Trademark: XACTA 360 1919395
Word
XACTA 360
Device Descrption:
ELLIPSE,INCOMPLETE
ID
1919395
Trademark Type
Figurative
Status
Protected: Registered/protected
Application Date
19 December 2017
Registration Date
19 December 2017
Renewal Date
19 December 2027

Service

Goods and Services:
Class 42:
Providing temporary use of non-downloadable software for information technology (IT) asset management, namely, cataloging and managing of IT physical and logical business assets; providing temporary use of non-downloadable software for IT risk management, namely, assessing and managing IT risks in context of the business, and presenting risk exposure thereto; providing temporary use of non-downloadable software for IT vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical IT assets, through the integration into a security tools architecture; providing temporary use of non-downloadable software for IT control management, namely, documenting, assessing, and providing an evidence trail of IT controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure LAN data integration, and organizational enterprise risk management relating to network security, communication security and data security; software as a service (SAAS) services featuring software for information technology (IT) asset management, namely, cataloging and managing of IT physical and logical business assets; software as a service (SAAS) services featuring software for IT risk management, namely, assessing and managing IT risks in context of the business, and presenting risk exposure thereto; software as a service (SAAS) services featuring software for IT vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical IT assets, through the integration into a security tools architecture; software as a service (SAAS) services featuring software for IT control management, namely, documenting, assessing, and providing an evidence trail of IT controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure LAN data integration, and organizational enterprise risk management relating to network security, communication security and data security