VIRTUAL PERIMETER ON DEMAND
Mark Identification

VIRTUAL PERIMETER ON DEMAND

Serial Number

86823187

Filing Date

Nov 17, 2015

Trademark by

CLOUDPASSAGE INC.

Classification Information

computer security software; computer gateway software for providing security for enterprise cloud services; computer software for managing and monitoring the internal and external vulnerability of cloud computer networks and cloud computer servers; computer software that provides firewall and gateway protection; computer software that allows users to build, deploy, visualize and manage host-based firewall policies across Infrastructure-as-a-Service (IaaS) cloud environments

Electrical and Scientific Apparatus

computer services, namely, ensuring computer security by restricting network access to computers, controlling computer operating system and application security configuration parameters, monitoring and managing access rights and privileges to computers, and monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; cloud computing services, namely, providing software as a service (SaaS) services, namely, hosting software for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments, and infrastructure-as-a-service (IaaS) services, namely, hosting one or more virtual computers for use by others for providing security for cloud computer services, namely, security for public, private and hybrid cloud servers and for cloud hosting environments; computer consultation in the field of cloud computer security; analysis of computer network traffic; establishing computer network communications baselines for the purpose of detecting anomalies and unauthorized changes; computer services, namely, analysis of computer network traffic associated with malicious or fraudulent activity

Computer and Scientific

Monitoring of computer systems for security purposes, namely, detection of anomalous system activity and third-party user behaviors based on computer network traffic

Personal