FindOwnerSearch
Brands and Their Owners
| PROSOC, INC. contact information is shown below | |
| Owner: | PROSOC, INC. |
|---|---|
| Owner Address: | 2177 Salk Ave, Suite 100 Carlsbad CA 92008 |
| Owner Web Site | |
| Owner Phone | |
| Owner Toll Free | |
| Owner Fax |
| Brand: |
P |
|---|---|
| Description: | Education and training in the fields of computer security; computer security policy assessment; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments;The mark consists of a stylized white p outlined in teal followed by the word PROFICIO in white.;Hardware and software in the fields of computer security; computer security policy assessment; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments;PROFICIO;The color(s) teal and white is/are claimed as a feature of the mark.;Security services in the fields of computer security; computer security policy assessment; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments;Computer services in the fields of computer security; computer security policy assessment; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments; |
| Category: | EDUCATION TRAINING |
| Brand: |
P |
|---|---|
| Description: | Education, namely, providing classes, individual training, seminars, workshops and training in the fields of computer security;The mark consists of a stylized teal p.;Computer hardware and recorded software for analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities in the fields of computer security; downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; downloadable computer software for protecting and securing computer networks and applications; computer software for providing real-time security audits of an online application, network, and host;PRO;The color(s) teal is/are claimed as a feature of the mark.;Providing online non-downloadable software for analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data; cybersecurity computer hardware, software network and web-based maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials and specified policies; computer security, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; data security diagnostic services, namely, computer security threat analysis for protecting data; data security computer hardware, software, network and web-based maintenance services; data security, namely, computer security threat analysis for protecting data; computer security, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer services, namely, endpoint detection and response of computer software and hardware to potential threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, security threat analysis for protecting data; firewall computer hardware, software and network security maintenance services; firewall security, namely, computer security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; computer hardware maintenance services; hardware security, namely, design and development of computer hardware security systems; computer security, namely, hardware security policy assessment; hardware support services, namely, troubleshooting of computer hardware problems, monitoring technological functions of computer network systems; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer hardware, network, software and web-based maintenance services; information technology security, namely, computer security threat analysis for protecting data; computer security, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber, data, firewall, endpoint, network and security threats and vulnerabilities; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network maintenance services for others; computer network security, namely, analysis for protecting data, administering digital certificates, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; computer network security policy assessment; computer network support services, namely, installation, administration, and troubleshooting of web and database applications, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; password security, namely, providing authentication, issuance, validation and revocation of digital certificates, implementing software and network policies; password security policy assessment, namely, analyzing and implementing software and network policies; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; support services, namely, troubleshooting of computer software problems, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for cyber, data, firewall, endpoint, network and security threats and vulnerabilities for computer hardware and software; providing temporary use of non-downloadable software for security operations center management; software diagnostic services, namely, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; computer software maintenance services; software security policy assessments, namely, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; software support services, namely, troubleshooting of computer software problems, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; vulnerability assessments, namely, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities, scanning and penetration testing of computers and networks to assess information security vulnerability; |
| Category: | EDUCATION |
| Brand: |
POWERED BY PROFICIO |
|---|---|
| Description: | Educational courses and training in the fields of computer security; Education and training in the fields of computer security, namely, educational courses and training in the field of computer security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of computer technical support services for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of computer vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of data security diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of data security maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of data security; Education and training in the fields of computer security, namely, educational courses and training in the field of data security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of data security technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of data security vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of endpoint detection and response; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware diagnostic; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware security; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology security; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of managed detection and response; Education and training in the fields of computer security, namely, educational courses and training in the field of managed security service provider; Education and training in the fields of computer security, namely, educational courses and training in the field of network diagnostic services; Education and training in the fields of computer security, namely, educational courses and training in the field of network maintenance services; Education and training in the fields of computer security, namely, educational courses and training in the field of network security; Education and training in the fields of computer security, namely, educational courses and training in the field of network security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of network technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of network vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of password diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of password maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of password security; Education and training in the fields of computer security, namely, educational courses and training in the field of password security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of password technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of password vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of computer security; Education and training in the fields of computer security, namely, educational courses and training in the field of security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of penetration testing; Education and training in the fields of computer security, namely, educational courses and training in the field of security operations center management; Education and training in the fields of computer security, namely, educational courses and training in the field of software diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of software maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of software security policy assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of software technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of software vulnerability assessments;Computer hardware and software in the fields of computer security for use in keeping computers, software and networks secure; computer software for computer security policy assessment; computer software for computer technical support services; computer software for computer vulnerability assessments; computer software for cybersecurity diagnostics services; computer software for cybersecurity maintenance services; computer software for maintaining cybersecurity of computers, software and hardware; computer software for cybersecurity policy assessment; computer software for cybersecurity technical support services; computer software for cybersecurity vulnerability assessments; computer software for data security diagnostics services; computer software for data security maintenance services; computer software for maintaining data security of computers, software and hardware; computer software for data security policy assessment; computer software for data security technical support services; computer software for data security vulnerability assessments; computer software for endpoint detection and response; computer software for firewall security assessments; computer software for firewall security diagnostics services; computer software for firewall security maintenance services; computer software for firewall security; computer software for firewall security policy assessment; computer software for firewall security technical support services; computer software for firewall security vulnerability assessments; computer software for computer hardware diagnostics services; computer software for computer hardware maintenance services; computer software for computer hardware security; computer software for computer hardware security policy assessment; computer software for computer hardware technical support services; computer software for hardware vulnerability assessments; computer software for information technology diagnostics services; computer software for information technology maintenance services; computer software for information technology security; computer software for information technology security policy assessment; computer software for information technology technical support services; computer software for information technology vulnerability assessments; computer software for managed detection and response to cyber-attacks, data security exceptions and policy exceptions; computer software for a managed security service provider; computer software for computer network diagnostics services; computer software for computer network maintenance services; computer software for computer network security; computer software for computer network security policy assessment; computer software for computer network technical support services; computer software for computer network vulnerability assessments; computer software for software or hardware password diagnostics services; computer software for software or hardware password maintenance services; computer software for software or hardware password security; computer software for software or hardware password security policy assessment; computer software for software or hardware password technical support services; computer software for software or hardware password vulnerability assessments; computer software for preventing cybersecurity and unauthorized data access; computer software for software-implemented security policy assessment; computer software for support services, namely, diagnosing computer software and hardware problems, diagnosing computer security problems; computer software for cyber and data vulnerability assessments; computer software for penetration testing of cyber threats and data access threats; computer software for cyber and data security operations center management; computer software for software diagnostics services; computer software for software maintenance services; computer software for software security policy assessments; computer software for software technical support services; computer software for software vulnerability assessments; computer software for computer operating software, applications software, computer hardware and computer network vulnerability assessments;Security guarding of facilities; security policy assessment, namely, physical security consultation; physical security support services in the nature of consulting; vulnerability assessments, namely, security threat analysis for protecting tangible corporate property; penetration testing, namely, security threat analysis for protecting tangible corporate property; vulnerability assessment, namely, verifying and monitoring the credentials of security personnel for corporate offices to ensure public safety and building security;Computer services in the fields of computer security, namely, computer security consulting; computer security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; computer support services, namely, help desk services; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity computer diagnostic services; cybersecurity computer software maintenance services; cybersecurity, namely, computer security threat analysis for protecting data; cybersecurity policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity support services, namely, help desk services; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security computer diagnostic services; data security computer software maintenance services; data security consulting; data security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security support services, namely, help desk services; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; endpoint detection and response, namely, monitoring of computer systems to detect intrusions and breakdowns; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; firewall security computer diagnostic services; firewall security services, namely, computer security threat analysis for protecting data; firewall security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes; firewall security support services, namely, help desk services; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; hardware diagnostic services, namely, troubleshooting in the nature of diagnosing computer hardware problems; hardware security, namely, computer security threat analysis for protecting data; hardware security policy assessment, namely, reviewing policies, scanning hardware, and reviewing human compliance with policies to assess information security vulnerability for computer security purposes; hardware support services, namely, troubleshooting in the nature of diagnosing computer hardware problems; hardware vulnerability assessments, namely, diagnosing computer hardware security problems; information technology computer diagnostic services; information technology software maintenance services; information technology security, namely, computer security threat analysis for protecting information technology data; information technology security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with policies to assess information security vulnerability for computer security purposes; information technology support services, namely, help desk services; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; managed detection and response, namely, monitoring of computer systems to detect breakdowns and security vulnerabilities; managed security service provider, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; network computer diagnostic services; network maintenance services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security policy assessment, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes; network support services, namely, help desk services; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, review and testing of computer hardware security involved in computer networks, review and testing of network hardware security of computer networks; computer diagnostic services relating to passwords; computer software maintenance services relating to passwords; password security, namely, maintenance of computer software relating to computer security and prevention of computer risks for passwords; password security policy assessment, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes, scanning, review and testing of computer and network password policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with password policies to assess information security vulnerability for computer security purposes; password support services, namely, help desk services; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password information security vulnerability for computer security purposes, , scanning, review and testing of computer and network password policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with password policies to assess information security vulnerability for computer security purposes; security, namely, computer consultation in the field of computer security; security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; vulnerability assessments, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes, , scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; penetration testing of computers and networks to assess information security vulnerability for computer security purposes; security operations center management, namely, monitoring technological functions of computer network systems; software diagnostic services, namely, troubleshooting of computer software and computer security problems; computer software maintenance services; software security policy assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software support services, namely, troubleshooting of computer software problems; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes; |
| Category: | EDUCATIONAL COURSES TRAINING |
| Brand: |
POWERED BY PROSOC |
|---|---|
| Description: | Educational courses and training in the fields of computer security; Education and training in the fields of computer security, namely, educational courses and training in the field of computer security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of computer technical support services for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of computer vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of cybersecurity vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of data security diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of data security maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of data security; Education and training in the fields of computer security, namely, educational courses and training in the field of data security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of data security technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of data security vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of endpoint detection and response; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of firewall security vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware diagnostic; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware security; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of computer hardware vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology security; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of information technology vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of managed detection and response; Education and training in the fields of computer security, namely, educational courses and training in the field of managed security service provider; Education and training in the fields of computer security, namely, educational courses and training in the field of network diagnostic services; Education and training in the fields of computer security, namely, educational courses and training in the field of network maintenance services; Education and training in the fields of computer security, namely, educational courses and training in the field of network security; Education and training in the fields of computer security, namely, educational courses and training in the field of network security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of network technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of network vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of password diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of password maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of password security; Education and training in the fields of computer security, namely, educational courses and training in the field of password security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of password technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of password vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of computer security; Education and training in the fields of computer security, namely, educational courses and training in the field of security policy assessment; Education and training in the fields of computer security, namely, educational courses and training in the field of vulnerability assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of penetration testing; Education and training in the fields of computer security, namely, educational courses and training in the field of security operations center management; Education and training in the fields of computer security, namely, educational courses and training in the field of software diagnostics; Education and training in the fields of computer security, namely, educational courses and training in the field of software maintenance; Education and training in the fields of computer security, namely, educational courses and training in the field of software security policy assessments; Education and training in the fields of computer security, namely, educational courses and training in the field of software technical support for computer security purposes; Education and training in the fields of computer security, namely, educational courses and training in the field of software vulnerability assessments;Computer hardware and software in the fields of computer security for use in keeping computers, software and networks secure; computer software for computer security policy assessment; computer software for computer technical support services; computer software for computer vulnerability assessments; computer software for cybersecurity diagnostics services; computer software for cybersecurity maintenance services; computer software for maintaining cybersecurity of computers, software and hardware; computer software for cybersecurity policy assessment; computer software for cybersecurity technical support services; computer software for cybersecurity vulnerability assessments; computer software for data security diagnostics services; computer software for data security maintenance services; computer software for maintaining data security of computers, software and hardware; computer software for data security policy assessment; computer software for data security technical support services; computer software for data security vulnerability assessments; computer software for endpoint detection and response; computer software for firewall security assessments; computer software for firewall security diagnostics services; computer software for firewall security maintenance services; computer software for firewall security; computer software for firewall security policy assessment; computer software for firewall security technical support services; computer software for firewall security vulnerability assessments; computer software for computer hardware diagnostics services; computer software for computer hardware maintenance services; computer software for computer hardware security; computer software for computer hardware security policy assessment; computer software for computer hardware technical support services; computer software for hardware vulnerability assessments; computer software for information technology diagnostics services; computer software for information technology maintenance services; computer software for information technology security; computer software for information technology security policy assessment; computer software for information technology technical support services; computer software for information technology vulnerability assessments; computer software for managed detection and response to cyber-attacks, data security exceptions and policy exceptions; computer software for a managed security service provider; computer software for computer network diagnostics services; computer software for computer network maintenance services; computer software for computer network security; computer software for computer network security policy assessment; computer software for computer network technical support services; computer software for computer network vulnerability assessments; computer software for software or hardware password diagnostics services; computer software for software or hardware password maintenance services; computer software for software or hardware password security; computer software for software or hardware password security policy assessment; computer software for software or hardware password technical support services; computer software for software or hardware password vulnerability assessments; computer software for preventing cybersecurity and unauthorized data access; computer software for software-implemented security policy assessment; computer software for support services, namely diagnosing computer software and hardware problems, diagnosing computer security problems; computer software for cyber and data vulnerability assessments; computer software for penetration testing of cyber threats and data access threats; computer software for cyberand data security operations center management; computer software for software diagnostics services; computer software for software maintenance services; computer software for software security policy assessments; computer software for software technical support services; computer software for software vulnerability assessments; computer software for computer operating software, applications software, computer hardware and computer network vulnerability assessments;Security guarding of facilities; security policy assessment, namely, physical security consultation; physical security support services in the nature of consulting; vulnerability assessments, namely, security threat analysis for protecting tangible corporate property; penetration testing, namely, security threat analysis for protecting tangible corporate property; vulnerability assessment, namely, verifying and monitoring the credentials of security personnel for corporate offices to ensure public safety and building security;Computer services in the fields of computer security, namely, computer security consulting; computer security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; computer support services, namely, help desk services; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity computer diagnostic services; cybersecurity computer software maintenance services; cybersecurity, namely, computer security threat analysis for protecting data; cybersecurity policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity support services, namely, help desk services; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security computer diagnostic services; data security computer software maintenance services; data security consulting; data security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security support services, namely, help desk services; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; endpoint detection and response, namely, monitoring of computer systems to detect intrusions and breakdowns; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; firewall security computer diagnostic services; firewall security services, namely, computer security threat analysis for protecting data; firewall security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes; firewall security support services, namely, help desk services; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; hardware diagnostic services, namely, troubleshooting in the nature of diagnosing computer hardware problems; hardware security, namely, computer security threat analysis for protecting data; hardware security policy assessment, namely, reviewing policies, scanning hardware, and reviewing human compliance with policies to assess information security vulnerability for computer security purposes; hardware support services, namely, troubleshooting in the nature of diagnosing computer hardware problems; hardware vulnerability assessments, namely, diagnosing computer hardware security problems; information technology computer diagnostic services; information technology software maintenance services; information technology security, namely, computer security threat analysis for protecting information technology data; information technology security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with policies to assess information security vulnerability for computer security purposes; information technology support services, namely, help desk services; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; managed detection and response, namely, monitoring of computer systems to detect breakdowns and security vulnerabilities; managed security service provider, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; network computer diagnostic services; network maintenance services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security policy assessment, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes; network support services, namely, help desk services; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, review and testing of computer hardware security involved in computer networks, review and testing of network hardware security of computer networks; computer diagnostic services relating to passwords; computer software maintenance services relating to passwords; password security, namely, maintenance of computer software relating to computer security and prevention of computer risks for passwords; password security policy assessment, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes, scanning, review and testing of computer and network password policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with password policies to assess information security vulnerability for computer security purposes; password support services, namely, help desk services; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password information security vulnerability for computer security purposes, , scanning, review and testing of computer and network password policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with password policies to assess information security vulnerability for computer security purposes; security, namely, computer consultation in the field of computer security; security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; vulnerability assessments, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes, , scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; penetration testing of computers and networks to assess information security vulnerability for computer security purposes; security operations center management, namely, monitoring technological functions of computer network systems; software diagnostic services, namely, troubleshooting of computer software and computer security problems; computer software maintenance services; software security policy assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software support services, namely, troubleshooting of computer software problems; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes; |
| Category: | EDUCATIONAL COURSES TRAINING |
| Brand: |
PROFICIO |
|---|---|
| Description: | Computer hardware and software systems for security operations center management, namely, hardware and software for performing computer security, computer security policy assessment, computer support, computer vulnerability assessments, cybersecurity diagnostics, cybersecurity maintenance, cybersecurity policy assessment, cybersecurity support, cybersecurity vulnerability assessments, data security diagnostics, data security maintenance, data security, data security policy assessment, data security support, data security vulnerability assessments, endpoint detection and response, firewall security assessments, firewall security diagnostics, firewall security maintenance, firewall security, firewall security policy assessment, firewall security support, firewall security vulnerability assessments, hardware diagnostics, hardware maintenance, hardware security, hardware security policy assessment, hardware support, hardware vulnerability assessments, information technology diagnostics, information technology maintenance, information technology security, information technology security policy assessment, information technology support, information technology vulnerability assessments, managed detection and response, network diagnostics, network maintenance, network security, network security policy assessment, network support, network vulnerability assessments, password diagnostics, password maintenance, password security, password security policy assessment, password support, password vulnerability assessments, security policy assessments, security vulnerability assessments, penetration testing, security operations center management, software diagnostics, software maintenance, software security policy assessments, software support, and software vulnerability assessments; |
| Category: | COMPUTER HARDWARE SOFTWARE SYSTEMS |
| Brand: |
PROFICIO |
|---|---|
| Description: | The mark consists of a round logo of four blue drops, with the word PROFICIO adjacent in blue, all on a white background.;Computer hardware and software systems for security operations center management, namely, hardware and software for performing computer security, computer security policy assessment, computer support, computer vulnerability assessments, cybersecurity diagnostics, cybersecurity maintenance, cybersecurity policy assessment, cybersecurity support, cybersecurity vulnerability assessments, data security diagnostics, data security maintenance, data security, data security policy assessment, data security support, data security vulnerability assessments, endpoint detection and response, firewall security assessments, firewall security diagnostics, firewall security maintenance, firewall security, firewall security policy assessment, firewall security support, firewall security vulnerability assessments, hardware diagnostics, hardware maintenance, hardware security, hardware security policy assessment, hardware support, hardware vulnerability assessments, information technology diagnostics, information technology maintenance, information technology security, information technology security policy assessment, information technology support, information technology vulnerability assessments, managed detection and response, network diagnostics, network maintenance, network security, network security policy assessment, network support, network vulnerability assessments, password diagnostics, password maintenance, password security, password security policy assessment, password support, password vulnerability assessments, security policy assessments, security vulnerability assessments, penetration testing, security operations center management, software diagnostics, software maintenance, software security policy assessments, software support, and software vulnerability assessments;The color(s) white, and blue is/are claimed as a feature of the mark.; |
| Category: |