MILLENNIUM CORPORATION RED TEAM
associated with 13 other trademarks
Printed manuals, printed guides and instruction sets being printed educational materials in the field of computer security, intrusion, vulnerability, ...

Words that describe this trademark:

printed manuals  computer security  slide decks  field computer  security intrusion  powerpoint slide  instruction sets  sets  manuals  decks 

Serial Number:

88325979

Mark:

MILLENNIUM CORPORATION RED TEAM

Status:

Abandoned-No Statement of Use filed

Status Date:

04-05-2021

Filing Date:

Registration Number:

N/A

Registration Date:

N/A

Goods and Services:

Printed manuals, printed guides and instruction sets being printed educational materials in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection Research, development, engineering, installation, validation, maintenance and repair of computer software; Simulation of computer software in the nature of computer simulation based on computer programs for others and computer modeling services; research, development and engineering of computer network protection in the nature of computer network design and security software; research, development and engineering of simulation in the nature of computer simulation based on computer programs for others and computer modeling services, computer software validation and reporting in the nature of computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites and other information databases; consultation in the field of computer software and computer networks and other information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events, namely, recovery of computer data; Technical support services, namely, troubleshooting of computer security network software and other information technology infrastructure problems, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts, diagnosing computer hardware and software problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events, namely, theft of computer and network data; remote monitoring, detection and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, namely, deployment of countermeasures in response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events, namely, misuse of computer and network data; providing information in the field of computer technology in the nature of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events, namely, theft of computer and network data; Computer security monitoring, and reporting of computer network security and information risks; Computer security simulation and validation in the nature of computer security simulation based on computer programs for others; providing computer security monitoring, simulation in the nature of computer modeling services, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events, namely, theft of computer and network data

Mark Description:

N/A

Class:

Scientific and technological services

Type of Mark:

Trademark

Published for Opposition Date:

01-07-2020

Mark Drawing Status:

Standart Character Mark

Abandon Date:

04-05-2021

Business Name:

FH+H

Correspondent Name:

Recent Trademark filings by this company