Optimas.AI Inc. logo

Optimas.AI Inc.

13 Marks
Corp.
First Filed:Nov 13, 2023Latest Filed:Nov 13, 2023Address:447 Broadway, 2nd Floor Suite #1902, New York, NY 10013

Portfolio Overview

Pending
12(92%)
Dead
1(8%)

Top Classes

Class 42
Software, IT Services & Scientific Research
12(92%)
Class 35
Advertising, Business Services & Retail
12(92%)
Class 9
Electronics, Software & Scientific Equipment
12(92%)

TTAB Proceedings

Total Proceedings
1
As Plaintiff
0(0%)
As Defendant
1(100%)

Top Firms

JCameron IP Law Firm LLC(Nov 2023)
13

Trademark Portfolio

13 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
98266966
98266966
Trademark
Design
ITU
PENDING
Owner:
Serial:98266966
Filed:Nov 13, 2023
Classes:9, 35, 42
Goods & Services
Downloadable software for managing business technology exposure and resilience, specifically designed to sense, detect, predict, prevent, respond, orchestrate, govern and assure data related to cybersecurity risks and threats; downloadable software for identifying, assessing, and mitigating risks associated with business technology systems, focusing on enhancing resilience against cyber threats and vulnerabilities; downloadable software for threat detection and risk management, tailored to monitor and secure business technology environments from unauthorized access and cyber-attacks; Business management consultancy in the field of digital technology; Business consulting for enterprises; Business information for enterprises; Business consultancy services for enterprises; Business information services for enterprises; Business planning services for enterprises related to online and cybersecurity threats and countermeasures; Operational business assistance to enterprises; Business management and enterprise organisation consultancy; Business management and enterprise organization consultancy services; Business risk management; Business risk assessment; Business risk management services; Advisory services relating to business risk management; Business risk assessment services; Business risk management services in the field of computer systems; Enterprise content management, namely, providing temporary use of online non-downloadable software for managing business technology exposure and resilience; research in the field of cybersecurity; technological consultancy in the field of cybersecurity; computer technology consultancy, specifically in cybersecurity and business technology risk management; computer security services, namely, restricting unauthorized network access to customer and proprietary files and servers by users without credentials, and protecting computer systems from cyber threats namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security system monitoring services focusing on near real-time detection and management of risks to business technology environments to include login verification, user identity, and spam/threat detection of unauthorized users; professional computer security consultancy specializing in enterprise cybersecurity strategies that focuses on enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets; computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience; consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management; consulting services in the field of software as a service (SAAS), with a focus on protecting business technology environments; provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks for computerized transactions, namely, restricting unauthorized network access to customer and proprietary files and servers by users without credentials; computer security consultancy in the field of scanning of computers and networks to assess information security vulnerabilities
ACVM (AUTONOMOUS CONTROL VALIDATION & MONITORING)
Owner:
Serial:98266898
Filed:Nov 13, 2023
Classes:9, 35, 42
Goods & Services
Downloadable software for autonomous control validation and monitoring, specifically designed to sense, detect, predict, prevent, respond, orchestrate, govern and assure data related to cybersecurity and system vulnerabilities; downloadable software for risk detection in the nature of identifying and mitigating threats in computer systems and networks; downloadable software for threat detection, designed to automatically monitor and validate the effectiveness of security controls within business technology environments; downloadable computer software for the detection and monitoring of threats to computer networks, ensuring the continuous validation and resilience of security controls; Business management consultancy in the field of digital technology; Business consulting for enterprises; Business information for enterprises; Business consultancy services for enterprises; Business information services for enterprises; Business planning services for enterprises; Operational business assistance to enterprises; Business management and enterprise organisation consultancy; Business management and enterprise organization consultancy services; Business risk management; Business risk assessment; Business risk management services; Advisory services relating to business risk management; Business risk assessment services; Business risk management services in the field of computer systems; "AUTONOMOUS CONTROL VALIDATION & MONITORING"; Enterprise content management, namely, providing temporary use of online non-downloadable software for autonomous control validation and monitoring within business technology environments; research in the field of cybersecurity; technological consultancy in the field of cybersecurity; computer technology consultancy, specifically in the areas of cybersecurity risk management, and validation of security controls; computer security services, namely, restricting unauthorized network access and continuously validating the effectiveness of security controls through automated monitoring systems; computer security system monitoring services, in the nature of near real-time, automated validation of cybersecurity controls to ensure autonomous resilience; professional consulting services specializing in enterprise cybersecurity strategies, in the nature of enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets; computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience; consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management; consulting services in the field of software as a service (SAAS), in the nature of protecting business technology environments; provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks for computerized transactions; computer security consultancy in the field of scanning of computers and networks to assess information security vulnerabilities
ASE (ATTACK SURFACE EMULATION)
PENDING
Owner:
Serial:98266909
Filed:Nov 13, 2023
Classes:9, 35, 42
Goods & Services
Downloadable software for cybersecurity, specifically designed for attack surface emulation, allowing users to sense, detect, predict, prevent, respond, orchestrate, govern, and assure potential vulnerabilities within computer systems and networks; downloadable software platform designed to simulate attack surfaces within an enterprise's technology environment, enabling proactive assessment and management of cybersecurity risks; downloadable software for risk detection, focusing on the identification of vulnerabilities and exposure points within a computer network; Business management consultancy in the field of digital technology; Business consulting for enterprises; Business information for enterprises; Business consultancy services for enterprises; Business information services for enterprises; Business planning services for enterprises; Operational business assistance to enterprises; Business management and enterprise organisation consultancy; Business management and enterprise organization consultancy services; Business risk management; Business risk assessment; Business risk management services; Advisory services relating to business risk management; Business risk assessment services; Business risk management services in the field of computer systems; "ATTACK SURFACE EMULATION"; Enterprise content management, namely, providing the temporary use of online non-downloadable software for attack surface emulation within the business technology environments; research in the field of cybersecurity; technological consultancy in the field of cybersecurity; computer technology consultancy specifically in the areas of cybersecurity risk management and the use of attack surface emulation for pre-empting, preventing, and continuous monitoring of vulnerabilities; computer security services, namely, restricting unauthorized network access and continuously validating the effectiveness of security controls; computer security system monitoring services in the nature of near real-time, automated emulation of attack surfaces to ensure system resilience; professional consulting services specializing in enterprise cybersecurity strategies, in the nature of enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets; computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience; consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management; consulting services in the field of software as a service (SAAS), with a focus on protecting business technology environments; provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks; computer security consultancy in the field of scanning of computers and networks to assess information security vulnerabilities
BTER (BUSINESS TECHNOLOGY EXPOSURE AND RESILIENCE)
Owner:
Serial:98266892
Filed:Nov 13, 2023
Classes:9, 35, 42
Goods & Services
Downloadable software for managing business technology exposure and resilience, specifically designed to sense, detect, predict, prevent, respond, orchestrate, govern, and assure data related to cybersecurity risks and threats; downloadable software for identifying, assessing, and mitigating risks associated with business technology systems, focusing on enhancing resilience against cyber threats and vulnerabilities; downloadable software for threat detection and risk management, tailored to monitor and secure business technology environments from unauthorized access and cyber-attacks; Business management consultancy in the field of digital technology; Business consulting for enterprises; Business information for enterprises; Business consultancy services for enterprises; Business information services for enterprises; Business planning services for enterprises; Operational business assistance to enterprises; Business management and enterprise organisation consultancy; Business management and enterprise organization consultancy services; Business risk management; Business risk assessment; Business risk management services; Advisory services relating to business risk management; Business risk assessment services; Business risk management services in the field of computer systems; "BUSINESS TECHNOLOGY EXPOSURE RESILIENCE"; Enterprise content management, namely, providing temporary use of online non-downloadable enterprise software for managing business technology exposure and resilience; research in the field of cybersecurity; technological consultancy in the field of cybersecurity; computer technology consultancy, specifically in cybersecurity and business technology risk management; computer security services, namely, restricting unauthorized network access by users without credentials, and monitoring and protecting computer systems from cyber threats; computer security system monitoring services, in the nature of near real-time detection and management of risks to business technology environments; professional consulting services specializing in enterprise cybersecurity strategies, in the nature of enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets; computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience; consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management; consulting services in the field of software as a service (SAAS), in the nature of protecting business technology environments; provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks for computerized transactions; computer security consultancy in the field of scanning of computers and networks to assess information security vulnerabilities
BTER-ML (BTER MARKUP LANGUAGE)
PENDING
Owner:
Serial:98266911
Filed:Nov 13, 2023
Classes:9, 35, 42
Goods & Services
Downloadable software for managing business technology exposure and resilience, specifically designed to sense, detect, predict, prevent, respond, orchestrate, govern, and assure data related to cybersecurity risks and threat; downloadable software for identifying, assessing, and mitigating risks associated with business technology systems, focusing on enhancing resilience against cyber threats and vulnerabilities; downloadable software for threat detection and risk management, tailored to monitor and secure business technology environments from unauthorized access and cyber-attacks; Business management consultancy in the field of digital technology; Business consulting for enterprises; Business information for enterprises; Business consultancy services for enterprises; Business information services for enterprises; Business planning services for enterprises; Operational business assistance to enterprises; Business management and enterprise organisation consultancy; Business management and enterprise organization consultancy services; Business risk management; Business risk assessment; Business risk management services; Advisory services relating to business risk management; Business risk assessment services; Business risk management services in the field of computer systems; "MARKUP LANGUAGE"; Enterprise content management, namely, providing temporary use of online non-downloadable enterprise software for managing business technology exposure and resilience; research in the field of cybersecurity; technological consultancy in the field of cybersecurity; computer technology consultancy, specifically in cybersecurity and business technology risk management; computer security services, namely, restricting unauthorized network access by users without credentials, and monitoring and protecting computer systems from cyber threats; computer security system monitoring services, in the nature of near real-time detection and management of risks to business technology environments; professional consulting services specializing in enterprise cybersecurity strategies, in the nature of enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets; computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience; consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management; consulting services in the field of software as a service (SAAS), in the nature of protecting business technology environments; provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks for computerized transactions; computer security consultancy in the field of scanning of computers and networks to assess information security vulnerabilities
BTER-Q (BTER QUOTIENT)
BTER-Q (BTER QUOTIENT)
Trademark
Word
ITU
PENDING
Owner:
Serial:98266920
Filed:Nov 13, 2023
Classes:9, 35, 42
Goods & Services
Downloadable software for managing business technology exposure and resilience, specifically designed to sense, detect, predict, prevent, respond, orchestrate, govern, and assure data related to cybersecurity risks and threats; downloadable software for identifying, assessing, and mitigating risks associated with business technology systems, focusing on enhancing resilience against cyber threats and vulnerabilities; downloadable software for threat detection and risk management, tailored to monitor and secure business technology environments from unauthorized access and cyber-attacks; Business management consultancy in the field of digital technology; Business consulting for enterprises; Business information for enterprises; Business consultancy services for enterprises; Business information services for enterprises; Business planning services for enterprises; Operational business assistance to enterprises; Business management and enterprise organisation consultancy; Business management and enterprise organization consultancy services; Business risk management; Business risk assessment; Business risk management services; Advisory services relating to business risk management; Business risk assessment services; Business risk management services in the field of computer systems; "QUOTIENT"; Enterprise content management, namely, providing temporary use of online non-downloadable enterprise software for managing business technology exposure and resilience; research in the field of cybersecurity; technological consultancy in the field of cybersecurity; computer technology consultancy, specifically in cybersecurity and business technology risk management; computer security services, namely, restricting unauthorized network access by users without credentials, and monitoring and protecting computer systems from cyber threats; computer security system monitoring services, in the nature of near real-time detection and management of risks to business technology environments; professional consulting services specializing in enterprise cybersecurity strategies, in the nature of enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets; computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience; consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management; consulting services in the field of software as a service (SAAS), in the nature of protecting business technology environments; provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks for computerized transactions; computer security consultancy in the field of scanning of computers and networks to assess information security vulnerabilities
DCM (DIGITAL CONTEXT MANAGEMENT)
PENDING
Owner:
Serial:98266903
Filed:Nov 13, 2023
Classes:9, 35, 42
Goods & Services
Downloadable software for managing business technology exposure and resilience, specifically designed to sense, detect, predict, prevent, respond, orchestrate, govern, and assure data related to cybersecurity risks and threats; downloadable software for identifying, assessing, and mitigating risks associated with business technology systems, focusing on enhancing resilience against cyber threats and vulnerabilities; downloadable software for threat detection and risk management, tailored to monitor and secure business technology environments from unauthorized access and cyber-attacks; Business management consultancy in the field of digital technology; Business risk management; Business risk assessment; Business risk management services; Advisory services relating to business risk management; Business risk assessment services; Business risk management services in the field of computer system; "DIGITAL" and "MANAGEMENT"; Enterprise content management, namely, providing temporary use of online non-downloadable enterprise software for managing business technology exposure and resilience; research in the field of cybersecurity; technological consultancy in the field of cybersecurity; computer technology consultancy, specifically in cybersecurity and business technology risk management; computer security services, namely, restricting unauthorized network access by users without credentials, and monitoring and protecting computer systems from cyber threats; computer security system monitoring services, in the nature of near real-time detection and management of risks to business technology environments; professional consulting services specializing in enterprise cybersecurity strategies, in the nature of enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets; computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience; consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management; consulting services in the field of software as a service (SAAS), in the nature of protecting business technology environments; provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks for computerized transactions; computer security consultancy in the field of scanning of computers and networks to assess information security vulnerabilities
GRACE (GOVERNANCE, RISK, ASSURANCE, COMPLIANCE AND EXPOSURE)
Owner:
Serial:98266895
Filed:Nov 13, 2023
Classes:35, 42
Goods & Services
Business management consultancy in the field of digital technology; Business consulting for enterprises; Business information for enterprises; Business consultancy services for enterprises; Business information services for enterprises; Business planning services for enterprises; Operational business assistance to enterprises; Business management and enterprise organisation consultancy; Business management and enterprise organization consultancy services; Business risk management; Business risk assessment; Business risk management services; Advisory services relating to business risk management; Business risk assessment services; Business risk management services in the field of computer systems; "GOVERNANCE, RISK, ASSURANCE, COMPLIANCE AND EXPOSURE"; Enterprise content management, namely, providing temporary use of online non-downloadable software for autonomous control validation and monitoring within business technology environments; Research in the field of cybersecurity; Technological consultancy in the field of cybersecurity; Computer technology consultancy specifically in the areas of cybersecurity risk management, and validation of security controls; Computer security services, namely, restricting unauthorized network access and continuously validating the effectiveness of security controls through automated monitoring systems; Computer security system monitoring services, in the nature of near real-time, automated validation of cybersecurity controls to ensure autonomous resilience;  Professional consulting services specializing in enterprise cybersecurity strategies, in the nature of enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets; Computer security threat analysis for protecting data; Software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience; Consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management; Consulting services in the field of software as a service (SAAS)  in the nature of protecting business technology environments; Provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks for computerized transactions; Computer security consultancy in the field of Computer security consultancy in the field of scanning of computers and networks to assess information security vulnerability
IOE (INDICATOR OF EXPOSURE)
ABANDONED
Owner:
Serial:98266915
Filed:Nov 13, 2023
Classes:9
O
O
Trademark
Combined
ITU
PENDING
Owner:
Serial:98266971
Filed:Nov 13, 2023
Classes:9, 35, 42
Goods & Services
Downloadable software for autonomous control validation and monitoring, specifically designed to sense, detect, predict, prevent, respond, orchestrate, govern and assure data related to cybersecurity and system vulnerabilities; downloadable software for risk detection, focusing on identifying and mitigating threats in computer systems and networks; downloadable software for threat detection, designed to automatically monitor and validate the effectiveness of security controls within business technology environments; downloadable computer software for the detection and monitoring of threats to computer networks, ensuring the continuous validation and resilience of security controls; Business management consultancy in the field of digital technology; Business consulting for enterprises; Business information for enterprises; Business consultancy services for enterprises; Business information services for enterprises; enterprise content management namely, business strategic planning services for enterprises; Operational business assistance to enterprises; Business management and enterprise organisation consultancy; Business management and enterprise organization consultancy services; Business risk management; Business risk assessment; Business risk management services; Advisory services relating to business risk management; Business risk assessment services; Business risk management services in the field of computer systems; Enterprise content management in the nature of records management services, namely, document indexing for others; Enterprise content management, namely, providing temporary use of online non-downloadable software for autonomous control validation and monitoring within business technology environments; research in the field of cybersecurity; technological consultancy in the field of cybersecurity; computer technology consultancy, specifically in the areas of cybersecurity risk management, and validation of security controls; computer security services, namely, restricting unauthorized network access to customer data and proprietary files and servers, and continuously validating the effectiveness of security controls through automated monitoring systems for detecting unauthourized access or data breach; computer security system monitoring services that focuses on near real-time, automated validation of cybersecurity controls to ensure autonomous resilience, namely in ensuring proper customer login and denying non-authorized users access; professional computer security consultancy specializing in enterprise cybersecurity strategies that focuses on enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets; computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience; consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management; consulting services in the field of software as a service (SAAS), with a focus on protecting business technology environments; provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks for computerized transactions, namely controlling customer login and denying access to non-authorized users; computer security consultancy in the field of scanning of computers and networks to assess information security vulnerabilities
O OPTIMAS SECURE. COGNITIVE. OMNIPRESENT.
Owner:
Serial:98266942
Filed:Nov 13, 2023
Classes:9, 35, 42
Goods & Services
Downloadable software for managing business technology exposure and resilience, specifically designed to sense, detect, predict, prevent, respond, orchestrate, govern and assure data related to cybersecurity risks and threats; downloadable software for identifying, assessing, and mitigating risks associated with business technology systems, focusing on enhancing resilience against cyber threats and vulnerabilities; downloadable software for threat detection and risk management, tailored to monitor and secure business technology environments from unauthorized access and cyber-attacks; Business management consultancy in the field of digital technology; Business consulting for enterprises; Business information for enterprises; Business consultancy services for enterprises; Business information services for enterprises; Business planning services for enterprises; Operational business assistance to enterprises; Business management and enterprise organisation consultancy; Business management and enterprise organization consultancy services; Business risk management; Business risk assessment; Business risk management services; Advisory services relating to business risk management; Business risk assessment services; Business risk management services in the field of computer systems; "SECURE. COGNITIVE. OMNIPRESENT."; Enterprise content management, namely, providing temporary use of online non-downloadable software for managing business technology exposure and resilience; research in the field of cybersecurity; technological consultancy in the field of cybersecurity; computer technology consultancy, specifically in cybersecurity and business technology risk management; computer security services, namely, restricting unauthorized network access to customer and proprietary files and servers by users without credentials, and monitoring and protecting computer systems from cyber threats namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security system monitoring services focusing on near real-time detection and management of risks to business technology environments to include login verification, user identity, and spam/threat detection of unauthorized users; professional computer security consultancy specializing in enterprise cybersecurity strategies that focuses on enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets; computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience; consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management; consulting services in the field of software as a service (SAAS), with a focus on protecting business technology environments; provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks for computerized transactions, namely, restricting unauthorized network access to customer and proprietary files and servers by users without credentials; computer security consultancy in the field of scanning of computers and networks to assess information security vulnerabilities
OPTIMAS (OMNI PRESENT THREAT INTERCEPTING MACHINE AUTONOMOUS SYSTEM)
Owner:
Serial:98266881
Filed:Nov 13, 2023
Classes:9, 35, 42
Goods & Services
Downloadable software for autonomous control validation and monitoring, specifically designed to sense, detect, predict, prevent, respond, orchestrate, govern and assure data related to cybersecurity and system vulnerabilities; downloadable software for risk detection in the nature of identifying and mitigating threats in computer systems and networks; downloadable software for threat detection, designed to automatically monitor and validate the effectiveness of security controls within business technology environments; downloadable computer software for the detection and monitoring of threats to computer networks, ensuring the continuous validation and resilience of security controls; Business management consultancy in the field of digital technology; Business consulting for enterprises; Business information for enterprises; Business consultancy services for enterprises; Business information services for enterprises; Business planning services for enterprises; Operational business assistance to enterprises; Business management and enterprise organisation consultancy; Business management and enterprise organization consultancy services; Business risk management; Business risk assessment; Business risk management services; Advisory services relating to business risk management; Business risk assessment services; Business risk management services in the field of computer systems; "OMNI PRESENT THREAT INTERCEPTING MACHINE AUTONOMOUS SYSTEM"; Enterprise content management, namely, providing temporary use of online non-downloadable software for autonomous control validation and monitoring within business technology environments; research in the field of cybersecurity; technological consultancy in the field of cybersecurity; computer technology consultancy, specifically in the areas of cybersecurity risk management, and validation of security controls; computer security services, namely, restricting unauthorized network access and continuously validating the effectiveness of security controls through automated monitoring systems; computer security system monitoring services, in the nature of near real-time, automated validation of cybersecurity controls to ensure autonomous resilience; professional consulting services specializing in enterprise cybersecurity strategies, in the nature of enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets; computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience; consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management; consulting services in the field of software as a service (SAAS), in the nature of protecting business technology environments; provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks for computerized transactions; computer security consultancy in the field of scanning of computers and networks to assess information security vulnerabilities
SAFE DIGITAL WORLD
SAFE DIGITAL WORLD
Trademark
Word
ITU
PENDING
Owner:
Serial:98266923
Filed:Nov 13, 2023
Classes:9, 35, 42
Goods & Services
Downloadable software for cybersecurity in the nature of protecting digital assets, networks, and information from unauthorized access and cyber-attacks; downloadable computer software platforms for digital risk management, focusing on sensing, detecting, predicting, preventing, responding, orchestrating, governing, and assuring cyber threats in a secure digital environment; downloadable software for privacy protection, enabling the safeguarding of sensitive information within digital systems and ensuring compliance with data protection regulations; downloadable software for enhancing digital resilience against cyber threats and vulnerabilities, by providing tools to strengthen the ability of digital systems to pre-empt, prevent, withstand, and recover from cyber-attacks or other disruptions; downloadable computer software for the monitoring and management of cybersecurity risks; Business management consultancy in the field of digital technology; Business consulting for enterprises; Business information for enterprises; Business consultancy services for enterprises; Business information services for enterprises; Business planning services for enterprises; Operational business assistance to enterprises; Business management and enterprise organisation consultancy; Business management and enterprise organization consultancy services; Business risk management; Business risk assessment; Business risk management services; Advisory services relating to business risk management; Business risk assessment services; Business risk management services in the field of computer systems; "DIGITAL WORLD"; Enterprise content management, namely, providing temporary use of online non-downloadable software for protecting digital assets, networks, and information from unauthorized access and cyber-attacks in the field of cybersecurity and digital risk management; research in the field of cybersecurity; technological consultancy in the field of cybersecurity; computer technology consultancy, specifically in the areas of technology risk management, privacy protection, and enhancing digital resilience; computer security services, namely, restricting unauthorized network access by users without credentials, and continuously monitoring and managing cybersecurity risks; computer security system monitoring services in the nature of near real-time threat detection and response to maintain a secure and safe system; professional consulting services specializing in enterprise cybersecurity strategies in the nature of enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets; computer security threat analysis for protecting data; software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience; consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management; consulting services in the field of software as a service (SAAS), in the nature of protecting business technology environments; provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks for computerized transactions; computer security consultancy in the field of scanning of computers and networks to assess information security vulnerabilities

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.