-downloadable computer security software; providing temporary use of non-downloadable software for computer security, security compliance reporting, security intelligence and log management; providing temporary use of non-downloadable cyber security computer software to protect computer networks against unauthorized intrusion, data theft, compromise, infiltration and corruption by hackers, and other risks related to computer security; providing temporary use of non-downloadable software for assessing cyber security threats in information technology infrastructure and computer network systems; providing temporary use of non-downloadable
Computer and Scientific