ZT4OT
Mark Identification

ZT4OT

Serial Number

97545174

Filing Date

Aug 11, 2022

Trademark by

ABSG CONSULTING INC.

Classification Information

Promoting the use of the security assurance best practices of others in the field of cloud computing; Business data analysis; Analyzing and compiling business data; Systemization of data into computer databases

Advertising and Business

Technical consulting in the field of cybersecurity risk management training

Education and Entertainment

Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer programming consultancy in the field of cybersecurity; Computer network security consultancy; Telecommunication network security consultancy; Internet security consultancy; Data security consultancy; Computer security consultancy; Testing of security systems; Computer security services, namely, restricting unauthorized network access by users without credentials; Computer security threat analysis for protecting data; Computer security services, namely, enforcing, restricting, and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; Development of security systems and contingency planning for information systems; Computer security services in the nature of administering digital keys; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Professional computer services, namely, network analysis, LAN/WAN design, wireless engineering, virtualization and computer project management; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Design and development of electronic data security systems; Computer security services, namely, restricting unauthorized access to computer networks; Data automation and collection service using proprietary software to evaluate, analyze, and collect service data; Data conversion of computer programs and data, not physical conversion; Recovery of computer data; Data conversion of electronic information; Implementation of Zero Trust architecture to Operational Technology networks; Development of Zero Trust Architecture Designs in Industrial Control Systems and Operational Technology Environments

Computer and Scientific