SecureWorks Corp.

 SecureWorks Corp. contact information is shown below
Owner:SECUREWORKS CORP.
Owner Address:Suite 500 One Concourse Parkway Atlanta GA 30328
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned bySecureWorks Corp.

Brand:

BATTLE TESTED, BUSINESS APPROVED

Description:

Educational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security;computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts;Software as a service for configuring cloud computing environments; software as a service, namely, hosting software for use by others in the field of computer network security; Computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; technical support services in the field in the field of computer network security, namely, troubleshooting of computer hardware and software problems, monitoring the performance of computer networks and identifying technical solutions for computer network security problems; Computer security services, namely, providing computer network, Cloud, and endpoint security for others, namely, scanning and penetration testing of computers and computer networks to assess information security vulnerability, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources, maintenance and updating of computer software relating to computer security and prevention of computer risks, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities, security assessments for businesses and individuals in relation to IT systems and computers, managing computer security systems for others, assessing information technology security and vulnerability of computers and computer networks; Computer virus protection services; Computer protection services, namely, scanning, detecting, quarantining and eliminating of viruses and malware on computers and providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Providing information to others on computer network security;

Category: EDUCATIONAL SERVICES
Brand:

BE FEARLESS WITH US

Description:

Arranging and conducting reward programs to promote the sale of computer security software and services;Software as a service (SaaS) in the fields of information technology, cybersecurity, and internet enabled devices in the internet of things (IOT), namely, hosting software for use by others in predicting, preventing, detecting, and responding to computer vulnerabilities, viruses, and threats, and providing protection from computer network intrusions; Platform as a service (PaaS), namely, providing online non-downloadable computer software for use in cybersecurity and prevention of attacks and threats to minimize risk; Cloud computing application service provider, namely, hosting software for use by others in the field of cybersecurity; Computer services, namely, creating an on-line community for registered users to collaborate on cybersecurity software and prevention measures and share technical information and advice on cybersecurity; Computer services, namely, monitoring and managing the computer networks of others to provide protection from computer and network intrusions and attacks in connection with computer and network security systems, internet enabled devices in the internet of things (IOT); Computer services, namely, detecting, identifying, quarantining and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and software, on computers, computer networks, and internet enabled devices in the internet of things (IOT); Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; Computer systems analysis, namely, surveillance and monitoring of computer hardware, networks, software, and internet-enabled devices in the internet of things (IoT) to assess and detect information security, vulnerabilities, unauthorized access, data breach and focus areas; Technical consulting services in the fields of cybersecurity and information security;

Category: ARRANGING CONDUCTING REWARD PROGRAMS
Brand:

CLIENT SELECT

Description:

Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts;Computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; technical support services in the field in the field of computer network security, namely, troubleshooting of computer hardware and software problems, monitoring the performance of computer networks and identifying technical solutions for computer network security problems;

Category: COMPUTER SECURITY SERVICES
Brand:

CLIENT SELECT

Description:

Educational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security;

Category: EDUCATIONAL SERVICES
Brand:

CLIENT SELECT MEMBER

Description:

Educational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security;The mark consists of a broken semi-circle appearing in two parts. Within the semi-circle are the words CLIENT SELECT MEMBER with the wording CLIENT being underlined with a solid line.;Color is not claimed as a feature of the mark.;Computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; technical support services in the field of computer network security, namely, troubleshooting of computer hardware and software problems, monitoring the performance of computer networks and identifying technical solutions for computer network security problems; Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts;

Category: EDUCATIONAL SERVICES
Brand:

CLIENTSELECT MEMBER

Description:

Educational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security;The mark consists of the words CLIENTSELECT MEMBER plus a stylized ribbon emanating from the lower left side of the first letter ''M'' and ending at the beginning of the second letter ''M''.;CLIENT SELECT MEMBER;Color is not claimed as a feature of the mark.;Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts;MEMBER;Computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; technical support services in the field in the field of computer network security, namely, troubleshooting of computer hardware and software problems, monitoring the performance of computer networks and identifying technical solutions for computer network security problems;

Category: EDUCATIONAL SERVICES
Brand:

CLOUD GUARDIAN

Description:

CLOUD;Software as a service (SAAS) services, namely, hosting software for use by others for configuring cloud computing environments;

Category: CLOUD
Brand:

COLLECTIVELY SMARTER. EXPONENTIALLY SAFER.

Description:

Educational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security;Computer security equipment, namely, security devices for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management;

Category: EDUCATIONAL SERVICES
Brand:

COLLECTIVELY SMARTER. EXPONENTIALLY SAFER.

Description:

Software as a service for configuring cloud computing environments; software as a service, namely, hosting software for use by others for securing computer networks; Computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; technical support services in the field in the field of computer network security, namely, troubleshooting of computer hardware and software problems, monitoring the performance of computer networks and identifying technical solutions for computer network security problems; Providing information to others on computer network security; Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts;

Category: SOFTWARE AS SERVICE
Brand:

COUNTER THREAT UNIT

Description:

Security monitoring of computer security networks, and providing computer security monitoring information in the field of vulnerability assessment and protection of computer data/information, networks, servers, applications, desktops and other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events;COUNTER THREAT;Installation, repair and maintenance of computer network protection, reporting, and security software; consultation in the field of software and computer networks and other information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data/information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data/information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data/information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data/information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data/information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer data/information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events;

Category: SECURITY MONITORING COMPUTER SECURITY
Brand:

CTU

Description:

Security monitoring of computer security network; remote monitoring and detection of computer data/information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data/information, networks, servers, applications, desktops and other information technology infrastructure; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data/information, networks, servers, applications, desktops and other information technology infrastructure; providing security assessment of vulnerabilities of computer data/information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the field of vulnerability assessment for attack, intrusion, virus, unauthorized activity, misuse and anomalous event protection for computer data/information, networks, servers, applications, desktops and other information technology infrastructure;Installation, repair and maintenance of computer network protection software for protection of computer networks against viruses, attacks, intrusions, unauthorized activities, misuse and other anomalous events, reporting software, and security software; consultation in the field of software and computer networks and other information technology infrastructure; consultation in the field of computer security, namely, attack, intrusion, virus, unauthorized activity, misuse and anomalous event assessment, detection and protection for computer data/information, networks, servers, applications, desktops and other information technology infrastructure; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; computer services, namely, providing analyses, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure of others for attacks, intrusions, viruses, unauthorized activities, misuse and other anomalous events; conducting research in the field of computer security for attack, intrusion, virus, unauthorized activity, misuse and anomalous event protection, computer security assessment, detection and security for computer data/information, networks, servers, applications, desktops and other information technology infrastructure; and consultation in the field of computer security, namely, protecting computer data/information networks, servers, applications, desktops, and other information technology infrastructure against viruses, attacks, intrusions, unauthorized activities, misuse and other anomalous events;

Category: SECURITY MONITORING COMPUTER SECURITY
Brand:

DEFENSE IN CONCERT

Description:

Providing information to others on computer network security; Educational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security;Computer security equipment, namely, security devices for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management;DEFENSE;Software as a service for configuring cloud computing environments; software as a service, namely, hosting software for use by others in the field of computer network security; Computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; technical support services in the field in the field of computer network security, namely, troubleshooting of computer hardware and software problems, monitoring the performance of computer networks and identifying technical solutions for computer network security problems; Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts;

Category: PROVIDING INFORMATION OTHERS ON
Brand:

EXECUTIVE SELECT

Description:

Educational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security;Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts;Computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; technical support services in the field in the field of computer network security, namely, troubleshooting of computer hardware and software problems, monitoring the performance of computer networks and identifying technical solutions for computer network security problems;

Category: EDUCATIONAL SERVICES
Brand:

EXECUTIVE SELECT MEMBER

Description:

Educational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security;The mark consists of a broken semi-circle appearing in two parts. Within the semi-circle are the words EXECUTIVE SELECT MEMBER with the wording EXECUTIVE being underlined with a solid line.;Color is not claimed as a feature of the mark.;Computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; technical support services in the field in the field of computer network security, namely, troubleshooting of computer hardware and software problems, monitoring the performance of computer networks and identifying technical solutions for computer network security problems; Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts;

Category: EDUCATIONAL SERVICES
Brand:

EXECUTIVESELECT ESP MEMBER

Description:

Educational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security;The mark consists of The words EXECUTIVE SELECT ESP MEMBER plus a stylized ribbon emanating from the left side of the letter ''E'' in ESP and ending at the bottom of the letter ''P'' in ESP.;EXECUTIVE SELECT ESP MEMBER;Color is not claimed as a feature of the mark.;Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts;Computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; technical support services in the field in the field of computer network security, namely, troubleshooting of computer hardware and software problems, monitoring the performance of computer networks and identifying technical solutions for computer network security problems;

Category: EDUCATIONAL SERVICES
Brand:

HYPER-POWERED

Description:

Educational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security;Computer security equipment, namely, security devices for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management;Software as a service for configuring cloud computing environments; software as a service, namely, hosting software for use by others for securing computer networks; Computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; technical support services in the field in the field of computer network security, namely, troubleshooting of computer hardware and software problems, monitoring the performance of computer networks and identifying technical solutions for computer network security problems; Providing information to others on computer network security; Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts;

Category: EDUCATIONAL SERVICES
Brand:

ISENSOR

Description:

Computer hardware, namely network devices for use in computer network security, unauthorized network intrusion detection and network misuse;I SENSOR;

Category: COMPUTER HARDWARE
Brand:

LOGVAULT

Description:

Computer hardware, namely, network devices for collecting, organizing, filing, storing, retrieving, archiving, indexing, and analyzing data and information regarding the operation of and access of computer network assets, namely, firewalls, computers, servers, computer software, web and other applications, and network intrusion prevention and detection systems;LOG VAULT;

Category: COMPUTER HARDWARE
Brand:

RED CLOAK

Description:

Computer software for use in computer network and endpoint security;Computer security services, namely, providing computer network and endpoint security for others, namely, monitoring of computer systems for security purposes, remote and on-site monitoring of computer networks for security purposes, namely, monitoring for spam, malware, viruses, intrusions, and unauthorized access in the fields of computer security and computer access control, providing authentication, issuance, validation and revocation of digital certificates, providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates;Computer security consulting services; Computer security services, namely, providing computer network and endpoint security for others, namely, scanning and penetration testing of computers and computer networks to assess information security vulnerability, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources, maintenance and updating of computer software relating to computer security and prevention of computer risks, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities, security assessments for businesses and individuals in relation to IT systems and computers, managing computer security systems for others, assessing information technology security and vulnerability of computers and computer networks; Computer virus protection services; Computer protection services, namely, scanning, detecting, quarantining and eliminating of viruses and malware on computers and providing spam filtering services to protect websites and online applications from receiving unsolicited messages;

Category: COMPUTER SOFTWARE USE
Brand:

RED CLOAK

Description:

Educational services, namely, conducting courses and seminars in the field of cyber threats; computer education training in the field of cyber threats;The mark consists of A small figure wearing a hooded cloak and stylized word RED CLOAK where the O consists of a circle design with two, equal-sized breaks in its circumference, which are aligned with each other diagonally. One break is in the upper left portion of the circle, and the other break is in the lower right portion of the circle.;Color is not claimed as a feature of the mark.;Providing consumer product information to others relating to software for protection against cyber threats;Computer security consulting services; Computer security services, namely, providing computer network, Cloud, and endpoint security for others, namely, scanning and penetration testing of computers and computer networks to assess information security vulnerability, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources, maintenance and updating of computer software relating to computer security and prevention of computer risks, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities, security assessments for businesses and individuals in relation to IT systems and computers, managing computer security systems for others, assessing information technology security and vulnerability of computers and computer networks; Computer virus protection services; Computer protection services, namely, scanning, detecting, quarantining and eliminating of viruses and malware on computers and providing spam filtering services to protect websites and online applications from receiving unsolicited messages;

Category: EDUCATIONAL SERVICES
Brand:

SECUREWORKS

Description:

Educational services, namely, conducting courses and seminars in the field of network security; computer education training in the field of network security;The mark consists of the word SECUREWORKS where the term SECURE appears darker than WORKS and a stylized ribbon emanates from the lower left side of the solid letter O and ends at the beginning of the letter K.;SECURE WORKS;Color is not claimed as a feature of the mark.;Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts;Computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; technical support services in the field of computer network security, namely, troubleshooting in the nature of diagnosing computer hardware and software problems, monitoring the performance of computer networks and identifying technical solutions for computer network security problems;

Category: EDUCATIONAL SERVICES
Brand:

SECUREWORKS

Description:

The mark consists of the stylized wording SECUREWORKS, in which the O is a circle design with two, equal-sized breaks in its circumference, which are aligned with each other diagonally. One break is in the upper left portion of the circle, and the other break is in the lower right portion of the circle. Also, the first letter S is larger than the rest of the lettering.;Computer security equipment, namely, security devices for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management;SECURE WORKS;Color is not claimed as a feature of the mark.;

Category: