RSA Security LLC
11 Marks
LLC
First Filed:Apr 8, 2021Latest Filed:Oct 8, 2024Address:2 Burlington Woods Dr, Suite 201, Burlington, MA 01803
Portfolio Overview
Registered
4(36%)Pending
2(18%)Dead
5(45%)Previous
22Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 42
Software, IT Services & Scientific ResearchClass 41
Education and EntertainmentTTAB Proceedings
Total Proceedings
12As Plaintiff
8(67%)As Defendant
4(33%)Top Firms
Danielson Legal LLC(Oct 2024)
16
Husch Blackwell LLP(Nov 2024)
15
Foley & Lardner LLP(May 2021)
2
Trademark Portfolio
33 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
11
22
Status
17
7
0
9
0
Mark Type
25
2
1
5
0
25
14
10
20
10
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Downloadable computer software using artificial intelligence and machine learning to provide risk-based, multi-factor user authentication, and fraud detection, mitigation, and reporting; downloadable software using artificial intelligence and machine learning for producing reports, dashboards, metrics and alerts related to computer, computer network and electronic data security incidents; downloadable software using artificial intelligence and machine learning for electronic fraud and identity theft detection and prevention; downloadable software using artificial intelligence and machine learning for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Downloadable computer software featuring predictive analytics for fraud detection and prevention of financial fraud, phishing attacks and identity theft; Downloadable computer software featuring artificial intelligence and machine learning to analyze consumer behavior for the prevention of financial fraud and identity theft; Downloadable computer software featuring artificial intelligence and machine learning for user authentication; downloadable software featuring generative artificial intelligence and machine learning for creating and sending questionnaires and video, text and voice alerts in the fields of fraud detection, prevention and mitigation; downloadable software featuring generative artificial intelligence and machine learning for creating and modifying lists of recommended actions based on user-defined responses to questionnaires and to video, text and voice alerts; Business consulting in the fields of fraud, data theft and identity theft; Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data; Providing online non-downloadable software using artificial intelligence and machine learning for providing risk-based, multi-factor user authentication and fraud detection, mitigation, and reporting; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for electronic fraud and identity theft detection, prevention, and mitigation; Cloud computing featuring software using artificial intelligence and machine learning for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence and machine learning for fraud detection, reporting, and mitigation; computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of using artificial intelligence and machine learning to predict, detect, and mitigate fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; providing fraud detection services for others, for electronic commerce payment transactions via a global computer network; Software as a service (SAAS) services featuring software using predictive analytics for detection and prevention of financial fraud, phishing attacks, and identity theft; Software as a service (SAAS) services featuring software using artificial intelligence and machine learning to analyze consumer behavior for the prevention of financial fraud and identity theft; Software as a service (SAAS) services featuring software using artificial intelligence and machine learning for user authentication; software as a service (SAAS) services featuring software using generative artificial intelligence and machine learning for creating and sending questionnaires and video, text and voice alerts in the fields of fraud detection, prevention and mitigation; software as a service (SAAS) services featuring software using generative artificial intelligence and machine learning for creating and modifying lists of recommended actions based on user-defined responses to questionnaires and to video, text and voice alerts
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Downloadable computer software using artificial intelligence and machine learning for user authentication, and fraud and identity theft detection, reporting, and mitigation; downloadable user authentication, identity theft detection, and fraud detection computer software using behavioral biometrics; Business consulting in the fields of fraud, data theft and identity theft; Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; Providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; Computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; Computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; Providing fraud detection services for others, for electronic commerce payment transactions via a global computer network; Providing online non-downloadable software featuring artificial intelligence and machine learning for user authentication, and fraud and identity theft detection, reporting, and mitigation; Providing online non-downloadable user authentication, identity theft detection, and fraud detection software featuring behavioral biometrics; Software as a service (saas) services featuring artificial intelligence and machine learning for user authentication, and fraud and identity theft detection, reporting, and mitigation; Software as a service (saas) services featuring software for user authentication, identity theft detection, and fraud detection using behavioral biometrics
Owner:
Serial:90702767
Filed:May 11, 2021
Classes:9, 35, 41, +2
Registration:7219311
Registered:Nov 14, 2023
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Business consulting in the fields of fraud, data theft and identity theft; Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; Providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; Computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; Computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; Providing fraud detection services for others, for electronic commerce payment transactions via a global computer network
Owner:
Serial:90690803
Filed:May 5, 2021
Classes:9, 35, 41, +2
Registration:7402415
Registered:May 28, 2024
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Business consulting in the fields of fraud, data theft and identity theft; Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; Providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; Computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; Computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft
Owner:
Serial:90690796
Filed:May 5, 2021
Classes:9, 35, 41, +2
Registration:7255617
Registered:Dec 26, 2023
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Business consulting in the fields of fraud, data theft and identity theft; Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; providing fraud detection services for others, for electronic commerce payment transactions via a global computer network
Owner:
Serial:90632944
Filed:Apr 8, 2021
Classes:9, 35, 41, +2
Registration:7255590
Registered:Dec 26, 2023
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Business consulting in the fields of fraud, data theft and identity theft; Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; providing fraud detection services for others, for electronic commerce payment transactions via a global computer network
Goods & Services
educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing educational information, news, and commentary in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring blogs and non-downloadable videos, presentations, and podcasts in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; educational services, namely, providing sessions, courses, and training programs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; educational services, namely, providing virtual sessions, courses, and training programs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing online non-downloadable electronic publications in the nature of articles, ebooks, research reports, and white papers in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; providing recognition and incentives by the way of awards to demonstrate excellence in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; providing training for certification in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; granting of educational degrees and certifications in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing educational test preparation services for exams in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; entertainment services, namely, providing online video games; electronic downloadable publications, namely, articles, ebooks, research reports, and white papers in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; downloadable videos, presentations, and podcasts in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; downloadable video game software; downloadable software applications for receiving content in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; downloadable software in the nature of mobile applications for receiving content in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; arranging and conducting business conferences and events for business purposes in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; arranging and conducting virtual business conferences online in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring an online marketplace for exchanging goods and services with other users; providing business networking opportunities for individuals in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing business information, news, and commentary in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing on-line employment information in the field of job resources and listings; membership club services, namely, providing information to members in the field of jobs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring an online marketplace for exchanging reviews of goods and services with other users; conducting business surveys; online business and social networking services for professionals in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing online non-downloadable game software; computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers, form virtual communities, and engage in social networking services in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security
Goods & Services
educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing educational information, news, and commentary in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring blogs and non-downloadable videos, presentations, and podcasts in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; educational services, namely, providing sessions, courses, and training programs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; educational services, namely, providing virtual sessions, courses, and training programs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing online non-downloadable electronic publications in the nature of articles, ebooks, research reports, and white papers in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; providing recognition and incentives by the way of awards to demonstrate excellence in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; providing training for certification in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; granting of educational degrees and certifications in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing educational test preparation services for exams in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; entertainment services, namely, providing online video games; electronic downloadable publications, namely, articles, ebooks, research reports, and white papers in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; downloadable videos, presentations, and podcasts in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; downloadable video game software; downloadable software applications for receiving content in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; downloadable software in the nature of mobile applications for receiving content in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; arranging and conducting business conferences and events for business purposes in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; arranging and conducting virtual business conferences online in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring an online marketplace for exchanging goods and services with other users; providing business networking opportunities for individuals in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing business information, news, and commentary in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing on-line employment information in the field of job resources and listings; membership club services, namely, providing information to members in the field of jobs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring an online marketplace for exchanging reviews of goods and services with other users; conducting business surveys; online business and social networking services for professionals in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing online non-downloadable game software; computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers, form virtual communities, and engage in social networking services in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security
Goods & Services
educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing educational information, news, and commentary in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring blogs and non-downloadable videos, presentations, and podcasts in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; educational services, namely, providing sessions, courses, and training programs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; educational services, namely, providing virtual sessions, courses, and training programs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing online non-downloadable electronic publications in the nature of articles, ebooks, research reports, and white papers in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; providing recognition and incentives by the way of awards to demonstrate excellence in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; providing training for certification in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; granting of educational degrees and certifications in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing educational test preparation services for exams in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; entertainment services, namely, providing online video games; electronic downloadable publications, namely, articles, ebooks, research reports, and white papers in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; downloadable videos, presentations, and podcasts in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; downloadable video game software; downloadable software applications for receiving content in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; downloadable software in the nature of mobile applications for receiving content in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; arranging and conducting business conferences and events for business purposes in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; arranging and conducting virtual business conferences online in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring an online marketplace for exchanging goods and services with other users; providing business networking opportunities for individuals in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing business information, news, and commentary in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing on-line employment information in the field of job resources and listings; membership club services, namely, providing information to members in the field of jobs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring an online marketplace for exchanging reviews of goods and services with other users; conducting business surveys; online business and social networking services for professionals in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing online non-downloadable game software; computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers, form virtual communities, and engage in social networking services in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security
Goods & Services
computer software used in collection, analysis and monitoring of network traffic for maintenance of network security, enforcement of business policies, rules and procedures and prevention of intellectual property theft or loss, computer-based fraud and crime, and other incidents of network intrusion and misuse; software as a service for collecting, analyzing and monitoring of network traffic for maintenance of network security, enforcement of business policies, rules and procedures and prevention of intellectual property theft or loss, computer-based fraud and crime, and other incidents of network intrusion and misuse.
Goods & Services
computer hardware; computer network server; computer hardware used in connection with software for collecting, analyzing and monitoring of network traffic for maintenance of network security, enforcement of business policies, rules and procedures and prevention of intellectual property theft or loss, computer-based fraud and crime, and other incidents of network intrusion and misuse
Goods & Services
RISK AI; Software as a service (SaaS) featuring software for determining the security and validity of requests for access to data, managed workspaces, software applications, websites, and cloud, mobile and network resources; Software as a service (SaaS) featuring software for automatically customizing the authentication requirements to data, managed workspaces, software applications, websites, and cloud, mobile and network resources based on the calculated security and validity of a request for access; Software as a service (SaaS) featuring software for context-based and automated assessment and response to the security and validity of requests for access to data, managed workspaces, software applications, websites, and cloud, mobile and network resources; Software as a service (SaaS) featuring software for conducting and applying behavioral analytics on requests for access to data, managed workspaces, software applications, websites, and cloud, mobile and network resources.

Goods & Services
Downloadable software and recorded software, for computer and mobile device user identity authentication and access management, password authentication, sign-on control, and intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications, websites, and cloud, mobile and network resources; Downloadable software and recorded software, for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Downloadable software and recorded software, for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, websites, SaaS and cloud, and mobile and network resources; Downloadable software and recorded software, for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and access certification; Downloadable software and recorded software, for user identity and access authentication; Downloadable software and recorded software, and hardware, for providing computer and mobile device user identity authentication; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system, computer network, website, computer resource, or computer software to authenticate user identity; downloadable software featuring a non-predictable code calculator for accessing computer networks, websites, computer software, and computer resources; downloadable software featuring a non-predictable code calculator for accessing a host data bank computer; downloadable software for calculating the probable authenticity of computer or mobile device user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and cloud, mobile and network resources; Software as a service (SaaS) services featuring software for identity authentication and access management, password authentication, sign-on control, intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications, websites, and cloud, mobile and network resources; Cloud computing featuring software for identity authentication and access management, password authentication, sign-on control, intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications, websites, and cloud, mobile and network resources; Software as a service (SaaS) services featuring software for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Cloud computing featuring software for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Software as a service (SaaS) services featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, websites, SaaS and cloud, and mobile and network resources; Cloud computing featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, websites, SaaS and cloud, and mobile and network resources; Software as a service (SaaS) services featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and access certification; Cloud computing featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and access certification; Software as a service (SaaS) services featuring software for user identity and access authentication; Cloud computing featuring software for user identity and access authentication; Software as a service (SaaS) services featuring software for providing computer and mobile device user identity authentication via a mobile application; Cloud computing featuring software for providing computer and mobile device user identity authentication via a mobile application; Software as a service (SaaS) services featuring software used by an authorized user of a computer system, computer network, website, computer resource, or computer software to authenticate user identity; Cloud computing featuring software used by an authorized user of a computer system, computer network, website, computer resource, or computer software to authenticate user identity; Software as a service (SaaS) services featuring a non-predictable code calculator for accessing computer networks, websites, computer software, and computer resources; Cloud computing featuring a non-predictable code calculator for accessing computer networks, websites, computer software, and computer resources; Software as a service (SaaS) services featuring a non-predictable code calculator for accessing a host data bank computer; Cloud computing featuring a non-predictable code calculator for accessing a host data bank computer; Software as a service (SaaS) services featuring software for calculating the probable authenticity of computer or mobile device user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and cloud, mobile and network resources; Cloud computing featuring software for calculating the probable authenticity of computer or mobile device user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and cloud, mobile and network resources

Goods & Services
Downloadable software and software recorded on computer media for detecting, investigating, resolving, and automating response to computer security and computer network security threats, and for analyzing and reporting associated electronic data; Downloadable software and software recorded on computer media for digital forensics; Downloadable software and software recorded on computer media for computer and computer network security information and event management; Downloadable software and software recorded on computer media for collecting, analyzing, reporting, and storing computer log data; Downloadable software and software recorded on computer media for supporting computer and computer network security policy compliance and regulatory compliance; Downloadable software and software recorded on computer media for monitoring for, detecting and responding to electronic threats to computer network endpoints; Downloadable software and software recorded on computer media using artificial intelligence and behavioral analytics to detect, report, and analyze threats to computer and computer network security; Downloadable software and software recorded on computer media for orchestrating manual and automated workflows and responses to computer and computer network security threats; Downloadable software and software recorded on computer media for collaboration and case management in the fields of detecting, investigating, analyzing, reporting and resolving computer and computer network security threats; Software as a service (SaaS) featuring software for detecting, investigating, resolving, and automating response to computer security and computer network security threats, and for analyzing and reporting associated electronic data; Software as a service (SaaS) featuring software for digital forensics; Software as a service (SaaS)featuring software for computer and computer network security information and event management; Software as a service (SaaS) featuring software for collecting, analyzing, reporting, and storing computer log data; Software as a service (SaaS) featuring software for supporting computer and computer network security policy compliance and regulatory compliance; Software as a service (SaaS) featuring software for monitoring for, detecting and responding to electronic threats to computer network endpoints; Software as a service (SaaS) featuring software using artificial intelligence and behavioral analytics to detect, report, and analyze threats to computer and computer network security; Software as a service (SaaS) featuring software for orchestrating manual and automated workflows and responses to computer and computer network security threats; Software as a service (SaaS) featuring software for collaboration and case management in the fields of detecting, investigating, analyzing, reporting and resolving computer and computer network security threats

Goods & Services
Professional services, namely, business consulting in the fields of reviewing the business and data governance practices of others to identify deficiencies and inefficiencies, identifying and suggesting improvements accomplished via use of proprietary technology and changes to best practices, designing and implementing the same, and reviewing the effects of the changes and suggesting further improvements and refinements | IT support services, namely, customizing computer software configurations to the specifications of others; Platform as a service (PAAS) featuring computer software platforms for hosting computer software applications of others used to design, automate, monitor, enforce, and track business processes, collect, store, display. and analyze associated data, and generate reports; Software as a service (SAAS) services featuring software to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; Software as a service (SAAS) services featuring software development tools used to design and deploy software applications used to define and automate business processes

Goods & Services
Downloadable software used to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; downloadable computer software development tools used to design and deploy software applications used to define and automate business processes

Goods & Services
Downloadable software used to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; downloadable computer software development tools used to design and deploy software applications used to define and automate business processes

Goods & Services
Professional services, namely, business consulting in the fields of reviewing the business and data governance practices of others to identify deficiencies and inefficiencies, identifying and suggesting improvements accomplished via use of proprietary technology and changes to best practices, designing and implementing the same, and reviewing the effects of the changes and suggesting further improvements and refinements; IT support services, namely, customizing computer software configurations to the specifications of others; Platform as a service (PAAS) featuring computer software platforms for hosting computer software applications of others used to design, automate, monitor, enforce, and track business processes, collect, store, display. and analyze associated data, and generate reports; Software as a service (SAAS) services featuring software to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; Software as a service (SAAS) services featuring software development tools used to design and deploy software applications used to define and automate business processes

Goods & Services
Providing downloadable software used to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; downloadable computer software development tools used to design and deploy software applications used to define and automate business processes; none of the foregoing for use in the fields of vehicles, transportation, or logistics; Professional services, namely, identifying and proposing technical solutions and technical support services, namely, business consultation for corporate compliance programs and business risk management; none of the foregoing for use in the fields of vehicles, transportation, or logistics; IT support services, namely, customizing computer software configurations to the specifications of others; Platform as a service (PAAS) featuring computer software platforms for hosting computer software applications of others used to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; Software as a service (SAAS) services featuring software to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; Software as a service (SAAS) services featuring software development tools used to design and deploy software applications used to define and automate business processes; none of the foregoing for use in the fields of vehicles, transportation, or logistics.

Goods & Services
Downloadable or recorded computer software in the field of risk and compliance management, namely, software used to design, automate, monitor, enforce, and track business processes in the field of risk and compliance management; downloadable or recorded computer database software used to collect, store, analyze and generate reports on risk and compliance management processes; downloadable or recorded computer software development tools used to design and deploy software applications used to define and automate business processes in the field of risk and compliance management; downloadable or recorded computer software used to control user access to information stored on computer networks | Professional services, namely, identifying and proposing technical solutions and technical support services, namely, business consultation for corporate compliance programs and business risk management | Platform as a service (PAAS) featuring computer software platforms for hosting computer software applications of others for use in risk and compliance management; computer services, namely, design of computer software applications for use in risk and compliance management

Owner:
Serial:88149695
Filed:Oct 10, 2018
Classes:9, 35, 41, +1
Registration:5768047
Registered:Jun 4, 2019
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, and data security; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, and data security; Identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; Software for automating authentication and governance of identity over the internet and other computer networks; Software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; Software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (SMS), and voice one time password (OTP), biometric software and hardware for providing computer and mobile device user identity authentication; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to authenticate user identity; Computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, software applications, digital devices, digital data, and mobile devices; Software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; Software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; Integrated risk management software for risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for electronic fraud and identity theft detection and prevention; Software for detecting, monitoring, managing and preventing fraud, financial crime, cybercrime, cyber threats, cyber-attacks, security attacks and intrusions; software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Software for managing user identity authentication and access privileges to aid in compliance with regulatory requirements; non-predictable code calculators, namely, computer hardware and computer software that generate security access codes for accessing host data bank computers; and computer software programs that issue and manage digital user indentities and access privileges for electronic commerce and security; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, and data security; Providing on-line employment listings in the fields of computer networks, computer security, information security, electronic security, cyber security, and data security; Software as a service (SaaS) services and cloud computing featuring identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; Software as a service (SaaS) services and cloud computing featuring software for automating authentication and governance of identity over the internet and other computer networks; Software as a service (SaaS) services and cloud computing featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; Software as a service (SaaS) services and cloud computing featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (SMS), and voice one time password (OTP), biometric software and hardware for providing computer and mobile device user identity authentication; Software as a service (SaaS) services and cloud computing featuring computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Software as a service (SaaS) services and cloud computing featuring software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, software applications, digital devices, digital data, and mobile devices; Software as a service (SaaS) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; Software as a service (SaaS) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; Software as a service (SaaS) services and cloud computing featuring integrated risk management software for risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software as a service (SaaS) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software as a service (SaaS) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (SaaS) services and cloud computing featuring software for detecting, monitoring, managing and preventing fraud, financial crime, cybercrime, cyber threats, cyber-attacks, security attacks and intrusions; Software as a service (SaaS) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Software as a service (SaaS) services and cloud computing featuring software for managing user identity authentication and access privileges to aid in compliance with regulatory requirements; Authentication, issuance and validation of digital certificates; Identification verification services, namely, electronic credential verification services using technology to authenticate user identity; Providing user authentication services using multi-factor authentication for e-commerce transactions; Providing fraud detection services in the nature of electronic monitoring of electronic funds transfer, credit and debit card and electronic check transactions activity to detect fraud via the internet and digital platforms; Consulting services in the field of maintaining the security and integrity of databases in the nature of protecting data and information from unauthorized access; Consultation in the field of computer security to prevent data theft and identity theft

Goods & Services
Computer forensic services; Consulting services in the field of cloud computing; Computer services, namely, integration of private and public cloud computing environments; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Computer services, namely, encrypted data recovery services; Data encryption and decoding services; Design and development of electronic data security systems; Internet Protocol (IP) address verification services; Providing electronic verification of on-line orders of digital content and generating electronic permission codes which then allow users to access said digital content; Computer security consultancy

Goods & Services
Authentication, issuance and validation of digital certificates; Identification verification services, namely, providing authentication of personal identification information; Providing user authentication services in e-commerce transactions; Providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Consulting services in the field of maintaining the security and integrity of databases; Regulatory compliance consulting; Consultation in the field of data theft and identity theft

Goods & Services
Computer software for managing risks and ensuring compliance in support of governance mandates | Professional services, namely, identifying and proposing technical solutions and technical support services, namely, business consultation for and implementation of business risk management and corporate compliance programs

Goods & Services
COMPUTER SOFTWARE USED IN COLLECTION, ANALYSIS AND MONITORING OF NETWORK TRAFFIC FOR MAINTENANCE OF NETWORK SECURITY, ENFORCEMENT OF BUSINESS POLICIES, RULES AND PROCEDURES AND PREVENTION OF INTELLECTUAL PROPERTY THEFT OR LOSS, COMPUTER-BASED FRAUD AND CRIME, AND OTHER INCIDENTS OF NETWORK INTRUSION AND MISUSE

Goods & Services
NON-PREDICTABLE CODE CALCULATORS, NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT GENERATE SECURITY ACCESS CODES FOR ACCESSING HOST DATA BANK COMPUTERS; AND COMPUTER SOFTWARE PROGRAMS THAT ISSUE AND MANAGE DIGITAL USER INDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC COMMERCE AND SECURITY
