| DRAGOS Dragos, Inc. 2067701 2 Dec 2020 | on 1 May 2025 | Computer software for use in the detection, analysis, mitigation and r... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; Downloadable and recorded computer software for data security; Cybersecurity software; Downloadable and recorded software for providing network, Internet, and computer security; Downloadable and recorded software for use in the management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Downloadable and recorded software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; Downloadable and recorded computer software for data security for use in the encryption and authentication of electronic and digital data for cybersecurity purposes; Downloadable and recorded computer software for identity security; Downloadable and recorded software for authentication and identity management information security; Downloadable and recorded software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; Downloadable and recorded computer software for data security for use in providing data analytics, business analytics, business intelligence reporting and for collecting and analyzing data in the field of cybersecurity; Downloadable electronic data files, namely, digital authentication certificates and sensor software updates for use in data for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation; Computer hardware; Optical and image sensor hardware; Computer hardware for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Sensors, namely, computer hardware, for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices Class 041 Class 041 Education and Entertainment Services Educational services, namely providing educational training, workshops, seminars, and conferences in the field of cybersecurity risk management; Educational services in the field of cybersecurity; Training services in the field of cybersecurity; Providing online, non-downloadable educational publications, articles, webinars, whitepapers, solution briefs, reports, and datasheets in the field of cybersecurity Class 042 Computer & Software Services & Scientific Services Software as a service (SaaS) services featuring computer software for data security; Software as a service (SaaS) services featuring computer software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; Platform as a service (PaaS) services featuring computer software for data security; Platform as a service (PaaS) services featuring computer software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; Software as a service (SaaS) services featuring cybersecurity software; Platform as a service (PaaS) services featuring cybersecurity software; Non-downloadable software for providing network, Internet, and computer security; Non-downloadable software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Non-downloadable software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; Non-downloadable software for the encryption and authentication of electronic and digital information and data; Non-downloadable software for identity security; Non-downloadable software for authentication and identity management information security; Non-downloadable software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication and encryption of digital communications, and authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; Providing online non-downloadable computer software for data security for use in providing data analytics, business analytics, business intelligence reporting and for collecting and analyzing data in the field of cybersecurity; Providing an online non-downloadable security software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices via a website portal; Providing an online non-downloadable security software for use in the fields of computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation via a website portal; electronic data storage, namely, archiving business documents, personal documents and corporate documents; computer technology consulting services; Consulting services in the field of cybersecurity; Consulting services in the field of management, monitoring, evaluation, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Providing information about data encryption services and authentication services for computer security; Authentication, issuance and validation of digital certificates; Issuance and management of digital certificates for authentication and encryption of a digital communication, and authentication of a digital signature in an electronic transaction and communication, over the Internet and other computer networks; Design, development, installation, and customization of software; Design and development of cybersecurity systems; Development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; Updating of computer software; Computer diagnostic services; Technical support services in the nature of troubleshooting to diagnose computer hardware and software problems; Technical support services in the nature of troubleshooting to diagnose computer hardware and software problems through monitoring, detecting, diagnosing, remediating, mitigating and resolving cybersecurity issues; Technical support services in the nature of troubleshooting to diagnose computer hardware and software problems through architecture reviews, vulnerability assessments, device and application penetration tests, network penetration tests, and threat hunting for of computer systems, industrial control systems, and networked devices in the field of cybersecurity; computer systems monitoring services; computer systems monitoring services for tracking of security vulnerabilities and problems in computer software products and computer networksSoftware as a service (SaaS) services featuring computer software for data security; Software as a service (SaaS) services featuring computer software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; Platform as a service (PaaS) services featuring computer software for data security; Platform as a service (PaaS) services featuring computer software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; Software as a service (SaaS) services featuring cybersecurity software; Platform as a service (PaaS) services featuring cybersecurity software; Non-downloadable software for providing network, Internet, and computer security; Non-downloadable software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Non-downloadable software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; Non-downloadable software for the encryption and authentication of electronic and digital information and data; Non-downloadable software for identity security; Non-downloadable software for authentication and identity management information security; Non-downloadable software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication and encryption of digital communications, and authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; Providing online non-downloadable computer software for data security for use in providing data analytics, business analytics, business intelligence reporting and for collecting and analyzing data in the field of cybersecurity; Providing an online non-downloadable security software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices via a website portal; Providing an online non-downloadable security software for use in the fields of computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation via a website portal; electronic data storage, namely, archiving business documents, personal documents and corporate documents; computer technology consulting services; Consulting services in the field of cybersecurity; Consulting services in the field of management, monitoring, evaluation, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Providing information about data encryption services and authentication services for computer security; Authentication, issuance and validation of digital certificates; Issuance and management of digital certificates for authentication and encryption of a digital communication, and authentication of a digital signature in an electronic transaction and communication, over the Internet and other computer networks; Design, development, installation, and customization of software; Design and development of cybersecurity systems; Development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; Updating of computer software; Computer diagnostic services; Technical support services in the nature of troubleshooting to diagnose computer hardware and software problems; Technical support services in the nature of troubleshooting to diagnose computer hardware and software problems through monitoring, detecting, diagnosing, remediating, mitigating and resolving cybersecurity issues; Technical support services in the nature of troubleshooting to diagnose computer hardware and software problems through architecture reviews, vulnerability assessments, device and application penetration tests, network penetration tests, and threat hunting for of computer systems, industrial control systems, and networked devices in the field of cybersecurity; computer systems monitoring services; computer systems monitoring services for tracking of security vulnerabilities and problems in computer software products and computer networks
Class 045 Personal & Legal & Social Services Monitoring of computer systems, industrial control systems, and networked devices for security purposes, namely, security services for the protection of property and individuals; private investigation services; private investigation services of security threats to computer systems, industrial control systems, and networked devices for security purposes; private investigation services of security vulnerabilities and problems in computer systems, industrial control systems, and networked devices for security purposes; Computer emergency response team services, namely, private investigation services for monitoring, tracking, and investigation of security vulnerabilities and problems in computer software products and computer networks | |
| DRAGOS & Design Dragos, Inc. 2067708 2 Dec 2020 | on 1 May 2025 | Computer software for use in the detection, analysis, mitigation and r... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; Downloadable and recorded computer software for data security; Cybersecurity software; Downloadable and recorded software for providing network, Internet, and computer security; Downloadable and recorded software for use in the management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Downloadable and recorded software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; Downloadable and recorded computer software for data security for use in the encryption and authentication of electronic and digital data for cybersecurity purposes; Downloadable and recorded computer software for identity security; Downloadable and recorded software for authentication and identity management information security; Downloadable and recorded software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; Downloadable and recorded computer software for data security for use in providing data analytics, business analytics, business intelligence reporting and for collecting and analyzing data in the field of cybersecurity; Downloadable electronic data files, namely, digital authentication certificates and sensor software updates for use in data for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation; Computer hardware; Optical and image sensor hardware; Computer hardware for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Sensors, namely, computer hardware, for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices Class 041 Class 041 Education and Entertainment Services Educational services, namely providing educational training, workshops, seminars, and conferences in the field of cybersecurity risk management; Educational services in the field of cybersecurity; Training services in the field of cybersecurity; Providing online, non-downloadable educational publications, articles, webinars, whitepapers, solution briefs, reports, and datasheets in the field of cybersecurity Class 042 Computer & Software Services & Scientific Services Software as a service (SaaS) services featuring computer software for data security; Software as a service (SaaS) services featuring computer software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; Platform as a service (PaaS) services featuring computer software for data security; Platform as a service (PaaS) services featuring computer software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; Software as a service (SaaS) services featuring cybersecurity software; Platform as a service (PaaS) services featuring cybersecurity software; Non-downloadable software for providing network, Internet, and computer security; Non-downloadable software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Non-downloadable software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; Non-downloadable software for the encryption and authentication of electronic and digital information and data; Non-downloadable software for identity security; Non-downloadable software for authentication and identity management information security; Non-downloadable software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication and encryption of digital communications, and authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; Providing online non-downloadable computer software for data security for use in providing data analytics, business analytics, business intelligence reporting and for collecting and analyzing data in the field of cybersecurity; Providing an online non-downloadable security software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices via a website portal; Providing an online non-downloadable security software for use in the fields of computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation via a website portal; electronic data storage, namely, archiving business documents, personal documents and corporate documents; computer technology consulting services; Consulting services in the field of cybersecurity; Consulting services in the field of management, monitoring, evaluation, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Providing information about data encryption services and authentication services for computer security; Authentication, issuance and validation of digital certificates; Issuance and management of digital certificates for authentication and encryption of a digital communication, and authentication of a digital signature in an electronic transaction and communication, over the Internet and other computer networks; Design, development, installation, and customization of software; Design and development of cybersecurity systems; Development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; Updating of computer software; Computer diagnostic services; Technical support services in the nature of troubleshooting to diagnose computer hardware and software problems; Technical support services in the nature of troubleshooting to diagnose computer hardware and software problems through monitoring, detecting, diagnosing, remediating, mitigating and resolving cybersecurity issues; Technical support services in the nature of troubleshooting to diagnose computer hardware and software problems through architecture reviews, vulnerability assessments, device and application penetration tests, network penetration tests, and threat hunting for of computer systems, industrial control systems, and networked devices in the field of cybersecurity; computer systems monitoring services; computer systems monitoring services for tracking of security vulnerabilities and problems in computer software products and computer networks
Class 045 Personal & Legal & Social Services Monitoring of computer systems, industrial control systems, and networked devices for security purposes, namely, security services for the protection of property and individuals; private investigation services; private investigation services of security threats to computer systems, industrial control systems, and networked devices for security purposes; private investigation services of security vulnerabilities and problems in computer systems, industrial control systems, and networked devices for security purposes; Computer emergency response team services, namely, private investigation services for monitoring, tracking, and investigation of security vulnerabilities and problems in computer software products and computer networks | |