A

Welcome to the Brand page for “A”, which is offered here for The mark consists of a stylized letter a that does not include the horizontal bar that extends between its slanting sides, so as to appear as an inverted letter v.;abnormal;providing non-downloadable software that utilizes machine learning in the field of cybersecurity; providing non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; computer services for analyzing digital activities to discover security threats; computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; computer security services, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; computer security services, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; computer security services, monitoring of computer systems to detect instances of account takeover; software as a service (saas) featuring software for the analysis and protection of digital activities, communications, and accounts; platform as a service (paas) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; email and messaging management services for others, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; software as a service (saas) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy; computer services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, identifying and examining digital communications involving individuals and entities to identify security threats; computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; computer services for generating a federated collection of individuals and entities to prevent security threats, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications;.

Its status is currently believed to be active. Its class is unavailable. “A” is believed to be currently owned by “Abnormal Security Corporation”.

Owner:
ABNORMAL SECURITY CORPORATION
Owner Details
Description:
The mark consists of a stylized letter A that does not include the horizontal bar that extends between its slanting sides, so as to appear as an inverted letter V.;ABNORMAL;Providing non-downloadable software that utilizes machine learning in the field of cybersecurity; Providing non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications;
Categories: