90701509
May 10, 2021
May 24, 2022
Active Trademark
Providing temporary use of on-line integrated non-downloadable proprietary software used to automate and collect data for the purposes of providing consulting, analysis, assessment, monitoring, and advisory services in the field of cybersecurity with respect to searching and monitoring the deep web, dark net, online channels, and custom sources to identify and respond to instances of stolen or misappropriated information, data, documents, business intelligence, and assets; Providing temporary use of on-line integrated nondownloadable proprietary software used to automate and collect data for the purposes of providing computer and cybersecurity services, namely, searching and monitoring the deep web, dark net, online channels, and custom sources to identify and respond to instances of fraud, impersonation, unscrupulous competition, third party data breaches, and planned cyber and digital breaches and attacks; Providing temporary use of on-line integrated non-downloadable proprietary software used to automate and collect data for the purposes of providing cybersecurity consulting, analysis, assessment, and monitoring services in the field of searching and monitoring the deep web, dark net, Internet sources, online channels, open source platforms, URLS and domain names, social media, and custom sources to identify and respond to stolen and misappropriated information, data, credentials, and assets of third-party entities; Providing temporary use of on-line integrated nondownloadable proprietary software used to automate and collect data for the purposes of providing consulting, analysis, assessment, monitoring, and advisory services in the field of cybersecurity with respect to supply chain and business partner relationships and interconnected technological systems; Technology consultation in the field of cybersecurity, cybersecurity services in the nature of restricting unauthorized access to computer systems, computer security consultancy, computer security threat analysis for protecting data, and computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, all to identify digital and technological risks arising from supply chain and business partner relationships and interconnected technological systems; Providing temporary use of on-line integrated non-downloadable proprietary software used to automate and collect data for the purposes of providing cybersecurity and computer security consulting, analysis, assessment, monitoring, and advisory services in the field of brand protection; Technology consultation in the field of cybersecurity, cybersecurity services in the nature of restricting unauthorized access to computer systems, computer security consultancy, computer security threat analysis for protecting data, and computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, all to identify and respond to instances of brand attacks and brand misappropriation; Providing temporary use of on-line integrated nondownloadable proprietary software used to automate and collect data for the purposes of providing cybersecurity and computer security consulting, assessment, analysis, and advisory services in the field of personnel, employee and executive protection; Technology consultation in the field of cybersecurity, cybersecurity services in the nature of restricting unauthorized access to computer systems, computer security consultancy, computer security threat analysis for protecting data, and computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, all to identify and respond to instances of physical threats and risks to personnel, employees, executives, and public officials; Providing temporary use of on-line integrated nondownloadable proprietary software used to automate and collect data for the purposes of providing cybersecurity consulting, analysis, assessment, and monitoring services in the field of searching and monitoring the deep web, dark net, Internet sources, online channels, open source platforms, URLS and domain names, social media, and custom sources for the purposes of attacker attribution and research
Computer and Scientific