| SECURITY OPERATIONS CLOUD Arctic Wolf Networks, Inc.
UK00003755007 | | Class 042 Class 042 Computer & Software Services & Scientific Services Computer network technology services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the cybersecurity policies, protocols and technology of others to assure compliance with cybersecurity industry standards. | | | Security Operations Cloud Arctic Wolf Networks, Inc.
UK00003716297 | | Class 042 Class 042 Computer & Software Services & Scientific Services Computer network technology services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the cybersecurity policies, protocols and technology of others to assure compliance with cybersecurity industry standards. | |