Trademark: PROFICIO 2229229
Word
PROFICIO
ID
2229229
Trademark Type
Word
Status
Protected: Registered/protected
Application Date
08 June 2021
Registration Date
08 June 2021
Renewal Date
08 June 2031

Owner(s)
Service

Goods and Services:
Class 9:
Computer hardware and software systems for security operations center management, namely, hardware and software for performing computer security, computer security policy assessment, computer support, computer vulnerability assessments, cybersecurity diagnostics, cybersecurity maintenance, cybersecurity policy assessment, cybersecurity support, cybersecurity vulnerability assessments, data security diagnostics, data security maintenance, data security, data security policy assessment, data security support, data security vulnerability assessments, endpoint detection and response, firewall security assessments, firewall security diagnostics, firewall security maintenance, firewall security, firewall security policy assessment, firewall security support, firewall security vulnerability assessments, hardware diagnostics, hardware maintenance, hardware security, hardware security policy assessment, hardware support, hardware vulnerability assessments, information technology diagnostics, information technology maintenance, information technology security, information technology security policy assessment, information technology support, information technology vulnerability assessments, managed detection and response, network diagnostics, network maintenance, network security, network security policy assessment, network support, network vulnerability assessments, password diagnostics, password maintenance, password security, password security policy assessment, password support, password vulnerability assessments, security policy assessments, security vulnerability assessments, penetration testing, security operations center management, software diagnostics, software maintenance, software security policy assessments, software support, and software vulnerability assessments.
Class 42:
Computer hardware diagnostic services; computer network diagnostic services; computer network security policy assessment, namely, assessing security threats and the network's response; computer network security, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultancy; computer security policy assessment, namely, assessing security threats and the computer's response; computer security, namely, cybersecurity protocol assessment in the nature of analyzing threat response of computers, networks, and devices; computer security, namely, data security policy assessment in the nature of analyzing threat response of computers, networks, and devices; computer security, namely, firewall security policy assessment in the nature of analyzing threat response of firewalls; computer security, namely, hardware security policy assessment in the nature of analyzing threat response of computer hardware; computer security, namely, information technology security policy assessment in the nature of analyzing threat response of computers, networks, and devices on information technology systems; computer services, namely, endpoint detection and response of software and hardware threats; computer services, namely, managed detection and response of cyber intrusions and threats; computer software and hardware password maintenance services; computer software maintenance services; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity computer software maintenance services; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; data security computer software maintenance services; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; data security, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; firewall computer software security maintenance services; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security, namely, security threat analysis for protecting data; technical support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security, namely, security threat analysis for protecting data; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing temporary use of non- downloadable software for security operations center management; security policy assessment, namely, data security consultancy; software diagnostic services, namely, computer security threat analysis for protecting data; software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems, troubleshooting of computer hardware and software security problems; technical support services, namely, troubleshooting of computer software security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability.