90716040
May 17, 2021
Dec 6, 2022
Active Trademark
Downloadable anti-spyware software; downloadable computer network security, system security, application security, file security, and data security software for collecting, aggregating, indexing, and analyzing security data, and detecting intrusions, threats, and behavioral anomalies; downloadable computer security software for detecting changes, indicators of compromise, and threats against the integrity of software and cloud based virtual computer network systems and computer network systems; downloadable computer security software for providing computer network security compliance monitoring and configuration control; downloadable cybersecurity software for controlling and monitoring computer network system configurations, monitoring network user identification and security vulnerabilities, detecting security attacks and breaches, automating computer network security processes, integrating computer network security requirements with operational software, identifying compromised servers, monitoring servers for security compliance, generating security reports, auditing system changes and anomalies for security risk, monitoring compliance with government regulations, computer network security initiatives and standards, tracking security risk factors due to computer network system configuration changes, and communication software utilizing encrypted communications; multi-platform, downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral based predictive execution modeling
Electrical and Scientific ApparatusCloud computing featuring software for use in the field of computer and network security for collecting, aggregating, indexing, and analyzing security data, and detecting intrusions, threats, and behavioral anomalies; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; customizing computer software; implementing computer security plans for others for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the technical security breach objectives of computer system attackers; software as a service (saas) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; technical support services, namely, troubleshooting of computer security software problems and technical consulting services for all of the above services; providing temporary use of non-downloadable computer software for anti-spyware software; providing temporary use of non-downloadable computer software for computer network security, system security, application security, file security, and data security for collecting, aggregating, indexing, and analyzing security data, and detecting intrusions, threats, and behavioral anomalies; providing temporary use of non-downloadable computer software for computer security software for detecting changes, indicators of compromise, and threats against the integrity of software and cloud based virtual computer network systems and computer network systems; providing temporary use of non-downloadable computer software for computer security software for providing computer network security compliance monitoring and configuration control; providing temporary use of non-downloadable computer cybersecurity software for controlling and monitoring computer network system configurations, monitoring network user identification and security vulnerabilities, detecting security attacks and breaches, automating computer network security processes, integrating computer network security requirements with operational software, identifying compromised servers, monitoring servers for security compliance, generating security reports, auditing system changes and anomalies for security risk, monitoring compliance with government regulations, computer network security initiatives and standards, tracking security risk factors due to computer network system configuration changes, and communication software utilizing encrypted communications
Computer and Scientific