DIGICERT, INC.
107 Marks
Corp.
First Filed:Apr 22, 1997Latest Filed:Jan 30, 2026Address:2801 North Thanksgiving Way, Lehi, UT 84043
Portfolio Overview
Registered
19(18%)Pending
12(11%)Dead
76(71%)Previous
21Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 42
Software, IT Services & Scientific ResearchClass 45
Personal servicesTTAB Proceedings
Total Proceedings
19As Plaintiff
19(100%)As Defendant
0(0%)Top Firms
SNELL & WILMER L.L.P.(Oct 2025)
85
BUCHANAN INGERSOLL & ROONEY ...(Oct 2019)
3
BEYER LAW GROUP LLP(Jul 2014)
3
Laurie A. Miller(Feb 2012)
2
Sheppard Mullin Richter & Ha...(Feb 2012)
2
Trademark Activity Timeline(1997 – 2026)
- Filings
- Registrations
Trademark Portfolio
128 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
107
21
Status
40
12
31
45
0
Mark Type
111
4
6
7
0
72
4
1
18
1
Goods & Services
Class 009: Downloadable computer software for integrating managed security services, namely public key infrastructure services, issuing digital certificates, verification, management and integration of enterprise software, with existing networks, communications software and services; Downloadable computer software for authentication and identity management information security; Downloadable computer software for ensuring the security of online data and systems; Downloadable computer software for use in monitoring computers for security purposes; Computer hardware and equipment for security systems and public key infrastructure; Downloadable software for collecting public key certificates; Class 035: Business audits in the field of internet security, business information, compilation of information in computer databases; Business consulting and information services relating to data security and monitoring in the fields of authentication, privacy, and confidentiality of data on a computer website; Business management and consulting services for the data security and information technology industry; Business administration and management relating to digital certificates; Data processing services related to data archiving and data collection, systematization, and information handling for third parties in the field of electronic signatures and time stamping, particularly in connection with the issuance and revocation of certificates, electronic notarization, and electronic transactions (office work); Class 042: Software as a service (saas) namely software that provides management of public and private trust within an organization, with centralized visibility and control over digital certificate lifecycles, software for extension of trust through ecosystems, across device lifecycles, software supply chains, and consortiums, digital trust software, including for providing authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; Software as a service (saas) namely software for digital trust to integrate managed security services including public key infrastructure (pki) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services, software for identity security, software for authentication and identity management information security; Software as a service (saas) namely software for authorizing access to databases, software to ensure the security of online data and systems, software for encryption to ensure the security of an individual or organization's identity, software for use in monitoring computers for security purposes, discovery software that inspects and inventories the cryptographic assets in a company’s environment; Software as a service (saas) namely vulnerability assessment software to provide security ratings and identify out-of-date algorithms, automation software; Computer services, namely, on-line scanning and detecting of malware on websites; Providing information concerning encryption of electronic data for website and e-commerce transaction security; Computer security services namely, services to protect users, software, servers, devices, digital content, documents, digital rights and identity; Digital authentication and trust services for computer codes and digital documents; Maintenance of computer software relating to computer security and prevention of computer risks; Provision of computer securit; Class 045: Providing information concerning authentication of user identification data for e-commerce transaction security; Providing authentication, issuance, validation and revocation of digital certificates in relation to computer security services; Providing user authentication services in e-commerce transactions; Domain name system usage and efficiency monitoring and reporting services; Consultation in relation to data protection compliance; Provision of information and consulting services related to online security
Goods & Services
Class 009: Software that provides management of public and private trust within an organization, with centralized visibility and control over digital certificate lifecycles; software for extension of trust through ecosystems, across device lifecycles, software supply chains, and consortiums; digital trust software, including for providing authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; software for digital trust to integrate managed security services including public key infrastructure services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; software for identity security; software for authentication and identity management information security; software for authorizing access to databases; software to ensure the security of online data and systems; software for encryption to ensure the security of an individual or organization's identity; software for use in monitoring computers for security purposes; downloadable electronic publications in the nature of manuals, white papers, articles, and technical documentation manuals in the fields of digital trust, computer hardware and software, digital telecommunications, consumer electronics, and information technologies; discovery software that inspects and inventories the cryptographic assets in a company’s environment; vulnerability assessment software to provide security ratings and identify out-of-date algorithms; automation software; downloadable computer software for use in connecting to the Internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; downloadable computer software for the directing and managing of internet traffic; downloadable computer software for use in a wide range of transactions and telecommunications over the global computer information network; downloadable software for internet directory services, namely, recursive DNS services; downloadable software for threat detection, mitigation and resolution services; downloadable software for bot management, mitigation, protection and guarding; downloadable software for business information services, data analytics, databases and information for business; and instructional books and manuals sold therewith in electronic format; Class 038: Electronic transmission of information regarding digital trust; electronic transmission of information regarding authentication of personal identification information; providing multiple user access to a wide area network as part of the global computer network for the transfer and dissemination of a variety of information and data; secure cross network communication services; internet infrastructure services; communication services, namely, directing and managing of internet traffic; Internet routing system services; Class 042: Software as a service (SAAS); software as a service (SAAS) including software that provides management of public and private trust within an organization, with centralized visibility and control over digital certificate lifecycles, software for extension of trust through ecosystems, across device lifecycles, software supply chains, and consortiums, digital trust software, including for providing authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; software as a service (SAAS) including software for digital trust to integrate managed security services including public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services, software for identity security, software for authentication and identity management information security; software as a service (SAAS) including software for authorizing access to databases, software to ensure the security of online data and systems, software for encryption to ensure the security of an individual or organization's identity, software for use in monitoring computers for security purposes, discovery software that inspects and inventories the cryptographic assets in a company’s environment; software as a service (SAAS) including vulnerability assessment software to provide security ratings and identify out-of-date algorithms, automation software; providing digital trust services, including providing authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; providing public key infrastructure administration, identity and access management, and information and product security services; research and participation in industry and technology standards that define what constitutes digital trust; services for securing users, software, servers, devices, digital content, documents, digital rights, and identity; encryption and decryption of data and communications; Providing technical customer support services; Provision of security services for computer networks, computer access and computerised transactions, namely, managed public key infrastructure services; computer security services in the nature of providing digital trust services for others via a global computer network; monitoring of computer systems and networks for security purposes; Consultancy relating to computer security; security consulting about creating and implementing procedures and practices for digital trust; digital trust and authentication services for computer code and digital documents; certification [quality control]; authentication services; automation services for digital trust and installation and management of digital certificates; computer security services in the nature of providing digital trust services, including authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; Technical consultancy services relating to information technology; consultancy on internet and data security, namely, the issuance and management of digital certificates; consultation and technical consultation in the field of global computer information network connectivity and telecommunication hardware and software; server hosting and administration services that make DNS queries faster and more secure for faster and more private browsing of the internet; providing non-downloadable computer software for use in connecting to the Internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing non-downloadable computer software for the directing and managing of internet traffic; providing non-downloadable computer software for use in a wide range of transactions and telecommunications over the global computer information network; providing non-downloadable software for internet directory services, namely, recursive DNS services; providing non-downloadable software for threat detection, mitigation and resolution services; providing non-downloadable software for bot management, mitigation, protection and guarding; providing non-downloadable software for business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; data automation and collection services using proprietary software to evaluate, analyze and collect data; consultation and technical consultation in the field of internet routing system services, DNS resolver services and global DNS resolution services, and related hardware and software; domain name system management; namely domain name system infrastructure services, provision of IT services, resolution of domain name system requests; Class 045: Domain name system usage and efficiency monitoring and reporting services; Consultation in relation to data protection compliance; reviewing standards and practices to assure compliance with laws and regulations
Goods & Services
Class 009: Software that provides management of public and private trust within an organization, with centralized visibility and control over digital certificate lifecycles; software for extension of trust through ecosystems, across device lifecycles, software supply chains, and consortiums; digital trust software, including for providing authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; software for digital trust to integrate managed security services including public key infrastructure services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; software for identity security; software for authentication and identity management information security; software for authorizing access to databases; software to ensure the security of online data and systems; software for encryption to ensure the security of an individual or organization's identity; software for use in monitoring computers for security purposes; downloadable electronic publications in the nature of manuals, white papers, articles, and technical documentation manuals in the fields of digital trust, computer hardware and software, digital telecommunications, consumer electronics, and information technologies; discovery software that inspects and inventories the cryptographic assets in a company’s environment; vulnerability assessment software to provide security ratings and identify out-of-date algorithms; automation software; downloadable computer software for use in connecting to the Internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; downloadable computer software for the directing and managing of internet traffic; downloadable computer software for use in a wide range of transactions and telecommunications over the global computer information network; downloadable software for internet directory services, namely, recursive DNS services; downloadable software for threat detection, mitigation and resolution services; downloadable software for bot management, mitigation, protection and guarding; downloadable software for business information services, data analytics, databases and information for business; and instructional books and manuals sold therewith in electronic format; Class 038: Electronic transmission of information regarding digital trust; electronic transmission of information regarding authentication of personal identification information; providing multiple user access to a wide area network as part of the global computer network for the transfer and dissemination of a variety of information and data; secure cross network communication services; internet infrastructure services; communication services, namely, directing and managing of internet traffic; Internet routing system services; Class 042: Software as a service (SAAS); software as a service (SAAS) including software that provides management of public and private trust within an organization, with centralized visibility and control over digital certificate lifecycles, software for extension of trust through ecosystems, across device lifecycles, software supply chains, and consortiums, digital trust software, including for providing authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; software as a service (SAAS) including software for digital trust to integrate managed security services including public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services, software for identity security, software for authentication and identity management information security; software as a service (SAAS) including software for authorizing access to databases, software to ensure the security of online data and systems, software for encryption to ensure the security of an individual or organization's identity, software for use in monitoring computers for security purposes, discovery software that inspects and inventories the cryptographic assets in a company’s environment; software as a service (SAAS) including vulnerability assessment software to provide security ratings and identify out-of-date algorithms, automation software; providing digital trust services, including providing authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; providing public key infrastructure administration, identity and access management, and information and product security services; research and participation in industry and technology standards that define what constitutes digital trust; services for securing users, software, servers, devices, digital content, documents, digital rights, and identity; encryption and decryption of data and communications; Providing technical customer support services; Provision of security services for computer networks, computer access and computerised transactions, namely, managed public key infrastructure services; computer security services in the nature of providing digital trust services for others via a global computer network; monitoring of computer systems and networks for security purposes; Consultancy relating to computer security; security consulting about creating and implementing procedures and practices for digital trust; digital trust and authentication services for computer code and digital documents; certification [quality control]; authentication services; automation services for digital trust and installation and management of digital certificates; computer security services in the nature of providing digital trust services, including authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; Technical consultancy services relating to information technology; consultancy on internet and data security, namely, the issuance and management of digital certificates; consultation and technical consultation in the field of global computer information network connectivity and telecommunication hardware and software; server hosting and administration services that make DNS queries faster and more secure for faster and more private browsing of the internet; providing non-downloadable computer software for use in connecting to the Internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing non-downloadable computer software for the directing and managing of internet traffic; providing non-downloadable computer software for use in a wide range of transactions and telecommunications over the global computer information network; providing non-downloadable software for internet directory services, namely, recursive DNS services; providing non-downloadable software for threat detection, mitigation and resolution services; providing non-downloadable software for bot management, mitigation, protection and guarding; providing non-downloadable software for business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; data automation and collection services using proprietary software to evaluate, analyze and collect data; consultation and technical consultation in the field of internet routing system services, DNS resolver services and global DNS resolution services, and related hardware and software; domain name system management; namely domain name system infrastructure services, provision of IT services, resolution of domain name system requests; Class 045: Domain name system usage and efficiency monitoring and reporting services; Consultation in relation to data protection compliance; reviewing standards and practices to assure compliance with laws and regulations
Goods & Services
Class 009: Software that provides management of public and private trust within an organization, with centralized visibility and control over digital certificate lifecycles; software for extension of trust through ecosystems, across device lifecycles, software supply chains, and consortiums; digital trust software, including for providing authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; software for digital trust to integrate managed security services including public key infrastructure services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; software for identity security; software for authentication and identity management information security; software for authorizing access to databases; software to ensure the security of online data and systems; software for encryption to ensure the security of an individual or organization's identity; software for use in monitoring computers for security purposes; downloadable electronic publications in the nature of manuals, white papers, articles, and technical documentation manuals in the fields of digital trust, computer hardware and software, digital telecommunications, consumer electronics, and information technologies; discovery software that inspects and inventories the cryptographic assets in a company’s environment; vulnerability assessment software to provide security ratings and identify out-of-date algorithms; automation software; downloadable computer software for use in connecting to the Internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; downloadable computer software for the directing and managing of internet traffic; downloadable computer software for use in a wide range of transactions and telecommunications over the global computer information network; downloadable software for internet directory services, namely, recursive DNS services; downloadable software for threat detection, mitigation and resolution services; downloadable software for bot management, mitigation, protection and guarding; downloadable software for business information services, data analytics, databases and information for business; and instructional books and manuals sold therewith in electronic format; Class 038: Electronic transmission of information regarding digital trust; electronic transmission of information regarding authentication of personal identification information; providing multiple user access to a wide area network as part of the global computer network for the transfer and dissemination of a variety of information and data; secure cross network communication services; internet infrastructure services; communication services, namely, directing and managing of internet traffic; Internet routing system services; Class 042: Software as a service (SAAS); software as a service (SAAS) including software that provides management of public and private trust within an organization, with centralized visibility and control over digital certificate lifecycles, software for extension of trust through ecosystems, across device lifecycles, software supply chains, and consortiums, digital trust software, including for providing authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; software as a service (SAAS) including software for digital trust to integrate managed security services including public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services, software for identity security, software for authentication and identity management information security; software as a service (SAAS) including software for authorizing access to databases, software to ensure the security of online data and systems, software for encryption to ensure the security of an individual or organization's identity, software for use in monitoring computers for security purposes, discovery software that inspects and inventories the cryptographic assets in a company’s environment; software as a service (SAAS) including vulnerability assessment software to provide security ratings and identify out-of-date algorithms, automation software; providing digital trust services, including providing authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; providing public key infrastructure administration, identity and access management, and information and product security services; research and participation in industry and technology standards that define what constitutes digital trust; services for securing users, software, servers, devices, digital content, documents, digital rights, and identity; encryption and decryption of data and communications; Providing technical customer support services; Provision of security services for computer networks, computer access and computerised transactions, namely, managed public key infrastructure services; computer security services in the nature of providing digital trust services for others via a global computer network; monitoring of computer systems and networks for security purposes; Consultancy relating to computer security; security consulting about creating and implementing procedures and practices for digital trust; digital trust and authentication services for computer code and digital documents; certification [quality control]; authentication services; automation services for digital trust and installation and management of digital certificates; computer security services in the nature of providing digital trust services, including authentication, issuance, validation, revocation, discovery, automation, and management of digital certificates; Technical consultancy services relating to information technology; consultancy on internet and data security, namely, the issuance and management of digital certificates; consultation and technical consultation in the field of global computer information network connectivity and telecommunication hardware and software; server hosting and administration services that make DNS queries faster and more secure for faster and more private browsing of the internet; providing non-downloadable computer software for use in connecting to the Internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing non-downloadable computer software for the directing and managing of internet traffic; providing non-downloadable computer software for use in a wide range of transactions and telecommunications over the global computer information network; providing non-downloadable software for internet directory services, namely, recursive DNS services; providing non-downloadable software for threat detection, mitigation and resolution services; providing non-downloadable software for bot management, mitigation, protection and guarding; providing non-downloadable software for business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; data automation and collection services using proprietary software to evaluate, analyze and collect data; consultation and technical consultation in the field of internet routing system services, DNS resolver services and global DNS resolution services, and related hardware and software; domain name system management; namely domain name system infrastructure services, provision of IT services, resolution of domain name system requests; Class 045: Domain name system usage and efficiency monitoring and reporting services; Consultation in relation to data protection compliance; reviewing standards and practices to assure compliance with laws and regulations
Goods & Services
Downloadable computer software for use in connecting to the Internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; downloadable computer software for the directing and managing of internet traffic; downloadable computer software for initiating a wide range of IP protocol transactions and telecommunications over the global computer information network; downloadable software for accessing internet directory services, namely, recursive domain name system (DNS) services; downloadable software for threat detection, mitigation and resolution; downloadable software for bot management, mitigation, protection and guarding; downloadable software for accessing business information services, data analytics, databases and information for business; and printed and downloadable instructional books and manuals sold with all of the foregoing as a unit; Providing multiple user access to a wide area network as part of the global computer network for the transfer and dissemination of a variety of information and data; secure cross network communication services, namely, transmission of electronic communications between computer networks; internet infrastructure services, namely, internet service provider services; Internet routing system services being internet service provider services; Domain name system usage and efficiency monitoring and reporting services, namely, domain name monitoring services; Technological consultation in the field of global computer information network connectivity and telecommunication hardware and software; domain name server (DNS) resolver services in the nature of providing temporary use of online non-downloadable software that makes domain name system (DNS) queries faster and more secure for faster and more private browsing of the internet; global domain name system (DNS) resolution services, namely, providing a website featuring technology that resolves domain name and IP address disputes as an alternative to domain name system (DNS) providers; providing online non-downloadable computer software for use in connecting to the Internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing online non-downloadable computer software for the directing and managing of internet traffic; providing online non-downloadable computer software for initiating a wide range of IP protocol transactions and telecommunications over the global computer information network; providing online non-downloadable software for accessing internet directory services, namely, recursive domain name system (DNS) services; non-downloadable software for threat detection, mitigation and resolution services; providing online non-downloadable software for bot management, mitigation, protection and guarding; providing online non-downloadable software for accessing business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; data automation and collection services using proprietary software to evaluate, analyze and collect data; technological consultation in the field of internet routing system services, domain name system (DNS) resolver services and global domain name system (DNS) resolution services, and related hardware and software; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control of the web sites of others
Goods & Services
Business data analysis in the fields of security for web-based applications and APIs and protection against malicious bots and/or fraudulent activity and regulatory compliance; analyzing for business purposes end users' threat intelligence data to assess, analyze and make inferences regarding their internet traffic and to make determinations as to how such traffic should be handled; Providing online, non-downloadable computer software in the fields of web-based applications and APIs and protection against malicious bots and/or fraudulent activity and regulatory compliance for safeguarding digital infrastructures and online presences and for protecting computer networks and applications against risks and downtime; computer network security management, namely, restricting unauthorized access to computer networks; bot management, namely, computer network security consultancy in the field of managing bots; computer security threat analysis for protecting data by using end users' threat analysis data to assess, analyze and make inferences regarding their internet traffic and to make determinations as to how such traffic should be handled; computer security threat analysis for protecting data in the fields of security for web-based applications and APIs and protection against malicious bots and/or fraudulent activity and regulatory compliance; data automation and collection service using proprietary software to evaluate, analyze and collect service data in the fields of security for web-based applications and APIs and protection against malicious bots and/or fraudulent activity and regulatory compliance; providing online non-downloadable software for compiling and organizing statistical analysis of business functions in the fields of security for web-based applications and APIs and protection against malicious bots and/or fraudulent activity and regulatory compliance; providing online non-downloadable software which utilizes end users' threat intelligence data to assess and make inferences regarding their internet traffic and to make determinations as to how such traffic should be handled; network security and threat detection, mitigation and resolution services, namely, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic for network security and threat detection, mitigation, and resolution; electronic monitoring and reporting of servers, computer networks, computer network systems, computer network data, computer network information, electronic data packets, and internet protocol traffic using computers for security purposes including providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use of non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats in the fields of security for web-based applications and APIs and protection against malicious bots and/or fraudulent activity and regulatory compliance; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; application programming interface (API) software for security and threat detection, mitigation and resolution, namely, web application firewall (WAF) software that cleans, scrubs and filters malicious attacks against website software applications and application programming interfaces (APIs); technology consultation in the field of cybersecurity featuring the electronic monitoring of website software applications and application programming interfaces (APIs) for cybersecurity purposes including the provision of related reports featuring about suspicious and abnormal patterns, anomalies and activities; rental of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and application programming interfaces (APIs); computer security services, namely, providing temporary use of online non-downloadable software for use in restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and application programming interfaces (APIs), mitigating against and defending attacks against website software applications and APIs and implementing countermeasures to limit exposure from such attacks and protect a website's uptime; computer security services, namely, restricting unauthorized computer network access by blocking unwanted and inappropriate internet and computer network traffic, by mitigating against and defending computer networks and websites from distributed denial of service (DDoS) attacks and by implementing countermeasures to limit exposure from such attacks and protect a website's uptime; providing online non-downloadable software for use in providing bot management and mitigation, and for protecting and guarding against network security threats
Goods & Services
Providing online non-downloadable software for compiling and organizing statistical analysis of business functions; providing temporary use on non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats
Goods & Services
Business data analysis; analyzing for business purposes end users' threat intelligence data to assess, analyze and make inferences regarding their internet traffic and to make determinations as to how such traffic should be handled; Providing online, non-downloadable computer software for safeguarding digital infrastructures and online presences and for protecting computer networks and applications against risks and downtime; providing domain name system (DNS) management services, namely, provision of authoritative and recursive DNS services; computer network security management, namely, restricting unauthorized access to computer networks; distributed denial of service (DDoS) attack management, namely, computer network security consultancy in the field of managing DDoS attacks; web application firewall (WAF) management, namely, computer network security consultancy in the field of managing web application firewalls; bot management, namely, computer network security consultancy in the field of managing bots; computer security threat analysis for protecting data by using end users' threat analysis data to assess, analyze and make inferences regarding their internet traffic and to make determinations as to how such traffic should be handled; computer security threat analysis for protecting data; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing online non-downloadable software for compiling and organizing statistical analysis of business functions; providing online non-downloadable software which utilizes end users' threat intelligence data to assess and make inferences regarding their internet traffic and to make determinations as to how such traffic should be handled; network security and threat detection, mitigation and resolution services, namely, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic for network security and threat detection, mitigation, and resolution; electronic monitoring and reporting of servers, computer networks, computer network systems, computer network data, computer network information, electronic data packets, and internet protocol traffic using computers for security purposes including providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use of non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats; providing temporary use of online non-downloadable software for use in blocking unwanted and inappropriate internet and network traffic, for mitigating against and defending computer networks and websites from distributed denial of service (DDoS) attacks, and for implementing of countermeasures to limit exposure from such attacks and protect a website's uptime; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; computer security threat analysis for protecting data in the field of protecting online businesses from the effects of domain name system (DNS)-based distributed denial of service (DDoS) attacks and other threats; providing temporary use of online non-downloadable website software applications for providing application service provider featuring application programming interface (API) software for security and threat detection, mitigation and resolution services, namely, a web application firewall (WAF) software that cleans, scrubs and filters malicious attacks against website software applications and application programming interfaces (APIs); technology consultation in the field of cybersecurity featuring the electronic monitoring of website software applications and application programming interfaces (APIs) for cybersecurity purposes including the provision of related reports about suspicious and abnormal patterns, anomalies and activities; rental of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and application programming interfaces (APIs); computer security services, namely, providing temporary use of online non-downloadable software for use in restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and application programming interfaces (APIs), mitigating against and defending attacks against website software applications and APIs and implementing countermeasures to limit exposure from such attacks and protect a website's uptime; DNS resolver services that make DNS queries faster and more secure for faster and more private browsing of the internet, namely, providing temporary use of online non-downloadable computer software for use in securing and speeding internet browsing capacity in order to make domain name system (DNS) queries faster and more secure; global DNS resolution services, namely, computer code conversion for others in the field of global domain name system (DNS) resolution; providing temporary use of non-downloadable software for use in providing an internet directory comprising a recursive domain name system server (DNS) service; computer security services, namely, restricting unauthorized computer network access by blocking unwanted and inappropriate internet and computer network traffic, by mitigating against and defending computer networks and websites from distributed denial of service (DDoS) attacks and by implementing countermeasures to limit exposure from such attacks and protect a website's uptime; providing online non-downloadable software for use in providing bot management and mitigation and for protecting and guarding against network security threats
Goods & Services
Arranging, conducting and providing conferences, seminars, workshops, non-downloadable webinars, and providing online non-downloadable audiovisual and multimedia content in the field of digital trust; Downloadable webinars in the field of digital trust; Audiovisual content, namely, visual and audio recordings featuring digital trust; "TRUST SUMMIT"
Goods & Services
Computer hardware and downloadable software for use in assessing, analyzing and making inferences with respect to detecting, mitigating and resolving internet traffic threats, assessing intelligence data, and analyzing and making inferences regarding end user's internet traffic to determine how such traffic should be handled; downloadable software for use in providing statistical analysis of business functions; downloadable software for providing demographic information and data concerning the geographic location of internet access devices used by consumers, the geographic locations of consumers, the connection speed and method by which consumers are accessing the internet, and the specific types of devices used by consumers to access the internet; downloadable software for providing access to and creating databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; downloadable software for providing access to technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; downloadable software for providing (IP) address verification services; downloadable software for providing access to and creating databases featuring the location, internet service provider and organization associated with specific internet addresses; downloadable software for providing identification of website visitor geographical location by using IP addresses; downloadable software for providing identification of the location and other characteristics of internet users for a wide range of applications including content personalization, fraud detection, ad targeting, traffic analysis, compliance, geo-targeting, geofencing and digital rights management; downloadable software for providing internet directory services, namely, recursive domain name server (DNS) services; downloadable software for identification and tracking of IP addresses and ranking or scoring them according to their reputation; downloadable software for use in detecting, mitigating and resolving internet traffic threats and for use in providing intelligence data to assess, analyze and make inferences regarding an end user's internet traffic, to make determinations as to how such traffic should be handled; downloadable software for use in detecting, mitigating and resolving internet traffic security threats; downloadable software for use in compiling computer security threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; Providing multiple user access to global computer information networks for the transfer and dissemination of a wide range of information; internet infrastructure services, namely, internet service provider services; Internet routing system services, being internet service provider services; Business data analysis, namely, use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled for business purposes; Providing online, non-downloadable computer software for safeguarding digital infrastructures and online presences and for protecting networks and applications against risks and downtime; providing DNS, web application, network security, DDoS, web application firewall (WAF), bot management, website monitoring and website load software testing services to others; providing online searchable databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; computer services, namely, providing an interactive web site featuring technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; internet protocol (IP) address verification services; providing online searchable databases featuring IT information in the form of the location, internet service provider and organization associated with specific internet addresses; providing an interactive website featuring technology that enables user to identify the geographical location of website visitors by IP address, for a wide range of applications including, fraud detection, compliance, geo-targeting, geo-fencing and digital rights management; computer security threat analysis for protecting data by providing using threat analysis data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; computer security threat analysis for protecting data; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing online non-downloadable software for compiling and organizing statistical analysis of business functions; providing online non-downloadable software which utilizes threat intelligence data to assess and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; network security and threat detection, mitigation and resolution services, namely, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; electronic monitoring and reporting of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic using computers for security purposes including providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use on non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats; providing temporary use of online non-downloadable software for use in preventing access to malicious websites and online threats; providing temporary use of online non-downloadable software for use in blocking unwanted and inappropriate internet and network traffic, for mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; computer security services, namely, a providing temporary use of non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing temporary use of cloud-based computer software for accessing domain name systems; computer security threat analysis for protecting data by protecting online businesses from the effects of DNS-based DDoS attacks and other threats; computer security threat analysis for protecting data through identification, blocking and mitigating targeted online threats such as malware, ransom ware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing temporary use of online non-downloadable website software applications for providing API security and threat detection, mitigation and resolution services, namely, a web application firewall (WAF) that cleans, scrubs and filters malicious attacks against website software applications and application programming interfaces (APIs); electronic monitoring of website software applications and APIs for cybersecurity purposes including providing related reports featuring suspicious and abnormal patterns, anomalies and activities; providing temporary use of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, providing temporary use of online non-downloadable software for use restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; DNS resolver services that make DNS queries faster and more secure for faster and more private browsing of the internet, namely, providing temporary use of online non-downloadable computer software for use in securing and speeding internet browsing capacity; global DNS resolution service, namely, computer code conversion for others; providing temporary use of non-downloadable software for use in providing an internet directory comprising recursive domain name server (DNS) services; non-downloadable software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing network security and threat detection, mitigation and resolution services, namely, providing temporary use of cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; providing temporary use of online non-downloadable software for use in providing electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use of online non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats, and for use in preventing access to malicious websites and online threats; computer security services, namely, restricting unauthorized network access by blocking unwanted and inappropriate internet and network traffic, by mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing online non-downloadable software for use in providing threat detection, mitigation and resolution services; providing online non-downloadable software for use in providing bot management and mitigation, protection and guarding against network security threats; technological consultation in the fields of network security, computer security, firewalls, DNS-based DDOS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; technological consultation in the field of global computer information network connectivity and telecommunication hardware and software; domain name server (DNS) resolver services in the nature of online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; global DNS resolution service as an alternative to DNS providers in the nature of online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; providing online non-downloadable computer software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing online non-downloadable computer software for the directing and managing of internet traffic; providing online non-downloadable computer software for accessing a wide range of transactions and telecommunications over the global computer information network; providing online non-downloadable software for internet directory services, namely, recursive DNS services; providing online non-downloadable software for threat detection, mitigation and resolution services; providing online non-downloadable software for bot management, mitigation, protection and guarding; providing online non-downloadable software for accessing business information services, data analytics, databases and information for business; data automation and collection services using proprietary software to evaluate, analyze and collect data; technological consultation in the field of internet routing system services, DNS resolver services and global DNS resolution services, and related hardware and software; providing temporary use of a non-downloadable web application firewall (WAF) software that cleans, scrubs and filters malicious attacks against website software applications and application programming interface (API) software; providing temporary use of non-downloadable software for electronic monitoring of website software applications and APIs for security purposes and providing related reports featuring suspicious and abnormal patterns, anomalies and activities, and detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime, and bot management, mitigation, protection and guarding; providing temporary use of non-downloadable software for threat detection, mitigation and resolution; providing temporary use of non-downloadable software for use in providing bot management, mitigation, protection and guarding; technological consultation in the fields of API security, network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, threat detection, mitigation and resolution services; technological consulting services in the fields of selection, implementation and use of computer hardware and software systems for others with regards to network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; internet routing system services; computer security services, namely, a providing an online non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing online non-downloadable cloud-based DNS resolution software; providing online non-downloadable software for protecting online businesses from the effects of DNS-based DDoS attacks and other threats; providing online non-downloadable software for identification, blocking and mitigating targeted online threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing online, non-downloadable software for use in identification of IP addresses and ranking or scoring them according to their reputation; providing online, non-downloadable software for identifying possible risk or fraud detection related to business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; information technology consulting regarding computer hardware and software for use in identifying IP addresses and ranking or scoring them according to their reputation related to possible risk or fraud; data analytics, namely, computer security threat analysis for protecting data by using threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; providing temporary use of non-downloadable software for threat detection, mitigation and resolution services related to internet traffic; providing temporary use of non-downloadable software for bot management, mitigation, protection and guarding; providing online searchable databases featuring IT information in the nature of the location associated with specific internet addresses for a wide range of applications including fraud detection, compliance, geofencing and digital rights management; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for mapping and resolving the proper IP address to queried domain names to requesting hosts; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for computer security, namely, blocking, allowing, routing and resolution of queries of protected data and online services via connecting and resolving users of the software to mobile devices, computers, television, telephone and the internet and wireless enabled devices and protecting the networks of others from incoming security threats; providing temporary use of non-downloadable cloud-based software for protecting data by restricting access to non-compliant content and websites with known vulnerabilities; network security and threat intelligence services, namely, providing online, non-downloadable software for creating DNS query resolutions between servers; providing online, non-downloadable software for electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns of networks, system activity reports, and event notification alerts; providing online, non-downloadable software for detecting, identifying, intercepting, capturing, quarantining and preventing online computer data threats; providing online, non-downloadable software for preventing access to malicious websites known for online data threats; providing online, non-downloadable software for blocking unwanted and inappropriate content with the use of pre-defined category-based web filtering and custom white/black lists; providing online, non-downloadable software for defending service from distributed denial of service (DDOS) attacks; providing online, non-downloadable software for cleaning and filtering of malicious internet traffic; network and data security technological advisory services and assessing for others the vulnerability of online systems, and prescribing for other fixes for weaknesses and gauges for performance for protection against cyber threats and interruptions; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control of the web sites of others
Goods & Services
Computer hardware and downloadable software for use in assessing, analyzing and making inferences with respect to detecting, mitigating and resolving internet traffic threats, assessing intelligence data, and analyzing and making inferences regarding end user's internet traffic to determine how such traffic should be handled; downloadable software for use in providing statistical analysis of business functions; downloadable software for providing demographic information and data concerning the geographic location of internet access devices used by consumers, the geographic locations of consumers, the connection speed and method by which consumers are accessing the internet, and the specific types of devices used by consumers to access the internet; downloadable software for providing access to and creating databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; downloadable software for providing access to technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; downloadable software for providing (IP) address verification services; downloadable software for providing access to and creating databases featuring the location, internet service provider and organization associated with specific internet addresses; downloadable software for providing identification of website visitor geographical location by using IP addresses; downloadable software for providing identification of the location and other characteristics of internet users for a wide range of applications including content personalization, fraud detection, ad targeting, traffic analysis, compliance, geo-targeting, geofencing and digital rights management; downloadable software for providing internet directory services, namely, recursive domain name server (DNS) services; downloadable software for identification and tracking of IP addresses and ranking or scoring them according to their reputation; downloadable software for use in detecting, mitigating and resolving internet traffic threats and for use in providing intelligence data to assess, analyze and make inferences regarding an end user's internet traffic, to make determinations as to how such traffic should be handled; downloadable software for use in detecting, mitigating and resolving internet traffic security threats; downloadable software for use in compiling computer security threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; Providing multiple user access to global computer information networks for the transfer and dissemination of a wide range of information; internet infrastructure services, namely, internet service provider services; Internet routing system services, being internet service provider services; Business data analysis, namely, use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled for business purposes; Providing online, non-downloadable computer software for safeguarding digital infrastructures and online presences and for protecting networks and applications against risks and downtime; providing DNS, web application, network security, DDoS, web application firewall (WAF), bot management, website monitoring and website load software testing services to others; providing online searchable databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; computer services, namely, providing an interactive web site featuring technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; internet protocol (IP) address verification services; providing online searchable databases featuring IT information in the form of the location, internet service provider and organization associated with specific internet addresses; providing an interactive website featuring technology that enables user to identify the geographical location of website visitors by IP address, for a wide range of applications including, fraud detection, compliance, geo-targeting, geo-fencing and digital rights management; computer security threat analysis for protecting data by providing using threat analysis data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; computer security threat analysis for protecting data; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing online non-downloadable software for compiling and organizing statistical analysis of business functions; providing online non-downloadable software which utilizes threat intelligence data to assess and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; network security and threat detection, mitigation and resolution services, namely, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; electronic monitoring and reporting of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic using computers for security purposes including providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use on non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats; providing temporary use of online non-downloadable software for use in preventing access to malicious websites and online threats; providing temporary use of online non-downloadable software for use in blocking unwanted and inappropriate internet and network traffic, for mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; computer security services, namely, a providing temporary use of non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing temporary use of cloud-based computer software for accessing domain name systems; computer security threat analysis for protecting data by protecting online businesses from the effects of DNS-based DDoS attacks and other threats; computer security threat analysis for protecting data through identification, blocking and mitigating targeted online threats such as malware, ransom ware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing temporary use of online non-downloadable website software applications for providing API security and threat detection, mitigation and resolution services, namely, a web application firewall (WAF) that cleans, scrubs and filters malicious attacks against website software applications and application programming interfaces (APIs); electronic monitoring of website software applications and APIs for cybersecurity purposes including providing related reports featuring suspicious and abnormal patterns, anomalies and activities; providing temporary use of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, providing temporary use of online non-downloadable software for use restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; DNS resolver services that make DNS queries faster and more secure for faster and more private browsing of the internet, namely, providing temporary use of online non-downloadable computer software for use in securing and speeding internet browsing capacity; global DNS resolution service, namely, computer code conversion for others; providing temporary use of non-downloadable software for use in providing an internet directory comprising recursive domain name server (DNS) services; non-downloadable software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing network security and threat detection, mitigation and resolution services, namely, providing temporary use of cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; providing temporary use of online non-downloadable software for use in providing electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use of online non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats, and for use in preventing access to malicious websites and online threats; computer security services, namely, restricting unauthorized network access by blocking unwanted and inappropriate internet and network traffic, by mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing online non-downloadable software for use in providing threat detection, mitigation and resolution services; providing online non-downloadable software for use in providing bot management and mitigation, protection and guarding against network security threats; technological consultation in the fields of network security, computer security, firewalls, DNS-based DDOS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; technological consultation in the field of global computer information network connectivity and telecommunication hardware and software; domain name server (DNS) resolver services in the nature of online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; global DNS resolution service as an alternative to DNS providers in the nature of online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; providing online non-downloadable computer software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing online non-downloadable computer software for the directing and managing of internet traffic; providing online non-downloadable computer software for accessing a wide range of transactions and telecommunications over the global computer information network; providing online non-downloadable software for internet directory services, namely, recursive DNS services; providing online non-downloadable software for threat detection, mitigation and resolution services; providing online non-downloadable software for bot management, mitigation, protection and guarding; providing online non-downloadable software for accessing business information services, data analytics, databases and information for business; data automation and collection services using proprietary software to evaluate, analyze and collect data; technological consultation in the field of internet routing system services, DNS resolver services and global DNS resolution services, and related hardware and software; providing temporary use of a non-downloadable web application firewall (WAF) software that cleans, scrubs and filters malicious attacks against website software applications and application programming interface (API) software; providing temporary use of non-downloadable software for electronic monitoring of website software applications and APIs for security purposes and providing related reports featuring suspicious and abnormal patterns, anomalies and activities, and detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime, and bot management, mitigation, protection and guarding; providing temporary use of non-downloadable software for threat detection, mitigation and resolution; providing temporary use of non-downloadable software for use in providing bot management, mitigation, protection and guarding; technological consultation in the fields of API security, network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, threat detection, mitigation and resolution services; technological consulting services in the fields of selection, implementation and use of computer hardware and software systems for others with regards to network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; internet routing system services; computer security services, namely, a providing an online non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing online non-downloadable cloud-based DNS resolution software; providing online non-downloadable software for protecting online businesses from the effects of DNS-based DDoS attacks and other threats; providing online non-downloadable software for identification, blocking and mitigating targeted online threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing online, non-downloadable software for use in identification of IP addresses and ranking or scoring them according to their reputation; providing online, non-downloadable software for identifying possible risk or fraud detection related to business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; information technology consulting regarding computer hardware and software for use in identifying IP addresses and ranking or scoring them according to their reputation related to possible risk or fraud; data analytics, namely, computer security threat analysis for protecting data by using threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; providing temporary use of non-downloadable software for threat detection, mitigation and resolution services related to internet traffic; providing temporary use of non-downloadable software for bot management, mitigation, protection and guarding; providing online searchable databases featuring IT information in the nature of the location associated with specific internet addresses for a wide range of applications including fraud detection, compliance, geofencing and digital rights management; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for mapping and resolving the proper IP address to queried domain names to requesting hosts; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for computer security, namely, blocking, allowing, routing and resolution of queries of protected data and online services via connecting and resolving users of the software to mobile devices, computers, television, telephone and the internet and wireless enabled devices and protecting the networks of others from incoming security threats; providing temporary use of non-downloadable cloud-based software for protecting data by restricting access to non-compliant content and websites with known vulnerabilities; network security and threat intelligence services, namely, providing online, non-downloadable software for creating DNS query resolutions between servers; providing online, non-downloadable software for electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns of networks, system activity reports, and event notification alerts; providing online, non-downloadable software for detecting, identifying, intercepting, capturing, quarantining and preventing online computer data threats; providing online, non-downloadable software for preventing access to malicious websites known for online data threats; providing online, non-downloadable software for blocking unwanted and inappropriate content with the use of pre-defined category-based web filtering and custom white/black lists; providing online, non-downloadable software for defending service from distributed denial of service (DDOS) attacks; providing online, non-downloadable software for cleaning and filtering of malicious internet traffic; network and data security technological advisory services and assessing for others the vulnerability of online systems, and prescribing for other fixes for weaknesses and gauges for performance for protection against cyber threats and interruptions; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control of the web sites of others
Goods & Services
Providing temporary use of non-downloadable cloud-based software for monitoring, traffic-proofing, load testing and measuring websites, website hosts, website services, website connectivity, website time-outs, website URLs, website protocols, website APIs, bandwidth limitations, error rates exceeding thresholds, server CPU limitations, errant load balancing configurations, router and firewall failures, misconfigured web servers, application servers and database servers, for finding, identifying and fixing related performance problems, for collecting related availability and performance data, for providing related performance metrics, diagnostics, alerts and reports, for interpreting related errors, for making related automatic contingency decisions, and for creating related contingency and remediation plans
Goods & Services
Computer hardware and downloadable software for use in assessing, analyzing and making inferences with respect to detecting, mitigating and resolving internet traffic threats, assessing intelligence data, and analyzing and making inferences regarding end user's internet traffic to determine how such traffic should be handled; downloadable software for use in providing statistical analysis of business functions; downloadable software for providing demographic information and data concerning the geographic location of internet access devices used by consumers, the geographic locations of consumers, the connection speed and method by which consumers are accessing the internet, and the specific types of devices used by consumers to access the internet; downloadable software for providing access to and creating databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; downloadable software for providing access to technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; downloadable software for providing (IP) address verification services; downloadable software for providing access to and creating databases featuring the location, internet service provider and organization associated with specific internet addresses; downloadable software for providing identification of website visitor geographical location by using IP addresses; downloadable software for providing identification of the location and other characteristics of internet users for a wide range of applications including content personalization, fraud detection, ad targeting, traffic analysis, compliance, geo-targeting, geofencing and digital rights management; downloadable software for providing internet directory services, namely, recursive domain name server (DNS) services; downloadable software for identification and tracking of IP addresses and ranking or scoring them according to their reputation; downloadable software for use in detecting, mitigating and resolving internet traffic threats and for use in providing intelligence data to assess, analyze and make inferences regarding an end user's internet traffic, to make determinations as to how such traffic should be handled; downloadable software for use in detecting, mitigating and resolving internet traffic security threats; downloadable software for use in compiling computer security threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; Providing multiple user access to global computer information networks for the transfer and dissemination of a wide range of information; internet infrastructure services, namely, internet service provider services; Internet routing system services, being internet service provider services; Business data analysis, namely, use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled for business purposes; Providing online, non-downloadable computer software for safeguarding digital infrastructures and online presences and for protecting networks and applications against risks and downtime; providing DNS, web application, network security, DDoS, web application firewall (WAF), bot management, website monitoring and website load software testing services to others; providing online searchable databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; computer services, namely, providing an interactive web site featuring technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; internet protocol (IP) address verification services; providing online searchable databases featuring IT information in the form of the location, internet service provider and organization associated with specific internet addresses; providing an interactive website featuring technology that enables user to identify the geographical location of website visitors by IP address, for a wide range of applications including, fraud detection, compliance, geo-targeting, geo-fencing and digital rights management; computer security threat analysis for protecting data by providing using threat analysis data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; computer security threat analysis for protecting data; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing online non-downloadable software for compiling and organizing statistical analysis of business functions; providing online non-downloadable software which utilizes threat intelligence data to assess and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; network security and threat detection, mitigation and resolution services, namely, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; electronic monitoring and reporting of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic using computers for security purposes including providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use on non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats; providing temporary use of online non-downloadable software for use in preventing access to malicious websites and online threats; providing temporary use of online non-downloadable software for use in blocking unwanted and inappropriate internet and network traffic, for mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; computer security services, namely, a providing temporary use of non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing temporary use of cloud-based computer software for accessing domain name systems; computer security threat analysis for protecting data by protecting online businesses from the effects of DNS-based DDoS attacks and other threats; computer security threat analysis for protecting data through identification, blocking and mitigating targeted online threats such as malware, ransom ware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing temporary use of online non-downloadable website software applications for providing API security and threat detection, mitigation and resolution services, namely, a web application firewall (WAF) that cleans, scrubs and filters malicious attacks against website software applications and application programming interfaces (APIs); electronic monitoring of website software applications and APIs for cybersecurity purposes including providing related reports featuring suspicious and abnormal patterns, anomalies and activities; providing temporary use of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, providing temporary use of online non-downloadable software for use restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; DNS resolver services that make DNS queries faster and more secure for faster and more private browsing of the internet, namely, providing temporary use of online non-downloadable computer software for use in securing and speeding internet browsing capacity; global DNS resolution service, namely, computer code conversion for others; providing temporary use of non-downloadable software for use in providing an internet directory comprising recursive domain name server (DNS) services; non-downloadable software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing network security and threat detection, mitigation and resolution services, namely, providing temporary use of cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; providing temporary use of online non-downloadable software for use in providing electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use of online non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats, and for use in preventing access to malicious websites and online threats; computer security services, namely, restricting unauthorized network access by blocking unwanted and inappropriate internet and network traffic, by mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing online non-downloadable software for use in providing threat detection, mitigation and resolution services; providing online non-downloadable software for use in providing bot management and mitigation, protection and guarding against network security threats; technological consultation in the fields of network security, computer security, firewalls, DNS-based DDOS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; technological consultation in the field of global computer information network connectivity and telecommunication hardware and software; domain name server (DNS) resolver services in the nature of online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; global DNS resolution service as an alternative to DNS providers in the nature of online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; providing online non-downloadable computer software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing online non-downloadable computer software for the directing and managing of internet traffic; providing online non-downloadable computer software for accessing a wide range of transactions and telecommunications over the global computer information network; providing online non-downloadable software for internet directory services, namely, recursive DNS services; providing online non-downloadable software for threat detection, mitigation and resolution services; providing online non-downloadable software for bot management, mitigation, protection and guarding; providing online non-downloadable software for accessing business information services, data analytics, databases and information for business; data automation and collection services using proprietary software to evaluate, analyze and collect data; technological consultation in the field of internet routing system services, DNS resolver services and global DNS resolution services, and related hardware and software; providing temporary use of a non-downloadable web application firewall (WAF) software that cleans, scrubs and filters malicious attacks against website software applications and application programming interface (API) software; providing temporary use of non-downloadable software for electronic monitoring of website software applications and APIs for security purposes and providing related reports featuring suspicious and abnormal patterns, anomalies and activities, and detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime, and bot management, mitigation, protection and guarding; providing temporary use of non-downloadable software for threat detection, mitigation and resolution; providing temporary use of non-downloadable software for use in providing bot management, mitigation, protection and guarding; technological consultation in the fields of API security, network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, threat detection, mitigation and resolution services; technological consulting services in the fields of selection, implementation and use of computer hardware and software systems for others with regards to network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; internet routing system services; computer security services, namely, a providing an online non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing online non-downloadable cloud-based DNS resolution software; providing online non-downloadable software for protecting online businesses from the effects of DNS-based DDoS attacks and other threats; providing online non-downloadable software for identification, blocking and mitigating targeted online threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing online, non-downloadable software for use in identification of IP addresses and ranking or scoring them according to their reputation; providing online, non-downloadable software for identifying possible risk or fraud detection related to business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; information technology consulting regarding computer hardware and software for use in identifying IP addresses and ranking or scoring them according to their reputation related to possible risk or fraud; data analytics, namely, computer security threat analysis for protecting data by using threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; providing temporary use of non-downloadable software for threat detection, mitigation and resolution services related to internet traffic; providing temporary use of non-downloadable software for bot management, mitigation, protection and guarding; providing online searchable databases featuring IT information in the nature of the location associated with specific internet addresses for a wide range of applications including fraud detection, compliance, geofencing and digital rights management; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for mapping and resolving the proper IP address to queried domain names to requesting hosts; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for computer security, namely, blocking, allowing, routing and resolution of queries of protected data and online services via connecting and resolving users of the software to mobile devices, computers, television, telephone and the internet and wireless enabled devices and protecting the networks of others from incoming security threats; providing temporary use of non-downloadable cloud-based software for protecting data by restricting access to non-compliant content and websites with known vulnerabilities; network security and threat intelligence services, namely, providing online, non-downloadable software for creating DNS query resolutions between servers; providing online, non-downloadable software for electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns of networks, system activity reports, and event notification alerts; providing online, non-downloadable software for detecting, identifying, intercepting, capturing, quarantining and preventing online computer data threats; providing online, non-downloadable software for preventing access to malicious websites known for online data threats; providing online, non-downloadable software for blocking unwanted and inappropriate content with the use of pre-defined category-based web filtering and custom white/black lists; providing online, non-downloadable software for defending service from distributed denial of service (DDOS) attacks; providing online, non-downloadable software for cleaning and filtering of malicious internet traffic; network and data security technological advisory services and assessing for others the vulnerability of online systems, and prescribing for other fixes for weaknesses and gauges for performance for protection against cyber threats and interruptions; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control of the web sites of others
Goods & Services
Computer hardware and downloadable software for use in assessing, analyzing and making inferences with respect to detecting, mitigating and resolving internet traffic threats, assessing intelligence data, and analyzing and making inferences regarding end user's internet traffic to determine how such traffic should be handled; downloadable software for use in providing statistical analysis of business functions; downloadable software for providing demographic information and data concerning the geographic location of internet access devices used by consumers, the geographic locations of consumers, the connection speed and method by which consumers are accessing the internet, and the specific types of devices used by consumers to access the internet; downloadable software for providing access to and creating databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; downloadable software for providing access to technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; downloadable software for providing (IP) address verification services; downloadable software for providing access to and creating databases featuring the location, internet service provider and organization associated with specific internet addresses; downloadable software for providing identification of website visitor geographical location by using IP addresses; downloadable software for providing identification of the location and other characteristics of internet users for a wide range of applications including content personalization, fraud detection, ad targeting, traffic analysis, compliance, geo-targeting, geofencing and digital rights management; downloadable software for providing internet directory services, namely, recursive domain name server (DNS) services; downloadable software for identification and tracking of IP addresses and ranking or scoring them according to their reputation; downloadable software for use in detecting, mitigating and resolving internet traffic threats and for use in providing intelligence data to assess, analyze and make inferences regarding an end user's internet traffic, to make determinations as to how such traffic should be handled; downloadable software for use in detecting, mitigating and resolving internet traffic security threats; downloadable software for use in compiling computer security threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; Providing multiple user access to global computer information networks for the transfer and dissemination of a wide range of information; internet infrastructure services, namely, internet service provider services; Internet routing system services, being internet service provider services; Business data analysis, namely, use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled for business purposes; Providing online, non-downloadable computer software for safeguarding digital infrastructures and online presences and for protecting networks and applications against risks and downtime; providing DNS, web application, network security, DDoS, web application firewall (WAF), bot management, website monitoring and website load software testing services to others; providing online searchable databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; computer services, namely, providing an interactive web site featuring technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; internet protocol (IP) address verification services; providing online searchable databases featuring IT information in the form of the location, internet service provider and organization associated with specific internet addresses; providing an interactive website featuring technology that enables user to identify the geographical location of website visitors by IP address, for a wide range of applications including, fraud detection, compliance, geo-targeting, geo-fencing and digital rights management; computer security threat analysis for protecting data by providing using threat analysis data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; computer security threat analysis for protecting data; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing online non-downloadable software for compiling and organizing statistical analysis of business functions; providing online non-downloadable software which utilizes threat intelligence data to assess and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; network security and threat detection, mitigation and resolution services, namely, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; electronic monitoring and reporting of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic using computers for security purposes including providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use on non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats; providing temporary use of online non-downloadable software for use in preventing access to malicious websites and online threats; providing temporary use of online non-downloadable software for use in blocking unwanted and inappropriate internet and network traffic, for mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; computer security services, namely, a providing temporary use of non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing temporary use of cloud-based computer software for accessing domain name systems; computer security threat analysis for protecting data by protecting online businesses from the effects of DNS-based DDoS attacks and other threats; computer security threat analysis for protecting data through identification, blocking and mitigating targeted online threats such as malware, ransom ware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing temporary use of online non-downloadable website software applications for providing API security and threat detection, mitigation and resolution services, namely, a web application firewall (WAF) that cleans, scrubs and filters malicious attacks against website software applications and application programming interfaces (APIs); electronic monitoring of website software applications and APIs for cybersecurity purposes including providing related reports featuring suspicious and abnormal patterns, anomalies and activities; providing temporary use of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, providing temporary use of online non-downloadable software for use restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; DNS resolver services that make DNS queries faster and more secure for faster and more private browsing of the internet, namely, providing temporary use of online non-downloadable computer software for use in securing and speeding internet browsing capacity; global DNS resolution service, namely, computer code conversion for others; providing temporary use of non-downloadable software for use in providing an internet directory comprising recursive domain name server (DNS) services; non-downloadable software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing network security and threat detection, mitigation and resolution services, namely, providing temporary use of cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; providing temporary use of online non-downloadable software for use in providing electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use of online non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats, and for use in preventing access to malicious websites and online threats; computer security services, namely, restricting unauthorized network access by blocking unwanted and inappropriate internet and network traffic, by mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing online non-downloadable software for use in providing threat detection, mitigation and resolution services; providing online non-downloadable software for use in providing bot management and mitigation, protection and guarding against network security threats; technological consultation in the fields of network security, computer security, firewalls, DNS-based DDOS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; technological consultation in the field of global computer information network connectivity and telecommunication hardware and software; domain name server (DNS) resolver services in the nature of online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; global DNS resolution service as an alternative to DNS providers in the nature of online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; providing online non-downloadable computer software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing online non-downloadable computer software for the directing and managing of internet traffic; providing online non-downloadable computer software for accessing a wide range of transactions and telecommunications over the global computer information network; providing online non-downloadable software for internet directory services, namely, recursive DNS services; providing online non-downloadable software for threat detection, mitigation and resolution services; providing online non-downloadable software for bot management, mitigation, protection and guarding; providing online non-downloadable software for accessing business information services, data analytics, databases and information for business; data automation and collection services using proprietary software to evaluate, analyze and collect data; technological consultation in the field of internet routing system services, DNS resolver services and global DNS resolution services, and related hardware and software; providing temporary use of a non-downloadable web application firewall (WAF) software that cleans, scrubs and filters malicious attacks against website software applications and application programming interface (API) software; providing temporary use of non-downloadable software for electronic monitoring of website software applications and APIs for security purposes and providing related reports featuring suspicious and abnormal patterns, anomalies and activities, and detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime, and bot management, mitigation, protection and guarding; providing temporary use of non-downloadable software for threat detection, mitigation and resolution; providing temporary use of non-downloadable software for use in providing bot management, mitigation, protection and guarding; technological consultation in the fields of API security, network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, threat detection, mitigation and resolution services; technological consulting services in the fields of selection, implementation and use of computer hardware and software systems for others with regards to network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; internet routing system services; computer security services, namely, a providing an online non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing online non-downloadable cloud-based DNS resolution software; providing online non-downloadable software for protecting online businesses from the effects of DNS-based DDoS attacks and other threats; providing online non-downloadable software for identification, blocking and mitigating targeted online threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing online, non-downloadable software for use in identification of IP addresses and ranking or scoring them according to their reputation; providing online, non-downloadable software for identifying possible risk or fraud detection related to business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; information technology consulting regarding computer hardware and software for use in identifying IP addresses and ranking or scoring them according to their reputation related to possible risk or fraud; data analytics, namely, computer security threat analysis for protecting data by using threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; providing temporary use of non-downloadable software for threat detection, mitigation and resolution services related to internet traffic; providing temporary use of non-downloadable software for bot management, mitigation, protection and guarding; providing online searchable databases featuring IT information in the nature of the location associated with specific internet addresses for a wide range of applications including fraud detection, compliance, geofencing and digital rights management; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for mapping and resolving the proper IP address to queried domain names to requesting hosts; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for computer security, namely, blocking, allowing, routing and resolution of queries of protected data and online services via connecting and resolving users of the software to mobile devices, computers, television, telephone and the internet and wireless enabled devices and protecting the networks of others from incoming security threats; providing temporary use of non-downloadable cloud-based software for protecting data by restricting access to non-compliant content and websites with known vulnerabilities; network security and threat intelligence services, namely, providing online, non-downloadable software for creating DNS query resolutions between servers; providing online, non-downloadable software for electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns of networks, system activity reports, and event notification alerts; providing online, non-downloadable software for detecting, identifying, intercepting, capturing, quarantining and preventing online computer data threats; providing online, non-downloadable software for preventing access to malicious websites known for online data threats; providing online, non-downloadable software for blocking unwanted and inappropriate content with the use of pre-defined category-based web filtering and custom white/black lists; providing online, non-downloadable software for defending service from distributed denial of service (DDOS) attacks; providing online, non-downloadable software for cleaning and filtering of malicious internet traffic; network and data security technological advisory services and assessing for others the vulnerability of online systems, and prescribing for other fixes for weaknesses and gauges for performance for protection against cyber threats and interruptions; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control of the web sites of others

Goods & Services
Computer hardware and downloadable software for use in assessing, analyzing and making inferences with respect to detecting, mitigating and resolving internet traffic threats, assessing intelligence data, and analyzing and making inferences regarding end user's internet traffic to determine how such traffic should be handled; downloadable software for use in providing statistical analysis of business functions; downloadable software for providing demographic information and data concerning the geographic location of internet access devices used by consumers, the geographic locations of consumers, the connection speed and method by which consumers are accessing the internet, and the specific types of devices used by consumers to access the internet; downloadable software for providing access to and creating databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; downloadable software for providing access to technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; downloadable software for providing (IP) address verification services; downloadable software for providing access to and creating databases featuring the location, internet service provider and organization associated with specific internet addresses; downloadable software for providing identification of website visitor geographical location by using IP addresses; downloadable software for providing identification of the location and other characteristics of internet users for a wide range of applications including content personalization, fraud detection, ad targeting, traffic analysis, compliance, geo-targeting, geofencing and digital rights management; downloadable software for providing internet directory services, namely, recursive domain name server (DNS) services; downloadable software for identification and tracking of IP addresses and ranking or scoring them according to their reputation; downloadable software for use in detecting, mitigating and resolving internet traffic threats and for use in providing intelligence data to assess, analyze and make inferences regarding an end user's internet traffic, to make determinations as to how such traffic should be handled; downloadable software for use in detecting, mitigating and resolving internet traffic security threats; downloadable software for use in compiling computer security threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; Providing multiple user access to global computer information networks for the transfer and dissemination of a wide range of information; internet infrastructure services, namely, internet service provider services; Internet routing system services, being internet service provider services; Business data analysis, namely, use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled for business purposes; Providing online, non-downloadable computer software for safeguarding digital infrastructures and online presences and for protecting networks and applications against risks and downtime; providing DNS, web application, network security, DDoS, web application firewall (WAF), bot management, website monitoring and website load software testing services to others; providing online searchable databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; computer services, namely, providing an interactive web site featuring technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; internet protocol (IP) address verification services; providing online searchable databases featuring IT information in the form of the location, internet service provider and organization associated with specific internet addresses; providing an interactive website featuring technology that enables user to identify the geographical location of website visitors by IP address, for a wide range of applications including, fraud detection, compliance, geo-targeting, geo-fencing and digital rights management; computer security threat analysis for protecting data by providing using threat analysis data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; computer security threat analysis for protecting data; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing online non-downloadable software for compiling and organizing statistical analysis of business functions; providing online non-downloadable software which utilizes threat intelligence data to assess and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; network security and threat detection, mitigation and resolution services, namely, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; electronic monitoring and reporting of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic using computers for security purposes including providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use on non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats; providing temporary use of online non-downloadable software for use in preventing access to malicious websites and online threats; providing temporary use of online non-downloadable software for use in blocking unwanted and inappropriate internet and network traffic, for mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; computer security services, namely, a providing temporary use of non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing temporary use of cloud-based computer software for accessing domain name systems; computer security threat analysis for protecting data by protecting online businesses from the effects of DNS-based DDoS attacks and other threats; computer security threat analysis for protecting data through identification, blocking and mitigating targeted online threats such as malware, ransom ware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing temporary use of online non-downloadable website software applications for providing API security and threat detection, mitigation and resolution services, namely, a web application firewall (WAF) that cleans, scrubs and filters malicious attacks against website software applications and application programming interfaces (APIs); electronic monitoring of website software applications and APIs for cybersecurity purposes including providing related reports featuring suspicious and abnormal patterns, anomalies and activities; providing temporary use of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, providing temporary use of online non-downloadable software for use restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; DNS resolver services that make DNS queries faster and more secure for faster and more private browsing of the internet, namely, providing temporary use of online non-downloadable computer software for use in securing and speeding internet browsing capacity; global DNS resolution service, namely, computer code conversion for others; providing temporary use of non-downloadable software for use in providing an internet directory comprising recursive domain name server (DNS) services; non-downloadable software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing network security and threat detection, mitigation and resolution services, namely, providing temporary use of cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; providing temporary use of online non-downloadable software for use in providing electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use of online non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats, and for use in preventing access to malicious websites and online threats; computer security services, namely, restricting unauthorized network access by blocking unwanted and inappropriate internet and network traffic, by mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing online non-downloadable software for use in providing threat detection, mitigation and resolution services; providing online non-downloadable software for use in providing bot management and mitigation, protection and guarding against network security threats; technological consultation in the fields of network security, computer security, firewalls, DNS-based DDOS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; technological consultation in the field of global computer information network connectivity and telecommunication hardware and software; domain name server (DNS) resolver services in the nature of online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; global DNS resolution service as an alternative to DNS providers in the nature of online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; providing online non-downloadable computer software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing online non-downloadable computer software for the directing and managing of internet traffic; providing online non-downloadable computer software for accessing a wide range of transactions and telecommunications over the global computer information network; providing online non-downloadable software for internet directory services, namely, recursive DNS services; providing online non-downloadable software for threat detection, mitigation and resolution services; providing online non-downloadable software for bot management, mitigation, protection and guarding; providing online non-downloadable software for accessing business information services, data analytics, databases and information for business; data automation and collection services using proprietary software to evaluate, analyze and collect data; technological consultation in the field of internet routing system services, DNS resolver services and global DNS resolution services, and related hardware and software; providing temporary use of a non-downloadable web application firewall (WAF) software that cleans, scrubs and filters malicious attacks against website software applications and application programming interface (API) software; providing temporary use of non-downloadable software for electronic monitoring of website software applications and APIs for security purposes and providing related reports featuring suspicious and abnormal patterns, anomalies and activities, and detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime, and bot management, mitigation, protection and guarding; providing temporary use of non-downloadable software for threat detection, mitigation and resolution; providing temporary use of non-downloadable software for use in providing bot management, mitigation, protection and guarding; technological consultation in the fields of API security, network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, threat detection, mitigation and resolution services; technological consulting services in the fields of selection, implementation and use of computer hardware and software systems for others with regards to network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; internet routing system services; computer security services, namely, a providing an online non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing online non-downloadable cloud-based DNS resolution software; providing online non-downloadable software for protecting online businesses from the effects of DNS-based DDoS attacks and other threats; providing online non-downloadable software for identification, blocking and mitigating targeted online threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing online, non-downloadable software for use in identification of IP addresses and ranking or scoring them according to their reputation; providing online, non-downloadable software for identifying possible risk or fraud detection related to business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; information technology consulting regarding computer hardware and software for use in identifying IP addresses and ranking or scoring them according to their reputation related to possible risk or fraud; data analytics, namely, computer security threat analysis for protecting data by using threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; providing temporary use of non-downloadable software for threat detection, mitigation and resolution services related to internet traffic; providing temporary use of non-downloadable software for bot management, mitigation, protection and guarding; providing online searchable databases featuring IT information in the nature of the location associated with specific internet addresses for a wide range of applications including fraud detection, compliance, geofencing and digital rights management; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for mapping and resolving the proper IP address to queried domain names to requesting hosts; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for computer security, namely, blocking, allowing, routing and resolution of queries of protected data and online services via connecting and resolving users of the software to mobile devices, computers, television, telephone and the internet and wireless enabled devices and protecting the networks of others from incoming security threats; providing temporary use of non-downloadable cloud-based software for protecting data by restricting access to non-compliant content and websites with known vulnerabilities; network security and threat intelligence services, namely, providing online, non-downloadable software for creating DNS query resolutions between servers; providing online, non-downloadable software for electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns of networks, system activity reports, and event notification alerts; providing online, non-downloadable software for detecting, identifying, intercepting, capturing, quarantining and preventing online computer data threats; providing online, non-downloadable software for preventing access to malicious websites known for online data threats; providing online, non-downloadable software for blocking unwanted and inappropriate content with the use of pre-defined category-based web filtering and custom white/black lists; providing online, non-downloadable software for defending service from distributed denial of service (DDOS) attacks; providing online, non-downloadable software for cleaning and filtering of malicious internet traffic; network and data security technological advisory services and assessing for others the vulnerability of online systems, and prescribing for other fixes for weaknesses and gauges for performance for protection against cyber threats and interruptions; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control of the web sites of others

Goods & Services
Computer hardware and downloadable software for use in assessing, analyzing and making inferences with respect to detecting, mitigating and resolving internet traffic threats, assessing intelligence data, and analyzing and making inferences regarding end user's internet traffic to determine how such traffic should be handled; downloadable software for use in providing statistical analysis of business functions; downloadable software for providing demographic information and data concerning the geographic location of internet access devices used by consumers, the geographic locations of consumers, the connection speed and method by which consumers are accessing the internet, and the specific types of devices used by consumers to access the internet; downloadable software for providing access to and creating databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; downloadable software for providing access to technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; downloadable software for providing IP address verification services; downloadable software for providing access to and creating databases featuring the location, internet service provider and organization associated with specific internet addresses; downloadable software for providing identification of website visitor geographical location by using IP addresses; downloadable software for providing identification of the location and other characteristics of internet users for a wide range of applications including content personalization, fraud detection, ad targeting, traffic analysis, compliance, geo-targeting, geofencing and digital rights management; downloadable software for providing internet directory services, namely, recursive domain name server (DNS) services; downloadable software for identification and tracking of IP addresses and ranking or scoring them according to their reputation; downloadable software for use in detecting, mitigating and resolving internet traffic threats and for use in providing intelligence data to assess, analyze and make inferences regarding an end user's internet traffic, to make determinations as to how such traffic should be handled; downloadable software for use in detecting, mitigating and resolving internet traffic security threats; downloadable software for use in compiling computer security threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; Providing multiple user access to global computer information networks for the transfer and dissemination of a wide range of information; internet infrastructure services, namely, internet service provider services; Internet routing system services being internet service provider services; Business data analysis, namely, use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled for business purposes; Domain name system usage and efficiency monitoring and reporting services, namely, domain name monitoring services; Providing online non-downloadable computer software for safeguarding digital infrastructures and online presences and for protecting networks and applications against risks and downtime; providing DNS, web application, network security, DDoS, web application firewall, bot management, website monitoring and website load software testing services to others; providing online searchable databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; computer services, namely, providing an interactive web site featuring technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; internet protocol (IP) address verification services; providing online searchable databases featuring IT information in the form of the location, internet service provider and organization associated with specific internet addresses; providing an interactive website featuring technology that enables user to identify the geographical location of website visitors by IP address, for a wide range of applications including, fraud detection, compliance, geo-targeting, geo-fencing and digital rights management; computer security threat analysis for protecting data by providing using threat analysis data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; computer security threat analysis for protecting data; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing online non-downloadable software for compiling and organizing statistical analysis of business functions; providing online non-downloadable software which utilizes threat intelligence data to assess and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; network security and threat detection, mitigation and resolution services, namely, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; electronic monitoring and reporting of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic using computers for security purposes including providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use on non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats; providing temporary use of online non-downloadable software for use in preventing access to malicious websites and online threats; providing temporary use of online non-downloadable software for use in blocking unwanted and inappropriate internet and network traffic, for mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; computer security services, namely, a providing temporary use of non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing temporary use of cloud-based computer software for accessing domain name systems; computer security threat analysis for protecting data by protecting online businesses from the effects of DNS-based DDoS attacks and other threats; computer security threat analysis for protecting data through identification, blocking and mitigating targeted online threats such as malware, ransom ware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing temporary use of online non-downloadable website software applications for providing API security and threat detection, mitigation and resolution services, namely, a web application firewall that cleans, scrubs and filters malicious attacks against website software applications and application programming interfaces (APIs); electronic monitoring of website software applications and APIs for cybersecurity purposes including providing related reports featuring suspicious and abnormal patterns, anomalies and activities; providing temporary use of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, providing temporary use of online non-downloadable software for use restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; DNS resolver services that make DNS queries faster and more secure for faster and more private browsing of the internet, namely, providing temporary use of online non-downloadable computer software for use in securing and speeding internet browsing capacity; global DNS resolution service, namely, computer code conversion for others; providing temporary use of non-downloadable software for use in providing an internet directory comprising recursive domain name server (DNS) services; non-downloadable software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing network security and threat detection, mitigation and resolution services, namely, providing temporary use of cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; providing temporary use of online non-downloadable software for use in providing electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use of online non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats, and for use in preventing access to malicious websites and online threats; computer security services, namely, restricting unauthorized network access by blocking unwanted and inappropriate internet and network traffic, by mitigating against and defending networks and websites from distributed denial of service attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing online non-downloadable software for use in providing threat detection, mitigation and resolution services; providing online non-downloadable software for use in providing bot management and mitigation, protection and guarding against network security threats; technological consultation in the fields of network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; technological consulting services in the fields of selection, implementation and use of computer hardware and software systems for others with regards to network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; technological consultation in the field of global computer information network connectivity and telecommunication hardware and software; domain name server (DNS) resolver services in the nature of providing online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; global DNS resolution service as an alternative to DNS providers in the nature of providing online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; providing online non-downloadable computer software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing online non-downloadable computer software for the directing and managing of internet traffic; providing online non-downloadable computer software for accessing a wide range of transactions and telecommunications over the global computer information network; providing online non-downloadable software for accessing internet directory services, namely, recursive DNS services; providing online non-downloadable software for threat detection, mitigation and resolution services; providing online non-downloadable software for bot management, mitigation, protection and guarding; providing online non-downloadable software for accessing business information services, data analytics, databases and information for business; data automation and collection services using proprietary software to evaluate, analyze and collect data; technological consultation in the field of internet routing system services, DNS resolver services and global DNS resolution services, and related hardware and software; providing temporary use of a non-downloadable web application firewall software that cleans, scrubs and filters malicious attacks against website software applications and application programming interface software; providing temporary use of non-downloadable software for electronic monitoring of website software applications and APIs for security purposes and providing related reports featuring suspicious and abnormal patterns, anomalies and activities, and detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime, and bot management, mitigation, protection and guarding; providing temporary use of non-downloadable software for threat detection, mitigation and resolution; providing temporary use of non-downloadable software for use in providing bot management, mitigation, protection and guarding; technological consultation in the fields of API security, network security, computer security, firewalls, DNS-based DDOS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, threat detection, mitigation and resolution services; technological consulting services in the fields of selection, implementation and use of computer hardware and software systems for others with regards to network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; DNS resolver services in the nature of providing online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; global DNS resolution service as an alternative to DNS providers in the nature of providing online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; computer security services, namely, providing an online non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom designated third-party websites or preventing access to malicious websites or online threats; providing online non-downloadable cloud-based DNS resolution software; providing online non-downloadable software for protecting online businesses from the effects of DNS-based DDoS attacks and other threats; providing online non-downloadable software for identification, blocking and mitigating targeted online threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing online, non-downloadable software for use in identification of IP addresses and ranking or scoring them according to their reputation; providing on-line, non-downloadable software for identifying possible risk or fraud detection related to business information services, data analytics, databases and information for business; information technology consulting regarding computer hardware and software for use in identifying IP addresses and ranking or scoring them according to their reputation related to possible risk or fraud; data analytics, namely, computer security threat analysis for protecting data by using threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; providing temporary use of non-downloadable software for threat detection, mitigation and resolution services related to internet traffic; providing temporary use of non-downloadable software for bot management, mitigation, protection and guarding; providing online searchable databases featuring IT information in the nature of the location associated with specific internet addresses for a wide range of applications including fraud detection, compliance, geofencing and digital rights management; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud based software for mapping and resolving the proper IP address to queried domain names to requesting hosts; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for computer security, namely, blocking, allowing, routing and resolution of queries of protected data and online services via connecting and resolving users of the software to mobile devices, computers, television, telephone and the internet and wireless enabled devices and protecting the networks of others from incoming security threats; providing temporary use of non-downloadable cloud-based software for protecting data by restricting access to non-compliant content and websites with known vulnerabilities; network security and threat intelligence services, namely, providing online non-downloadable software for creating DNS query resolutions between servers; providing online non-downloadable software for electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns of networks, system activity reports, and event notification alerts; providing online non-downloadable software for detecting, identifying, intercepting, capturing, quarantining and preventing online computer data threats; providing online non-downloadable software for preventing access to malicious websites known for online data threats; providing online non-downloadable software for blocking unwanted and inappropriate content with the use of pre-defined category-based web filtering and custom white/black lists; providing online non-downloadable software for defending service from distributed denial of service ("DDoS") attacks; providing online non-downloadable software for cleaning and filtering of malicious internet traffic; network and data security technological advisory services including assessing for others the vulnerability of online systems, and prescribing for other fixes for weaknesses and gauges for performance for protection against cyber threats and interruptions; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control of the web sites of others

Goods & Services
Providing multiple user access to global computer information networks for the transfer and dissemination of a wide range of information, none of the foregoing including and all excluding digital media streaming services, streaming of audio or video material on the internet via televisions, mobile phones and games consoles, streaming of audio or video material via third party devices, or operation of chat rooms

Goods & Services
"FIREWALL"; Computer security services, namely, providing temporary use of non-downloadable cloud-based firewall computer software for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Providing temporary use of non-downloadable cloud-based software for integrated user identification to ensure the appropriate enforcing, restricting and controlling access privileges policies are applied for the device; Computer security services for protecting online businesses from effects of domain name server (DNS)-based distributed denial-of-service (DDoS) attacks and other threats, namely, restricting unauthorized network access by users and devices; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing on-line non-downloadable software for threat detection, mitigation and resolution services; Providing on-line non-downloadable software for bot management, mitigation, protection and guarding; Providing on-line non-downloadable software for business information services, data analytics, databases and information for business; Consultation services in the fields of telecommunications technology and information technology and technical consultation in the fields of API security, network security, computer security, firewalls, domain name server (DNS)-based distributed denial-of-service (DDoS), malware, ransomware, phishing, domain name server (DNS) data exfiltration, advanced zero-day attacks, threat detection, mitigation and resolution services, global computer information network connectivity, telecommunications, and related hardware and software




Goods & Services
Computer hardware and downloadable software for use in assessing, analyzing and making inferences with respect to detecting, mitigating and resolving Internet traffic threats, assessing intelligence data, and analyzing and making inferences regarding end user's Internet traffic to determine how such traffic should be handled; Downloadable software for use in providing statistical analysis of business functions; downloadable software for providing demographic information and data concerning the geographic location of internet access devices used by consumers, the geographic locations of consumers, the connection speed and method by which consumers are accessing the internet, and the specific types of devices used by consumers to access the internet; Downloadable software for providing access to and creating databases featuring IT information about Internet Protocol addresses in the nature of the user's location, Internet service provider, organization, connection type, user type and other data associated with specific Internet Protocol addresses; Downloadable software for providing access to technology that allows users to determine the location, Internet service provider, organization, connection type, user type, and other data associated with specific Internet Protocol addresses; Downloadable software for providing (IP) address verification services; Downloadable software for providing access to and creating databases featuring the location, internet service provider and organization associated with specific internet addresses; Downloadable software for providing identification of website visitor geographical location by using IP address; Downloadable software for providing identification of the location and other characteristics of Internet users for a wide range of applications including content personalization, fraud detection, ad targeting, traffic analysis, compliance, geo-targeting, geofencing and digital rights management; Downloadable software for providing internet directory services, namely, recursive domain name server (DNS) services; Downloadable software for identification and tracking of IP addresses and ranking or scoring them according to their reputation; Downloadable software for use in detecting, mitigating and resolving Internet traffic threats and for use in providing intelligence data to assess, analyze and make inferences regarding an end user's Internet traffic, to make determinations as to how such traffic should be handled; Downloadable software for use in detecting, mitigating and resolving Internet traffic security threats; Downloadable software for use in compiling computer security threat intelligence data to assess, analyze and make inferences regarding an end user's Internet traffic and to make determinations as to how such traffic should be handled; Downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming Internet traffic is malicious and to discover associations among threat actors to track and block their activity; Providing on-line searchable databases featuring IT information about Internet Protocol addresses in the nature of the user's location, Internet service provider, organization, connection type, user type and other data associated with specific Internet Protocol addresses; computer services, namely, providing an interactive web site featuring technology that allows users to determine the location, Internet service provider, organization, connection type, user type, and other data associated with specific Internet Protocol addresses; Internet Protocol (IP) address verification services; providing online searchable databases featuring the location, internet service provider and organization associated with specific internet addresses; providing an interactive website featuring technology that enables users to identify the geographical location of website visitors by IP address, for a wide range of applications including fraud detection, compliance, geo-targeting, geo-fencing and digital rights management; computer security threat analysis for protecting data by providing using threat analysis data to assess, analyze and make inferences regarding an end user's Internet traffic and to make determinations as to how such traffic should be handled; Network security and threat detection, mitigation and resolution services, namely, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; electronic monitoring and reporting of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic using computers for security purposes and providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use of non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats; providing temporary use of on-line non-downloadable software for use in preventing access to malicious websites and online threats; providing temporary use on online non-downloadable software for use in blocking unwanted and inappropriate internet and network traffic, for mitigating against and defending networks and websites from distributed denial of service ("DDoS") attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; Computer security services, namely, a providing temporary use of non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing temporary use of cloud-based computer software for domain name system (DNS resolution services); computer security threat analysis for protecting data by protecting online businesses from the effects of DNS-based DDoS attacks and other threats; computer security threat analysis for protecting data through identification, blocking and mitigating targeted online threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing temporary use of on-line non-downloadable website software application and API security and threat detection, mitigation and resolution services, namely, a web application firewall (WAF) that cleans, scrubs and filters malicious attacks against website software applications and application programming interface (API's); electronic monitoring of website software applications and API's for security purposes and providing related reports featuring suspicious and abnormal patterns, anomalies and activities; providing temporary use of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and API's; computer security services, namely, providing temporary use of online non-downloadable software for use restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and API's, mitigating against and defending attacks against website software applications and API's and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; DNS resolver services that make DNS queries faster and more secure for faster and more private browsing of the Internet, namely, providing temporary use on online non-downloadable computer software for use in securing and speeding internet browsing capacity; global DNS resolution service, namely, computer code conversion for others; providing temporary use of non-downloadable software for use in providing an internet directory comprising recursive domain name server (DNS) services

Goods & Services
Business management; business administration services; business information services; Electronic commerce services, namely, providing information about products via telecommunication networks for advertising and sales purposes; Collection and systematization of business data; Services consisting of the registration, collection, transcription, compilation and systemization of written communications and data; providing data collection and retrieval services for business purposes; computerized data verification, namely, verifying business information in the nature of verifying the credentials of computerized business communications and data sources for business purposes; consultancy services in the fields of e-commerce, business management and administration; Data processing verification, namely, systemization and synchronization of data in computer databases; commercial trading and consumer information services, namely, namely, providing consumer information in the field of on-line advertising and real-time media trading; customer loyalty, incentive and bonus program services for commercial, promotional and advertising purposes; business records management; preparation of business strategical data in the nature of data compiling and analyzing relating to business management; Business consultancy and advisory services; Business consultancy services relating to the supply of quality management systems; subscriptions to telecommunications database services in the nature of arranging subscriptions to telecommunication services for others; administrative data processing services; data processing services; Computerized point-of-sale data collection services for retailers, namely, electronic data collection and data submission services for business purposes in the field of retail stores featuring a wide variety of consumer goods of others; Providing an online computer database in the field of business information; database management; all of the aforementioned with the exception of authorization, producing or manufacture of Legal Entity Identifier-codes

Goods & Services
Business management; business administration services; business information services; Electronic commerce services, namely, providing information about products via telecommunication networks for advertising and sales purposes; Collection and systematization of business data; Services consisting of the registration, collection, transcription, compilation and systemization of written communications and data; providing data collection and retrieval services for business purposes; computerized data verification, namely, verifying business information in the nature of verifying the credentials of computerized business communications and data sources for business purposes; consultancy services in the fields of e-commerce, business management and administration; Data processing verification, namely, systemization and synchronization of data in computer databases; commercial trading and consumer information services, namely, namely, providing consumer information in the field of on-line advertising and real-time media trading; customer loyalty, incentive and bonus program services for commercial, promotional and advertising purposes; business records management; preparation of business strategical data in the nature of data compiling and analyzing relating to business management; Business consultancy and advisory services; Business consultancy services relating to the supply of quality management systems; subscriptions to telecommunications database services in the nature of arranging subscriptions to telecommunication services for others; administrative data processing services; data processing services; Computerized point-of-sale data collection services for retailers, namely, electronic data collection and data submission services for business purposes in the field of retail stores featuring a wide variety of consumer goods of others; Providing an online computer database in the field of business information; database management; all of the aforementioned with the exception of authorization, producing or manufacture of Legal Entity Identifier-codes


Owner:
Serial:87271895
Filed:Dec 16, 2016
Classes:9, 16, 38, +2
Registration:5389494
Registered:Jan 30, 2018
Goods & Services
Class 009: Computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; Computer software for identity security; Computer software for authentication and identity management information security Computer software for authorizing access to databases; Computer software to ensure the security of online data and systems; Computer software for encryption to ensure the security of an individual or organization's identity; Computer software for use in monitoring computers for security purposes; Downloadable electronic publications in the nature of manuals, white papers, articles, and technical documentation manuals in the fields of computer hardware and software, digital telecommunications, consumer electronics, and information technologies; Class 016: printed matter and publications, namely, white papers in the field of computers and digital security certificates; Class 038: electronic transmission of information regarding authentication of personal identification information, via the Internet for business, individuals and sellers; Class 042: Encryption and decryption of data and communications; Providing technical and customer support services, namely, encryption of a digital communication and technical support in the nature of computer help desk services for issuance and management of digital certificates for digital communication, digital signature, and digital computer code authentication and encryption; Managed public key infrastructure services, namely, authentication, issuance and validation of digital certificates; Computer security services in the nature of providing issuance of digital certificates for others via a global computer network; Monitoring of computer systems and networks for security purposes; Security consulting about creating and implementing procedures and practices for issuing and managing digital certificates; Authentication services for computer code and digital documents; Class 045: Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Identification verification services, namely, providing authentication of personal identification information; Providing user authentication services in e-commerce transactions

Owner:
Serial:87271940
Filed:Dec 16, 2016
Classes:9, 16, 38, +2
Registration:5383670
Registered:Jan 23, 2018
Goods & Services
Class 009: Computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; Computer software for identity security; Computer software for authentication and identity management information security Computer software for authorizing access to databases; Computer software to ensure the security of online data and systems; Computer software for encryption to ensure the security of an individual or organization's identity; Computer software for use in monitoring computers for security purposes; Downloadable electronic publications in the nature of manuals, white papers, articles, and technical documentation manuals in the fields of computer hardware and software, digital telecommunications, consumer electronics, and information technologiesc; Class 016: printed matter and publications, namely, white papers in the field of computers and digital security certificates; Class 038: electronic transmission of information regarding authentication of personal identification information, via the Internet for business, individuals and sellers; Class 042: Encryption and decryption of data and communications; Providing technical and customer support services, namely, encryption of a digital communication and technical support in the nature of computer help desk services for issuance and management of digital certificates for digital communication, digital signature, and digital computer code authentication and encryption; Managed public key infrastructure services, namely, authentication, issuance and validation of digital certificates; Computer security services in the nature of providing issuance of digital certificates for others via a global computer network; Monitoring of computer systems and networks for security purposes; Security consulting about creating and implementing procedures and practices for issuing and managing digital certificates; Authentication services for computer code and digital documents; Class 045: Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Identification verification services, namely, providing authentication of personal identification information; Providing user authentication services in e-commerce transactions

Owner:
Serial:87271927
Filed:Dec 16, 2016
Classes:9, 16, 38, +2
Registration:5410189
Registered:Feb 27, 2018
Goods & Services
Computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; Computer software for identity security; Computer software for authentication and identity management information security Computer software for authorizing access to databases; Computer software to ensure the security of online data and systems; Computer software for encryption to ensure the security of an individual or organization's identity; Computer software for use in monitoring computers for security purposes; Downloadable electronic publications in the nature of manuals, white papers, articles, and technical documentation manuals in the fields of computer hardware and software, digital telecommunications, consumer electronics, and information technologies | Printed matter and publications, namely, white papers in the field of computers and digital security certificates | electronic transmission of information regarding authentication of personal identification information, via the Internet for business, individuals and sellers | Encryption and decryption of data and communications; Providing technical and customer support services, namely, encryption of a digital communication and technical support in the nature of computer help desk services for issuance and management of digital certificates for digital communication, digital signature, and digital computer code authentication and encryption; Managed public key infrastructure services, namely, authentication, issuance and validation of digital certificates; Computer security services in the nature of providing issuance of digital certificates for others via a global computer network; Monitoring of computer systems and networks for security purposes; Security consulting about creating and implementing procedures and practices for issuing and managing digital certificates; Authentication services for computer code and digital documents | Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Identification verification services, namely, providing authentication of personal identification information; Providing user authentication services in e-commerce transactions

Owner:
Serial:87271884
Filed:Dec 16, 2016
Classes:9, 16, 38, +2
Registration:5383664
Registered:Jan 23, 2018
Goods & Services
Computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; Computer software for identity security; Computer software for authentication and identity management information security Computer software for authorizing access to databases; Computer software to ensure the security of online data and systems; Computer software for encryption to ensure the security of an individual or organization's identity; Computer software for use in monitoring computers for security purposes; Downloadable electronic publications in the nature of manuals, white papers, articles, and technical documentation manuals in the fields of computer hardware and software, digital telecommunications, consumer electronics, and information technologies | Printed matter and publications, namely, white papers in the field of computers and digital security certificates | electronic transmission of information regarding authentication of personal identification information, via the Internet for business, individuals and sellers | Encryption and decryption of data and communications; Providing technical and customer support services, namely, encryption of a digital communication and technical support in the nature of computer help desk services for issuance and management of digital certificates for digital communication, digital signature, and digital computer code authentication and encryption; Managed public key infrastructure services, namely, authentication, issuance and validation of digital certificates; Computer security services in the nature of providing issuance of digital certificates for others via a global computer network; Monitoring of computer systems and networks for security purposes; Security consulting about creating and implementing procedures and practices for issuing and managing digital certificates; Authentication services for computer code and digital documents | Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Identification verification services, namely, providing authentication of personal identification information; Providing user authentication services in e-commerce transactions

Goods & Services
Class 035: Business management and consulting services for the data security and information technology industry, namely, providing industry expertise; business development services; advertising and marketing consultancy; market research and business analyses; business advice and analysis of markets; sales volume tracking for others; consulting in the field of sales methods; providing an Internet website portal in the field of business development, sales and marketing; arranging and conducting incentive reward programs to promote the sale of data security software and services; providing a website featuring information about sales and marketing; Class 042: Providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; data encryption services; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting; scanning, and detection of viruses, worms, Trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; computer security services in the nature of providing an Internet trust center, namely, administration of digital keys and digital certificates; Class 045: Identification verification services, namely, providing authentication of business identification information; providing user identity authentication services in ecommerce transactions; providing information concerning authentication of user identification data for e-commerce transaction security; providing user authentication services in e-commerce transactions


Goods & Services
INSTALL

Goods & Services
"SECURITY"

Goods & Services
Computer software for providing network, Internet, and computer security; Internet security software, including computer software for use in the monitoring and control of computer and online activity; computer software for providing online transaction security; privacy control software; Providing information concerning authentication of user identification data for e-commerce transaction security; computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; providing user authentication services in e-commerce transactions; Computer consultation; computer consultation in the field of computer security; providing information in the field of computer network and Internet security; providing information concerning encryption of electronic data for website and e-commerce transaction security; computer and software consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites

Goods & Services
Class 045: Authentication, issuance and validation of digital certificates; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates



Goods & Services
Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates



Goods & Services
Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates

Goods & Services
Class 045: Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates

Goods & Services
"WILDCARD"

Goods & Services
"MOBILE TRANSACTION"


Goods & Services
"APP"

Goods & Services
"APPS"



Goods & Services
"FORUM"

Goods & Services
"FORUM"





Goods & Services
"SSL"

Goods & Services
"APPLICATION"





















