Venture capital advisory services; Venture capital financing; Venture capital services, namely, providing financing to emerging and start-up companies; Business consulting, management, and planning services in the field of intellectual property and intellectual property licensing; Business management and organization consultancy; New business venture development and formation consulting services; Innovation consulting services, namely, advising others in the areas of marketing and business development; Consultancy relating to the management of intellectual property; Consulting in the field of intellectual property licensing; Intellectual property consultancy; Licensing of intellectual property; Innovation consulting services, namely, advising others in the areas of intellectual property, and also intellectual property specifically as it relates to technology transfer; Innovation consulting services, namely, advising others in the areas of product development
Computer hardware in the field of cybersecurity vulnerability testing of networked devices; Computer hardware for assessing and identifying vulnerabilities and cybersecurity threats and risks in control system infrastructure, control systems, networks and devices, and testing the effectiveness of cybersecurity applications, devices and systems to achieve optimal device and network security; Downloadable computer software for assessing and identifying vulnerabilities and cybersecurity threats and risks in control system infrastructure, control systems, networks and devices, and testing the effectiveness of cybersecurity applications, devices and systems to achieve optimal device and network security; Downloadable computer software in the field of cybersecurity vulnerability testing of networked devices; Network devices, namely, computer networks and platforms, comprising computer hardware, computer network adapters, computer network switches, computer network routers and computer network hubs, and downloadable computer firmware and downloadable computer software, for enhancing industrial automation and for assessing and identifying vulnerabilities and cybersecurity threats and risks in control system infrastructure, computer control systems, networks and devices, and for testing the effectiveness of cybersecurity applications, devices, and systems to achieve optimal network security, all in the field of cybersecurity vulnerability testing; Updating of computer hardware in the field of cybersecurity vulnerability testing of networked devices; updating of computer hardware relating to computer security and prevention of computer risks in the field of cybersecurity
Hardware, embedded software, namely, firmware, and software for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and testing the effectiveness of cyber security applications and devices and systems to achieve optimal device and network security, in the field of cyber security vulnerability testing of networked devices; computer hardware in the field of cyber security vulnerability testing of networked devices
Class 042: Consulting services in the field of testing and assessing networked devices for cyber security vulnerabilities and risks; maintenance and support services for computer software in the field of cyber security vulnerability testing of networked devices; support services in the nature of diagnosing problems for computer hardware in the field of cyber security vulnerability testing of networked devices; providing updates for computer software in the field of cyber security vulnerability testing of networked devices; computer consultation in the field of cyber security, namely, providing approvals that minimum security levels have been achieved in the field of cyber security vulnerability testing of networked devices; Class 045: [ Monitoring of computer systems for security purposes, namely, to provide approvals that minimum security levels have been achieved in the field of cyber security vulnerability testing of networked devices ]
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.