Trademark: TAUONE 2194775
Word
TAUONE
ID
2194775
Trademark Type
Word
Status
Protected: Registered/protected
Application Date
26 February 2021
Registration Date
26 February 2021
Renewal Date
26 February 2031

Owner(s)
Service

Goods and Services:
Class 42:
Managed cybersecurity services to identify, protect, detect, respond, and recover from cybersecurity events in the fields of personal health information and providing reports in connection therewith; managed network security services, namely, monitoring computer networks to identify signs of adversary activity, to execute actions to neutralize them, and for the monitoring and management of firewalls, security information and event management systems, network devices and endpoints, antivirus and anti-malware agents, intrusion detection and prevention systems, data loss prevention and regulatory compliance; computer security services, namely, implementing plans for improving computer and network security and preventing criminal activity for healthcare providers, namely, computer security assurance; computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; providing temporary use of non-downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; providing temporary use of non-downloadable computer software, namely, software for use by others for use in sending, receiving, confirming and responding to alerts, messages, and notifications in the field of crisis communication and management; providing temporary use of non-downloadable computer software, namely, software for use in connection with data security, computer security, cybersecurity, software security, and prevention of computer risks; providing temporary use of non-downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; providing temporary use of non-downloadable computer software for artificial intelligence, analytics-based machine learning, and deep learning software, all for the purpose of measuring, detecting, analyzing, preventing and responding to cybersecurity attacks.