| Silhouette of a bird design Crowdstrike, Inc.
2200493 26 Jan 2022 | on 27 Dec 2024 | Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software for computer and network security. Class 042 Class 042 Computer & Software Services & Scientific Services Computer consultation services relating to computer software; consulting in the field of Internet security and information security; computer consultation in the field of computer and network security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software in the field of computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; application service provider (ASP) services for hosting the computer software application creating computer databases in the field of computer data and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers. | |