Downloadable computer software for database management; downloadable computer software and databases for use in diagnosis, repair and configuration of computers; downloadable computer software for controlling and managing access server applications; downloadable computer software for the creation of firewalls; downloadable computer software for use in providing multiple user access to a global computer information network; downloadable security software; downloadable software for ensuring the security of electronic mail; "XDR CLOUD"; Cloud computing featuring software for use in database management; computer security services, namely, restricting unauthorized access to computer networks; computer security consultancy; debugging computer software for others; design and development of computer software; design and development of electronic data security systems; design and writing of computer software; design, development and implementation of software; design, development, installation, updating and maintenance of computer software; development of software for secure network operations; installation, maintenance and repair of Internet access software; internet security consultancy; maintenance of computer software relating to computer security and prevention of computer risks; maintenance of software for Internet access; monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems to detect breakdowns; providing online non-downloadable enterprise resource planning (ERP) software in the field of customer relationship management, database management, inventory management and field of supply chain management; providing quality assurance in the field of computer software; software as a service (SaaS) provider in the field of customer relationship management, human resources management, inventory management, providing customer relations management, revenue management, software for small business accounting and supply chain management; technical support in the form of monitoring global computer network systems; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, troubleshooting of computer software problems; providing temporary use of online non-downloadable computer software for database management; providing temporary use of online non-downloadable computer software and databases for use in diagnosis, repair and configuration of computers; providing temporary use of online non-downloadable computer software for controlling and managing access server applications; providing temporary use of online non-downloadable computer software for the creation of firewalls; providing temporary use of online non-downloadable computer software for use in providing multiple user access to a global computer information network; providing temporary use of online non-downloadable security software; providing temporary use of online non-downloadable software for ensuring the security of electronic mail
Downloadable computer software for database management; downloadable computer software and databases for use in diagnosis, repair and configuration of computers; downloadable computer software for controlling and managing access server applications; downloadable computer software for the creation of firewalls; downloadable computer software for use in providing multiple user access to a global computer information network; downloadable security software; downloadable software for ensuring the security of electronic mail; "XDR CLOUD"; Cloud computing featuring software for use in database management; computer security services, namely, restricting unauthorized access to computer networks; computer security consultancy; debugging computer software for others; design and development of computer software; design and development of electronic data security systems; design and writing of computer software; design, development and implementation of software; design, development, installation, updating and maintenance of computer software; development of software for secure network operations; installation, maintenance and repair of Internet access software; internet security consultancy; maintenance of computer software relating to computer security and prevention of computer risks; maintenance of software for Internet access; monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems to detect breakdowns; providing online non-downloadable enterprise resource planning (ERP) software in the field of customer relationship management, database management, inventory management and field of supply chain management; providing quality assurance in the field of computer software; software as a service (SaaS) provider in the field of customer relationship management, human resources management, inventory management, providing customer relations management, revenue management, software for small business accounting and supply chain management; technical support in the form of monitoring global computer network systems; technical support services in the form of troubleshooting of computer hardware and software problems; providing temporary use of online non-downloadable computer software for database management; providing temporary use of online non-downloadable computer software and databases for use in diagnosis, repair and configuration of computers; providing temporary use of online non-downloadable computer software for controlling and managing access server applications; providing temporary use of online non-downloadable computer software for the creation of firewalls; providing temporary use of online non-downloadable computer software for use in providing multiple user access to a global computer information network; providing temporary use of online non-downloadable security software; providing temporary use of online non-downloadable software for ensuring the security of electronic mail
Information technology security network infrastructure monitoring and consulting services, namely, providing security strategies to enterprises to help them guard their intellectual property, data and network infrastructure against cyber security attack, and conducting security and vulnerability or penetration assessments; Information technology security monitoring services to assist enterprises in guarding and maintaining operational their information technology infrastructures, namely, monitoring of computer systems for detecting unauthorized access or data breaches and proper functioning; Information technology security incident response services, namely, recovery of computer data; managed information technology security services, namely, hard drive erasure, restricting unauthorized access to hard drives, computer networks, websites, providing authentication, issuance, validation and revocation of digital certificates
Information technology security monitoring services to assist enterprises in guarding and maintaining operational their information technology infrastructures, namely, monitoring of computer systems for detecting unauthorized access or data breaches and proper functioning; Information technology security incident response services, namely, recovery of computer data; managed information technology security services, namely, hard drive erasure, restricting unauthorized access to hard drives, computer networks, websites, providing authentication, issuance, validation and revocation of digital certificates
Information technology security monitoring services to assist enterprises in guarding and maintaining operational their information technology infrastructures, namely, monitoring of computer systems for detecting unauthorized access or data breaches and proper functioning; Information technology security incident response services, namely, recovery of computer data; managed information technology security services namely, hard drive erasure, restricting unauthorized access to hard drives, computer networks, websites, providing authentication, issuance, validation and revocation of digital certificates
Class 009: internet security software; Computer software for use in the fields of cyber security and data breach protection and recovery, cyber security technology integration and processing; Class 042: Information technology security monitoring services to assist enterprises in guarding and maintaining operational their information technology infrastructures; Information technology security incident response services; managed information technology security services
Class 009: internet security software; Computer software for use in the fields of cyber security and data breach protection and recovery, cyber security technology integration and processing; Class 042: Information technology security monitoring services to assist enterprises in guarding and maintaining operational their information technology infrastructures; Information technology security incident response services; managed information technology security services
Class 009: internet security software; Computer software for use in the fields of cyber security and data breach protection and recovery, cyber security technology integration and processing; Class 042: Information technology security monitoring services to assist enterprises in guarding and maintaining operational their information technology infrastructures; Information technology security incident response services; managed information technology security services
Computer software feature for creating contextualized reports on malicious cyber hacker, network attacker, or advanced adversarial network actors through time
"MANAGED DETECTION AND RESPONSE"; Information technology security network infrastructure monitoring and consulting services, namely, providing security strategies to enterprises to help them guard their intellectual property, data and network infrastructure against cyber security attack, and conducting security and vulnerability or penetration assessments; Information technology security monitoring services to assist enterprises in guarding and maintaining operational their information technology infrastructures; information technology security incident response services, namely, restricting unauthorized computer network access by users without credentials; Managed information technology security services, namely, computer security threat analysis for protecting data
Class 042: Software maintenance and technical support services in the nature of diagnosing computer hardware and software problems; consulting services for predictive analytics, namely, consulting regarding data mining for the purpose of prediction of future probabilities and trends; Providing temporary use on non-downloadable software for implementing and running predictive analysis models on computers; Providing temporary use of non-downloadable software for performing data mining and prediction of future probabilities
Class 009: Software for implementing and running predictive analysis models on computers; software for performing data mining and prediction of future probabilities
(Based on 44(e)) Internet security software; downloadable computer software for use in preventing unauthorized access to computer and electronics systems | (Based on 44(e)) (Based on Use in Commerce) internet security services, namely, computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates
Class 042: Information technology security network infrastructure monitoring and consulting services, namely, providing security strategies to enterprises to help them guard their intellectual property, data and network infrastructure against cyber security attack, and conducting security and vulnerability or penetration assessments; Information technology security monitoring services to assist enterprises in guarding and maintaining operational their information technology infrastructures; computer services, namely, information technology security incident response services, namely, emergency and crisis response services
Educational services, namely, providing training at academic and field training centres in the fields of homeland and cyber security, private and community security and dignitary protection; providing online non-downloadable computer based training (CBT) featuring cybersecurity; providing a simulator training facility in the field of cyber security training; "TRAINING"
Class 009: Software for implementing and running predictive analysis models on computers; computers programmed with software for implementing and running predictive analysis models, namely, software for developing and running models and user interface software for interacting with and visualizing the output of models
business management services in the field of information technology security; Monitoring of information technology systems of others for security purposes, namely, to assist enterprises in guarding and maintaining operational their information technology infrastructures; information technology security incident response services in the nature of monitoring of information technology systems of others for security purposes, namely, detection of security incidents requiring response; "HOST"; Information technology security incident response services in the nature of computer security consultancy in the field of scanning and penetration testing of information technology computers and networks to assess information security vulnerabilities; computer services, namely, management of computer software systems used in provision of information technology security services for others; managed information technology computer security services, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities, providing computer virus protection services, providing computer services, namely, online scanning and detecting of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices
business management services in the field of information technology security; Monitoring of information technology systems of others for security purposes, namely, to assist enterprises in guarding and maintaining operational their information technology infrastructures; information technology security incident response services in the nature of monitoring of information technology systems of others for security purposes, namely, detection of security incidents requiring response; "LOG"; Information technology security incident response services in the nature of computer security consultancy in the field of scanning and penetration testing of information technology computers and networks to assess information security vulnerabilities; computer services, namely, management of computer software systems used in provision of information technology security services of others; managed information technology computer security services, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities, providing computer virus protection services, providing computer services, namely, online scanning and detecting of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices
business management services in the field of information technology security; Monitoring of information technology systems of others for security purposes, namely, to assist enterprises in guarding and maintaining operational their information technology infrastructures; information technology security incident response services in the nature of monitoring of information technology systems of others for security purposes, namely, detection of security incidents requiring response; "TARGETED RETROSPECTIVE ANALYSIS PLATFORM"; Information technology security incident response services in the nature of computer security consultancy in the field of scanning and penetration testing of information technology computers and networks to assess information security vulnerabilities; computer services, namely, management of computer software systems used in provision of information technology security services for others; managed information technology computer security services, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities, providing computer virus protection services, providing computer services, namely, online scanning and detecting of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices
business management services in the field of information technology security | Information technology security incident response services in the nature of computer security consultancy in the field of scanning and penetration testing of information technology computers and networks to assess information security vulnerabilities; computer services, namely, management of computer software systems used in provision of information technology security services for others; managed information technology computer security services, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities, providing computer virus protection services, providing computer services, namely, online scanning and detecting of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices | Monitoring of information technology systems of others for security purposes, namely, to assist enterprises in guarding and maintaining operational their information technology infrastructures; information technology security incident response services in the nature of monitoring of information technology systems of others for security purposes, namely, detection of security incidents requiring response
Computer security consultancy for information technology enterprises, namely, providing security strategies to enterprises to help them guard their computer intellectual property and infrastructure hardware; computer security consultancy in the field of scanning and penetration testing of computers and networks, namely, conducting information technology security and vulnerability assessments; computer services, namely, information technology security monitoring services to assist enterprises in maintaining operation of their information technology infrastructures; computer services, namely, information technology security incident response services, namely, emergency and crisis response services