TRANSFORMING CYBERSECURITY THROUGH COLLECTIVE DEFENSE
Mark Identification

TRANSFORMING CYBERSECURITY THROUGH COLLECTIVE DEFENSE

Serial Number

90604971

Filing Date

Mar 26, 2021

Trademark by

IRONNET CYBERSECURITY INC.

Classification Information

Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; computer software, downloadable computer software, mobile device software for assessing the status of enterprise data, infrastructure, and network traffic, and for identifying and assessing threats to the enterprise data, infrastructure, and network traffic, all for use in cybersecurity consulting, assessments, and training; computer software, downloadable computer software, mobile device software for simulating threats, and possible responses to those threats, to the security of enterprise data, infrastructure and networks, for use in cybersecurity consulting, assessments, and training

Electrical and Scientific Apparatus

Cybersecurity training services

Education and Entertainment

Providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks, all in the field of cybersecurity

Computer and Scientific

Remote security monitoring services in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing; providing cybersecurity consulting and threat assessments

Personal