88667802
Oct 24, 2019
Nov 24, 2020
Active Trademark
Educational services, namely, conducting conferences, seminars, tutorials, classes, workshops, and training in the fields of information security, cybersecurity, data and privacy, technology, and software; Technical training in the fields of computer forensics and counter-intrusion; technical training in the use and operation of computer networks; technical training in the field of computer network security
Education and EntertainmentComputer security consultancy in the field of cybersecurity; computer security consultancy in the field of security incident and breach response and remediation; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer forensic services in the field of cybersecurity; Computer security consultancy in the field of Intrusion Detection; consultancy in the field of computer security software; computer security threat analysis; Support in the field of computer network security, namely, monitoring technological functions of computer network systems for detecting unauthorized use of network data; monitoring of computer networks for security purposes, namely, restricting unauthorized access to computer networks; computer security services, namely, protecting data and information in computer networks from unauthorized access; Computer security services, namely, security information and event management (SIEM) in the nature of monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior; Managed computer security services, namely, malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time
Computer and Scientific