87816199
Mar 1, 2018
Nov 13, 2018
Active Trademark
Providing computer security and compliance services, namely, helping organizations detect, identify and respond to threats, incidents and vulnerabilities across information technology assets, namely, network and security devices, servers, work stations, laptops, applications, cloud applications, cloud infrastructure, and virtual infrastructure, to mitigate risks, remediate potential weak links and security incidents, remediate and enforce policy violations and enable compliance; Computer software development related to SaaS (Software as a Service), SOC (Security Operations Center) as a Service, Security Operations and Analytics Platform and Security as a Service technologies to detect, analyze, hunt, respond to and remediate cyber attacks and compliance violations, provide incidence response, incidence detection, threat hunting, security awareness training, compliance management and reporting and related cyber security services; Software as a service (SAAS) services featuring software used to detect, analyze, hunt, respond to and remediate cyber attacks and compliance violations, provide incidence response, incidence detection, threat hunting, security awareness training, compliance management and reporting and related cyber security services; Security Operations and Analytics Platform as a service featuring software used to detect, analyze, hunt, respond to and remediate cyber attacks and compliance violations, provide incidence response, incidence detection, threat hunting, security awareness training, compliance management and reporting and related cyber security services; Security as a Service, namely, outsource service provider in the field of information technology consulting related to detect, analyze, hunt, respond to and remediate cyber attacks and compliance violations, provide incidence response, incidence detection, threat hunting, security awareness training, compliance management and reporting and related cyber security services; Security as a Service and computer security services in the nature of 24x7x365 monitoring, implementation of computer security technology to protect information assets against cyber attacks, unauthorized access, and detect and respond to cyber attacks; Security as a Service and computer security services in the nature of 24x7x365, around the clock monitoring of information technology assets, namely, network and security devices, servers, work stations, laptops, applications, cloud applications, cloud infrastructure, and virtual infrastructure, for computer security purposes by providing computer security administration and prevention management services for protection against cyberattacks, data protection, intellectual property theft, unauthorized access and compliance violations
Computer and Scientific