Providing educational training services based on cybersecurity risk levels of an individual and observed risky behavior of an individual; providing personalized educational training services to an individual based on observed cybersecurity risk behavior; simulation-based training services in the field of security awareness; training services in the field of security awareness and regulatory compliance; training services in the field of employer implementation of security awareness and regulatory compliance to employees; training services in the field of security awareness for the prevention of security breaches through phishing simulations and attacks; training services for employer implementation of phishing simulations and attacks; providing educational training in the field of cybersecurity, security awareness, and phishing simulations and attacks; educational services, namely, providing temporary use of a series of on-line non-downloadable videos in the field of digital security awareness for the purpose of training organizational employees how to be more security aware; Providing temporary use of non-downloadable software using behavioral analytics for human risk management, namely, predicting and identifying potential risks, and providing counteractive measures in the fields of cybersecurity; providing temporary use of on-line non-downloadable software for human risk management, namely, behavioral risk quantification based on risk assessments and behaviors of individuals in the fields of cybersecurity; providing temporary use of on-line non-downloadable software for identifying, assessing, and mitigating risks associated with human behavior in relation to an individual's use of technology; providing temporary use of on-line non-downloadable cloud computing software for use in processing user-reported phishing and other suspicious emails by grouping and categorizing emails based on rules, tags, and actions; software as a service (SAAS) services featuring software for providing internet security in the form of integrated security awareness training, and simulated attacks to assess vulnerabilities; technological consultation in the technology fields of computer security, network security, network security protocols, cybersecurity and phishing simulation and attacks; Computer security consultancy in the nature of measurement evaluations in the field of computer security, namely, the security awareness of individuals within an organization; providing temporary use of online non-downloadable computer software for stimulation of phishing scenarios and providing employees with training and awareness using real-world phishing threats; providing temporary use of online non-downloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail; providing temporary use of online non-downloadable software for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; providing temporary use of online non-downloadable software for cybersecurity training and reporting purposes that replicates real-world cyber-attacks to enable employees and others to identify, report, avoid cybersecurity threats, and notification of deceptive electronic messages and notification of trademark and brand abuse.
Providing educational training services based on cybersecurity risk levels of an individual and observed risky behavior of an individual; providing personalized educational training services to an individual based on observed cybersecurity risk behavior; simulation-based training services in the field of security awareness; training services in the field of security awareness and regulatory compliance; training services in the field of employer implementation of security awareness and regulatory compliance to employees; training services in the field of security awareness for the prevention of security breaches through phishing simulations and attacks; training services for employer implementation of phishing simulations and attacks; providing educational training in the field of cybersecurity, security awareness, and phishing simulations and attacks; educational services, namely, providing temporary use of a series of on-line non-downloadable videos in the field of digital security awareness for the purpose of training organizational employees how to be more security aware; "HUMAN RISK AWARENESS AND TRAINING"; Providing temporary use of non-downloadable software using behavioral analytics for human risk management, namely, predicting and identifying potential risks, and providing counteractive measures in the fields of cybersecurity; providing temporary use of on-line non-downloadable software for human risk management, namely, behavioral risk quantification based on risk assessments and behaviors of individuals in the fields of cybersecurity; providing temporary use of on-line non-downloadable software for identifying, assessing, and mitigating risks associated with human behavior in relation to an individual's use of technology; providing temporary use of on-line non-downloadable cloud computing software for use in processing userreported phishing and other suspicious emails by grouping and categorizing emails based on rules, tags, and actions; software as a service (SAAS) services featuring software for providing internet security in the form of integrated security awareness training, and simulated attacks to assess vulnerabilities; technological consultation in the technology fields of computer security, network security, network security protocols, cybersecurity and phishing simulation and attacks; Computer security consultancy in the nature of measurement evaluations in the field of computer security, namely, the security awareness of individuals within an organization; providing temporary use of online non-downloadable computer software for stimulation of phishing scenarios and providing employees with training and awareness using real-world phishing threats; providing temporary use of online non-downloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail; providing temporary use of online non-downloadable software for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; providing temporary use of online non-downloadable software for cybersecurity training and reporting purposes that replicates real-world cyber-attacks to enable employees and others to identify, report, avoid cybersecurity threats, and notification of deceptive electronic messages and notification of trademark and brand abus
Business administration of a resellers, distributors, managed service providers, solution and service providers, system integrators, consultants and technology partners program for enabling participants to customize go-to-markets strategies, benefits and requirements; business administration of a resellers, distributors, managed service providers solution and service providers, system integrators, consultants and technology partners program for providing partners licensing, order management and fulfillment of cyber security products and services, security services and cyber security product integrations.; "PARTNER"; Providing internet-accessible non-downloadable computer software and web applications for enabling resellers, distributors, managed service providers solution and service providers, system integrators, consultants and technology partners to promote and showcase products and services.
Business administration of a program for resellers, distributors, system integrators, consultants and technology companies for participants to receive customized go-to-markets marketing strategies, benefits and requirements information; business administration of a program for resellers, distributors, system integrators, consultants and technology companies for providing licensing, order management and fulfillment of cyber security software products; Providing temporary use of online non-downloadable computer software and web applications for cyber security services that enables resellers, distributors, system integrators, consultants and technology companies to promote and showcase products and services
Email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of data and emails recorded in electronic media; Electronic storage services for archiving electronic data and emails; Software as a service (SAAS) featuring software and software featuring artificial intelligence for use in the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, email continuity, email security and phishing and domain spoofing scams and attacks; storage services, namely, electronic storage of messages, text, images, data, information, files, vouchers and documents; electronic storage services for archiving database, images and other electronic data; Providing customized computer retrieval services, namely, retrieving data and electronically recorded information at the customer's specific request; electronic storage services for archiving of information, data, files, vouchers and documents; electronic storage of electronic media, namely, images, text, audio and video data; all the foregoing services provided by means of telephonic communication, online from a computer database, a global computer network, the internet or any other electronic, wireless or automated means; providing predictive analysis, namely, providing computer security threat analysis for protecting data from cyberattacks and digital attacks; providing temporary use of non-downloadable software, namely, software for use in susceptibility, detection, defense, blocking and take-down of phishing and domain spoofing scams and attacks
Email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of data and emails recorded in electronic media; Electronic storage services for archiving electronic data and emails; Software as a service (SAAS) featuring software and software featuring artificial intelligence for use in the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, email continuity, email security and phishing and domain spoofing scams and attacks; storage services, namely, electronic storage of messages, text, images, data, information, files, vouchers and documents; electronic storage services for archiving database, images and other electronic data; Providing customized computer retrieval services, namely, retrieving data and electronically recorded information at the customer's specific request; electronic storage services for archiving of information, data, files, vouchers and documents; electronic storage of electronic media, namely, images, text, audio and video data; all the foregoing services provided by means of telephonic communication, online from a computer database, a global computer network, the internet or any other electronic, wireless or automated means; providing predictive analysis, namely, providing computer security threat analysis for protecting data from cyberattacks and digital attacks; providing temporary use of non-downloadable software, namely, software for use in susceptibility, detection, defense, blocking and take-down of phishing and domain spoofing scams and attacks
Downloadable podcasts in the field of cybersecurity, cyber risk management, cyberattacks, cybersafety, protecting systems, networks, and programs from digital attacks
Class 009: Downloadable podcasts in the field of cybersecurity, cyber risk management, cyberattacks, cybersafety, protecting systems, networks, and programs from digital attacks; Class 041: Entertainment services in the nature of development, creation, production and post-production services of multimedia entertainment content; Educational services, namely, providing educational speakers in the field of cybersecurity, cyber risk management, cyberattacks, cybersafety, protecting systems, networks, and programs from digital attacks; Production of podcasts; and entertainment services, namely, providing podcasts in the field of cybersecurity, cyber risk management, cyberattacks, cybersafety, protecting systems, networks, and programs from digital attacks
Software as a service (SAAS) featuring software for viewing, analyzing, managing, saving, tracking, retrieving, filtering and routing electronic mail communications and information related to electronic mail communications; Computer security consultancy in the field of electronic communications and information related to electronic communications
Downloadable software and downloadable computer application software for mobile phones and handheld computers featuring software and artificial intelligence for use in the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, email continuity, email security and phishing and domain spoofing scams and attacks; Downloadable software and downloadable computer application software for mobile phones and handheld computers for computer virus protection and monitoring of computer systems for detecting unauthorized access or data breach | Email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of data and emails recorded in electronic media; Electronic storage services for archiving electronic data and emails; Software as a service (SAAS) featuring software and software using artificial intelligence for use in the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, email continuity, email security and phishing and domain spoofing scams and attacks
Downloadable video recordings in the fields of cyber risk management, cybersecurity, cyberattacks, cybersafety, and protecting systems, networks, and programs from digital attacks | Telecommunication and information services, namely, electronic transmission of data; electronic mail services, namely electronic transmission of emails through a global Internet or a local Intranet communication network or by telephone or data communications; communication services, namely, transmission of information, streamed sound and audio-visual recordings via computers, electronic mail and a global computer network; computer-aided transmission of messages and images; wireless digital messaging services; providing telecommunications connections to a global computer network | Storage services, namely, physical storage of electronically stored messages, text, images, data, information, files, vouchers and documents; physical storage of electronically stored databases, images and other electronically stored data | Educational services, namely, conducting seminars, conferences, workshops, and training and in the fields of cyber risk management, cybersecurity, cyberattacks, cybersafety, and protecting systems, networks, and programs from digital attacks and distributing course and educational materials in connection therewith; providing a website featuring non-downloadable videos in the fields of cyber risk management, cybersecurity, cyberattacks, cybersafety, and protecting systems, networks, and programs from digital attacks | Email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of data and emails recorded in electronic media; Electronic storage services for archiving electronic data and emails; Software as a service (SAAS) featuring software and software featuring artificial intelligence for use in the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, email continuity, email security and phishing and domain spoofing scams and attacks; storage services, namely, electronic storage of messages, text, images, data, information, files, vouchers and documents; electronic storage services for archiving database, images and other electronic data; retrieval of data and electronically recorded information; electronic storage services for archiving of information, data, files, vouchers and documents; electronic storage of electronic media; all the foregoing services provided by means of telephonic communication, online from a computer database, a global computer network, the internet or any other electronic, wireless or automated means; providing predictive analysis, namely, providing computer security threat analysis for protecting data from cyberattacks and digital attacks
Downloadable educational video recordings in the fields of cyber risk management, cybersecurity, cyberattacks, cybersafety, protecting systems, networks, and programs from digital attacks | Telecommunication and information services, namely, electronic transmission of data; electronic mail services, namely, transmission of electronic mail; communication services, namely, communication and transmission of information, streamed sound and audio-visual recordings via computers, electronic mail and a global computer network; computer-aided transmission of messages and images; wireless digital messaging services; providing telecommunications connections to a global computer network | Storage services, namely, storage of goods; archival services, namely, archiving of information, data, files, vouchers and documents in the nature of collection and storage of historical records and documents; all the foregoing services also provided by means of telephonic communication, online from a computer database, a global computer network, the internet or any other electronic, wireless or automated means | Educational services, namely, conducting seminars, conferences, non-downloadable videos, workshops, and training in the fields of cyber risk management, cybersecurity, cyberattacks, cybersafety, protecting systems, networks, and programs from digital attacks and distributing course and educational materials in connection therewith | Email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of data and emails recorded in electronic media; Electronic storage services for archiving electronic data and emails; Software as a service (SAAS) featuring software for use in the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, email continuity, email security and phishing and domain spoofing scams and attacks; electronic mail services, namely, e-mail time-stamping services, e-mail system design and implementation for others; Storage services, namely, electronic data storage of messages, text, images, data, information, files, vouchers and documents; storage services for archiving database, images and other electronic data; retrieval of data and electronically recorded information, namely, retrieving information and other resources available on computer networks for others; archiving of information, data, files, vouchers and documents, namely, electronic storage services for archiving electronic data; electronic storage of electronic media, namely, images, text and audio data; conducting predictive analysis in the fields of cyber risk management, cybersecurity, cyberattacks, cybersafety, protecting systems, networks, and programs from digital attacks, namely, computer security threat analysis for protecting data
Software as a service (SAAS) services in the field of migration of data between enterprise content management systems, e-mail, and electronically stored information, from one computer system to another; online, non-downloadable computer software designed to migrate data between enterprise content management systems, e-mail, and electronically stored information, from one computer system to another; Providing online websites and online services that gives computer users the ability to migrate data from one computer system to another and data migration
Platform as a services (PAAS) featuring computer software cloud platforms for transmitting e-mails, repository of electronic data, archiving, retention, retrieval, recovery, and synchronization of emails, and email continuity and management via a global computer network
Downloadable software, namely, software applications for mobile devices and mobile phones for consumers to access electronic data and information recorded in electronic media for transmitting e-mails and text messages, file archiving, and email continuity and management
"OS"; Platform as a service (PAAS) services featuring computer software cloud platforms for updating, creating, and enhancing software for the secure management of email and data
Email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of data and emails recorded in electronic media; Electronic storage services for archiving electronic data and emails; Software as a service (SAAS) featuring software for use in the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, and email continuity and email security
Email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of data and emails recorded in electronic media; Electronic storage services for archiving electronic data and emails; Software as a service (SAAS) featuring software for use in the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, and email continuity and email security
Class 038: Email management and continuity in the nature of email transmission and security services; providing electronic transmission of secure email; Class 042: SAAS services featuring software for customer relationship management for achieving self-defined desired customer outcomes across an entire customer journey and experience; cybersecurity, namely, computer security consultancy; email management in the nature of electronic storage of archived emails; testing, analysis, and evaluation of emails and email attachments of others to assure compliance with industry standards; Class 045: Cybersecurity, namely, computer security services in the nature of monitoring of computer systems for security purposes
Electronic apparatus and equipment used to manage and store electronic mail content, namely, computer hardware and software used to create personalized electronic mail content; computer hardware and software for use in electronic mail protection services, namely, computer virus and spam (unsolicited electronic mail) protection; computer hardware and software to enable electronic mail storage, computer hardware and software used to provide an Internet server or platform or a systems and operational environment for electronic mail management; computer hardware and software to track and filter electronic mail; electronic database of information recorded on computer media featuring electronic mail content | Telecommunication and information services, namely, electronic transmission of data; electronic mail services; communication services, namely, communication and transmission of information, streamed sound and audio-visual recordings via computers, electronic mail and a global computer network; computer-aided transmission of messages and images; wireless digital messaging services; providing telecommunications connections to a global computer network | Electronic storage of data and information recorded in electronic mail | Information technology and computer related services, namely, computer programming, for others, maintenance and updating of computer software; computer software design for others to create personalized electronic mail; recovery of computer data; the provision of search engines for obtaining data on a global network; creating and maintaining web sites for others; information services regarding information technology services, design services, namely the design of communication devices, apparatus, equipment, installations, machines and instruments; technical support and technical advisory services; namely, trouble shooting of software and electronic mail management system problems, technical support, namely, monitoring of software and electronic mail management systems and providing back-up software and facilities, rental of computer database software to operate electronic mail management systems; all of the aforegoing services also provided by means of telephone communication, online from a computer database, a global computer network, the Internet or any other electronic means
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.