| TECHNOLOGY EXPERTS, ENDURING PARTNERS Xantrion
98001687 17 May 2023 | on 04 Jun 2024
| Security threat analysis for protecting personal property; Consulting ... Class 042 Class 042 Computer & Software Services & Scientific Services Security threat analysis for protecting personal property; Consulting and legal services in the field of privacy and security laws, regulations, and requirements Class 045 Class 045 Personal & Legal & Social Services Computer compatibility services, namely, data mapping; Computer disaster recovery planning; Computer forensic services; Computer network design for others; Computer network security consultancy; Computer security consultancy; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security threat analysis for protecting data; Computer services, namely, computer system administration for others; Computer services, namely, data recovery services; Computer services, namely, encrypted data recovery services; Computer services, namely, integration of private and public cloud computing environments; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer software consultancy; Computer software installation and maintenance; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer technology consultancy; Computer technology support services, namely, help desk services; Computer virus protection services; Advisory services relating to computer software; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Consultation about the maintenance and updating of computer software; Consultation services relating to computer software; Consulting in the field of configuration management for computer hardware and software; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Data security consultancy; Design and development of electronic data security systems; Development of security systems and contingency planning for information systems; Information technology consultancy relating to installation, maintenance and repair of computer software; Information technology consulting relating to computer network design; Internet security consultancy; IT consulting services relating to installation, maintenance and repair of computer software; Maintenance and updating of computer software; Maintenance and upgrading of computer software; Maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer system operation by remote access; Monitoring of computer systems by remote access to ensure proper functioning; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems to detect breakdowns; Periodic upgrading of computer software for others; Preparation, update, installation and maintenance of computer software; Providing technology information updates for home security systems via the global computer network; Recovery of computer data; Services for updating computer software; Technical advice relating to operation of computers; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Technological planning and consulting services in the field of computers and networks; Technology advisory services related to computers and networks; Technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of computers and networks; Testing of computer hardware; Testing of computer programs; Testing of computer software; Testing of computers; Testing of computing equipment; Troubleshooting of computer software problems; Updating and maintenance of computer software; Updating of computer programs for third parties; Updating of computer software; Updating of computer software for others; Updating of computer software relating to computer security and prevention of computer risks | | | XANTRION Xantrion
98215911 10 Oct 2023 | on 04 Jun 2024
| Computer network design for others; Computer network security consulta... Class 042 Class 042 Computer & Software Services & Scientific Services Security threat analysis for protecting personal property; Consulting and legal services in the field of privacy and security laws, regulations, and requirements Class 045 Class 045 Personal & Legal & Social Services Computer network design for others; Computer network security consultancy; Computer security consultancy; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, providing an interactive web site featuring technology that allows users to consolidate and manage social networks, accounts, and connections to existing and emerging application programming interfaces (APIs); Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer software consulting; Computer software installation and maintenance; Computer system design services; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer technology consultancy; Computer technology support services, namely, help desk services; Computer virus protection services; IT integration services; Consulting in the field of IT project management; Data security consultancy; IT consulting services relating to installation, maintenance and repair of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Updating of computer software; Updating of computer software relating to computer security and prevention of computer risks | |