88301006
Feb 14, 2019
Dec 15, 2020
Active Trademark
Downloadable computer software for detecting and protecting computer networks and software applications from hacking attacks; downloadable computer software that controls input and output to computer files by tracking log in access; downloadable computer software for assessing weaknesses and vulnerabilities in the software code and configuration of computer systems, software applications, computer networks and computer applications; downloadable computer software for monitoring user behaviors on computer network system for malicious activities; downloadable computer software for storing, managing and analyzing log files from servers, network devices and software applications; downloadable computer software for detecting and preventing threats of hacking of information systems, computer networks and software applications; downloadable computer software for managing, analyzing, and monitoring information technology (IT) infrastructure and security; downloadable computer software for managing, analyzing, and monitoring computer-based information systems and networks; computer hardware, namely, firewalls and networks security devices; downloadable computer software for computer network security; downloadable anti-piracy software; downloadable anti-spyware software; downloadable computer software for the creation of firewalls
Electrical and Scientific ApparatusSoftware as a service (SAAS) services featuring software in the fields of computer and network security; Software as a service (SAAS) services featuring computer and network security software, specifically, software for simulating computer, network, and premises security threats, data breaches, and other network and computer attacks, for the purpose of assessing security maturity and incident readiness; Software as a service (SAAS) services featuring computer and network security software, specifically, software for providing threat and vulnerability analysis, security posture and risk analysis and assessment, social engineering and security readiness training, security maturity and incident readiness training, risk triage and response training, perimeter enumeration and discovery services, data breach analysis and forensic incident response and remediation services, and scanning and penetration testing of computers and networks to assess information security vulnerability
Computer and Scientific