IMMERSIVE LABS HOLDINGS LIMITED

 IMMERSIVE LABS HOLDINGS LIMITED contact information is shown below
Owner:IMMERSIVE LABS HOLDINGS LIMITED
Owner Address:6th Floor, Programme, All Saints' Street Bristol BS12LZ
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byIMMERSIVE LABS HOLDINGS LIMITED

Brand:

CYBER CRISIS SIMULATOR

Description:

Education and training services, namely, offering courses of instruction in cyber security, cyber skills training and cyber security education; provision of online training, namely, administering online courses and seminars to teach participants cyber security skills and how to protect themselves from cyber threats; provision of virtual training labs on the subject of cyber security skills; providing information, consultation, research and advice in relation to cyber security education services; providing information via a global computer network in relation to cyber security education services; preparation of reports relating to cyber security education services;Downloadable computer software for cyber security, namely, software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; computer hardware; downloadable computer software in the field of cyber security; downloadable computer software platforms for cyber security;Technical support services, namely, technical advice relating to the installation, maintenance and repair of computer hardware and cyber security installations; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security hardware systems for others;Business consultancy relating to cyber security; business data gathering and analysis services in the field of cyber security; business and marketing research; business risk assessment services; business information services; strategic business consultation in the field of computer software, network management and network security; business risk assessment and management;Security threat analysis, namely, due-diligence checks of prospective employees relating to cyber security; licensing of computer software and technology solutions, namely, software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks;Software as a Service (SAAS) services featuring software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; Platform as a Service (PAAS) services featuring software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; Software as a Service (SAAS) services featuring software for use in cyber security for the detection and mitigation of advanced persistent threat attacks; developing computer software and computer software platforms for online learning environments to teach participants cyber security and how to protect themselves from cyber threats; providing online information in the field of cyber security and cyber threats via a computer database or the Internet; design, development, and implementation of technology solutions for the purposes of cyber security; design, development and implementation of the creation of computer solutions for cyber, computer, data and Internet security threats; technological advisory services relating to cyber, computer, Internet and data security management information; technological consultancy services relating to cyber, computer, Internet and data security; technological advisory services relating to measurement of cyber risks; providing online non-downloadable software for cyber skills and threats training and education; technological advisory services relating to cyber, computer, Internet and data security, protection and restoration services; computer system monitoring for detecting unauthorized access or data breach; technical support, namely, monitoring technological functions of computer network systems; computer system analysis; advisory services relating to computer systems analysis; compilation of technological information relating to cyber security; testing, analysis, monitoring, software maintenance and technological advisory services regarding cyber security and data security services; data security services, namely, monitoring of computer systems for security purposes and vulnerabilities; design and development of computer software and computer systems for monitoring computer network behavioral patterns to discover risks; design and development of computer software and computer systems for monitoring computer network behavioral patterns to correlate security information; design and development of computer software and computer systems for monitoring computer network behavioral patterns to assess vulnerabilities, and managing and communicating compliance; provision of IT consultancy services to protect against and remedy cyber security breaches and incidents; consultancy, design, testing, research and technological advisory services, all relating to computer security and computer networks; technical consultation in the field of computer software, network management and network security; technical support services, namely, technical advice relating to the installation, maintenance and repair of computer software and cyber security software; technical support services relating to computer software networks and the Internet; design and development of Internet security software programs; testing of computer programs; technological advising services, namely, cyber security threat analysis for protecting data; monitoring services for enhancing the performance, function and security of computer networks; provision of security services for computer networks in the nature of administering digital keys; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security software systems for others; services relating to the protection of computer software, computer hardware, computer networks and computer systems against attacks from computer viruses and security threats; monitoring of computer network behavioral patterns for detecting and removing security threats; monitoring of computer network behavioral patterns for security purposes for detecting, classifying and removing computer viruses and security threats; computer services, namely, creating an online virtual computer, namely, training labs to educate users on cyber security threats; advisory services relating to data security; monitoring of computer systems for data breach and security purposes; provision of a computer monitoring service which tracks computer hardware and computer software performance and sends out historical reports and alerts;

Category: EDUCATION TRAINING SERVICES
Brand:

CYBER WORKFORCE OPTIMIZATION

Description:

Education and training services, cyber skills training and education; cyber security skills development and training; cyber skills development and training services; provision of online training, namely, administering online learning environments to teach participants cyber security skills and how to protect themselves from cyber threats; provision of virtual training labs; e-learning services; information, consultation research and advice in relation to the aforesaid services; providing information via a global computer network in relation to the aforesaid services; preparation of reports relating to the aforesaid services; information, consultancy and advisory services relating to all the aforesaid services;Computer software; computer hardware; software platforms; computer software in the field of cyber security; computer software platforms for cyber security;Business consultancy relating to cyber security; data gathering and analysis services in the field of cyber security; business and marketing research; risk assessment services; business information services; business consultancy relating to cyber security; information, consultancy and advisory services relating to all the aforesaid services;Due-diligence checks relating to cyber security; licensing of software and technology solutions; assessment of risks; incident management consulting and investigation; security consultancy; security monitoring services; security services; information, consultancy and advisory services relating to all the aforesaid services;Software as a Service (SAAS); Platform as a Service (PAAS); Software as a Service (SAAS) services featuring software for use in cyber security for the detection and mitigation of advanced persistent threat (APT) attacks; developing software and platforms for online learning environments to teach participants cyber security and how to protect themselves from cyber threats; providing online information in the field of cyber security and cyber threats via a computer database or the Internet; design, development, and implementation of technology solutions for the purposes of cyber security; design, development and implementation of the creation of solutions for cyber, computer, data and Internet security threats; cyber, computer, Internet and data security management information; consultancy services relating to cyber, computer, Internet and data security; measurement of cyber risks; providing online non-downloadable software for cyber skills and threats training and education; cyber, computer, Internet and data security, protection and restoration services; computer system monitoring services; monitoring of network systems; computer system analysis; advisory services relating to computer systems analysis; compilation of information relating to cyber security; testing, analysis, monitoring, maintenance and advisory services regarding cyber security and data security services; data security services, namely, monitoring of computer systems for security purposes and vulnerabilities; design and development of computer software and computer systems for monitoring computer network behavioral patterns to discover risks; design and development of computer software and computer systems for monitoring computer network behavioral patterns to correlate security information; design and development of computer software and computer systems for monitoring computer network behavioral patterns to assess vulnerabilities, and managing and communicating compliance; provision of IT and consultancy services to protect against or remedy cyber security breaches and incidents; consultancy, design, testing, research and advisory services, all relating to computer security and computer networks; technical and strategic consultation in the field of computer software, network management and network security; technical support services relating to computer and cyber security; technical support services relating to computer networks and the Internet; design and development of Internet security programs; testing of computer programs; cyber security threat analysis for protecting data; services for enhancing the performance, function and security of computer networks; provision of security services for computer networks; providing temporary use of web-based applications; providing temporary use of non-downloadable software; advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security systems for others; services relating to the protection of computer software, computer hardware, computer networks and computer systems against attacks from computer viruses and security threats; monitoring of computer network behavioral patterns; monitoring of computer network behavioral patterns for detecting and removing security threats; monitoring of computer network behavioral patterns for security purposes for detecting, classifying and removing computer viruses and security threats; provision of virtual computer environments, namely, training labs; advisory services relating to data security; monitoring of computer systems for security purposes; provision of a computer monitoring service which tracks online data and content; provision of computer assisted, computer mediated and on-line computer services for the foregoing; information, consultancy and advisory services relating to all the aforesaid services;

Category: EDUCATION TRAINING SERVICES
Brand:

DIGITAL CYBER ACADEMY

Description:

Education, namely, providing training, namely, online courses and programs in cyber security; Providing on-line non-downloadable labs, in the field of cyber security featuring training exercises in Secure coding, Reverse engineering, Ethical hacking, Security investigation and response, Open source investigation, IOT/Embedded in the field of cyber security;Computer hardware; computer software and computer software platforms for cybersecurity;CYBER ACADEMY;Platform as a service (PAAS) featuring computer software platforms for cybersecurity; Scientific and technological services, namely, research and design in the field of cyber security; design and development of computer hardware and software for cyber security;

Category: EDUCATION
Brand:

HUMAN DEFENSE LAYER

Description:

Education and training services, namely, offering courses of instruction in cyber security, cyber skills training and cyber security education; provision of online training, namely, administering online courses and seminars to teach participants cyber security skills and how to protect themselves from cyber threats; provision of virtual training labs on the subject of cyber security skills; providing information, consultation, research and advice in relation to cyber security education services; providing information via a global computer network in relation to cyber security education services; preparation of reports relating to cyber security education services;Downloadable computer software for cyber security, namely, software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; computer hardware; downloadable computer software in the field of cyber security; downloadable computer software platforms for cyber security;Technical support services, namely, technical advice relating to the installation, maintenance and repair of computer hardware and cyber security installations; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analysing, integrating, repairing, and managing of cyber security hardware systems for others;Business consultancy relating to cyber security; business data gathering and analysis services in the field of cyber security; business and marketing research; business risk assessment services; business information services; strategic business consultation in the field of computer software, network management and network security; business risk assessment and management;Security threat analysis, namely, due-diligence checks of prospective employees relating to cyber security; licensing of computer software and technology solutions, namely, software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks;Software as a Service (SAAS) services featuring software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; Platform as a Service (PAAS) services featuring software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; Software as a Service (SAAS) services featuring software for use in cyber security for the detection and mitigation of advanced persistent threat attacks; developing computer software and computer software platforms for online learning environments to teach participants cyber security and how to protect themselves from cyber threats; providing online information in the field of cyber security and cyber threats via a computer database or the Internet; design, development, and implementation of technology solutions for the purposes of cyber security; design, development and implementation of the creation of computer solutions for cyber, computer, data and Internet security threats; technological advisory services relating to cyber, computer, Internet and data security management information; technological consultancy services relating to cyber, computer, Internet and data security; technological advisory services relating to measurement of cyber risks; providing online non-downloadable software for cyber skills and threats training and education; technological advisory services relating to cyber, computer, Internet and data security, protection and restoration services; computer system monitoring for detecting unauthorized access or data breach; technical support, namely, monitoring technological functions of computer network systems; computer system analysis; advisory services relating to computer systems analysis; compilation of technological information relating to cyber security; testing, analysis, monitoring, software maintenance and technological advisory services regarding cyber security and data security services; data security services, namely, monitoring of computer systems for security purposes and vulnerabilities; design and development of computer software and computer systems for monitoring computer network behavioral patterns to discover risks; design and development of computer software and computer systems for monitoring computer network behavioral patterns to correlate security information; design and development of computer software and computer systems for monitoring computer network behavioral patterns to assess vulnerabilities, and managing and communicating compliance; provision of IT consultancy services to protect against and remedy cyber security breaches and incidents; consultancy, design, testing, research and technological advisory services, all relating to computer security and computer networks; technical consultation in the field of computer software, network management and network security; technical support services, namely, technical advice relating to the installation, maintenance and repair of computer software and cyber security software; technical support services relating to computer software networks and the Internet; design and development of Internet security software programs; testing of computer programs; technological advising services, namely, cyber security threat analysis for protecting data; monitoring services for enhancing the performance, function and security of computer networks; provision of security services for computer networks in the nature of administering digital keys; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security software systems for others; services relating to the protection of computer software, computer hardware, computer networks and computer systems against attacks from computer viruses and security threats; monitoring of computer network behavioral patterns for detecting and removing security threats; monitoring of computer network behavioral patterns for security purposes for detecting, classifying and removing computer viruses and security threats; computer services, namely, creating an online virtual computer, namely, training labs to educate users on cyber security threats; advisory services relating to data security; monitoring of computer systems for data breach and security purposes; provision of a computer monitoring service which tracks computer hardware and computer software performance and sends out historical reports and alerts;

Category: EDUCATION TRAINING SERVICES
Brand:

IL

Description:

Cyber skills training; cyber skills development services, namely, providing online training in the field of cyber skills; Security monitoring services, namely, online training in monitoring of computer systems for detection, identification and defence of cyber-attacks;The mark consists of the stylized letters I and L in white on a rectangular background of blue.;IMMERSIVE LABS;The color(s) blue and white is/are claimed as a feature of the mark.;Computer licensing; computer software licensing;Software as a service (SAAS) services featuring software for cyber security, namely, software for the upskilling and training of individuals in the identification, mitigation and defence against actual and potential computer and network security threats utilising the latest threat intelligence, gamified learning and simulated realistic live attacks; measurement of cyber risks; cyber security management information; expert consultancy relating to cyber security; security consultancy, namely, computer security consulting in the field of cyber security; Cyber security business intelligence services, namely, monitoring of business computer systems for detection, identification and defence of cyber-attack; advisory services relating to cyber security;

Category: CYBER SKILLS TRAINING
Brand:

IMMERSIVE CYBER CRISIS SIMULATOR

Description:

Education and training services, namely, offering courses of instruction in cyber security, cyber skills training and cyber security education; provision of online training, namely, administering online courses and seminars to teach participants cyber security skills and how to protect themselves from cyber threats; provision of virtual training labs on the subject of cyber security skills; providing information, consultation, research and advice in relation to cyber security education services; providing information via a global computer network in relation to cyber security education services; preparation of reports relating to cyber security education services;Downloadable computer software for cyber security, namely, software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; computer hardware; downloadable computer software in the field of cyber security; downloadable computer software platforms for cyber security;Technical support services, namely, technical advice relating to the installation, maintenance and repair of computer hardware and cyber security installations; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security hardware systems for others;Business consultancy relating to cyber security; business data gathering and analysis services in the field of cyber security; business and marketing research; business risk assessment services; business information services; strategic business consultation in the field of computer software, network management and network security; business risk assessment and management;Security threat analysis, namely, due-diligence checks of prospective employees relating to cyber security; licensing of computer software and technology solutions, namely, software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks;CYBER CRISIS SIMULATOR;Software as a Service (SAAS) services featuring software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; Platform as a Service (PAAS) services featuring software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; Software as a Service (SAAS) services featuring software for use in cyber security for the detection and mitigation of advanced persistent threat attacks; developing computer software and computer software platforms for online learning environments to teach participants cyber security and how to protect themselves from cyber threats; providing online information in the field of cyber security and cyber threats via a computer database or the Internet; design, development, and implementation of technology solutions for the purposes of cyber security; design, development and implementation of the creation of computer solutions for cyber, computer, data and Internet security threats; technological advisory services relating to cyber, computer, Internet and data security management information; technological consultancy services relating to cyber, computer, Internet and data security; technological advisory services relating to measurement of cyber risks; providing online non-downloadable software for cyber skills and threats training and education; technological advisory services relating to cyber, computer, Internet and data security, protection and restoration services; computer system monitoring for detecting unauthorized access or data breach; technical support, namely, monitoring technological functions of computer network systems; computer system analysis; advisory services relating to computer systems analysis; compilation of technological information relating to cyber security; testing, analysis, monitoring, software maintenance and technological advisory services regarding cyber security and data security services; data security services, namely, monitoring of computer systems for security purposes and vulnerabilities; design and development of computer software and computer systems for monitoring computer network behavioral patterns to discover risks; design and development of computer software and computer systems for monitoring computer network behavioral patterns to correlate security information; design and development of computer software and computer systems for monitoring computer network behavioral patterns to assess vulnerabilities, and managing and communicating compliance; provision of IT consultancy services to protect against and remedy cyber security breaches and incidents; consultancy, design, testing, research and technological advisory services, all relating to computer security and computer networks; technical consultation in the field of computer software, network management and network security; technical support services, namely, technical advice relating to the installation, maintenance and repair of computer software and cyber security software; technical support services relating to computer software networks and the Internet; design and development of Internet security software programs; testing of computer programs; technological advising services, namely, cyber security threat analysis for protecting data; monitoring services for enhancing the performance, function and security of computer networks; provision of security services for computer networks in the nature of administering digital keys; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security software systems for others; services relating to the protection of computer software, computer hardware, computer networks and computer systems against attacks from computer viruses and security threats; monitoring of computer network behavioral patterns for detecting and removing security threats; monitoring of computer network behavioral patterns for security purposes for detecting, classifying and removing computer viruses and security threats; computer services, namely, creating an online virtual computer, namely, training labs to educate users on cyber security threats; advisory services relating to data security; monitoring of computer systems for data breach and security purposes; provision of a computer monitoring service which tracks computer hardware and computer software performance and sends out historical reports and alerts;

Category: EDUCATION TRAINING SERVICES
Brand:

IMMERSIVE LABS

Description:

Software as a service (SAAS) services featuring a non-downloadable computer software platform for cyber security, namely, featuring software for upskilling and training of individuals in the identification, mitigation and defence against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks;

Category: SOFTWARE AS SERVICE SAAS
Brand:

IMMERSIVE LABS

Description:

Education and training services, namely, offering courses of instruction in cyber security, cyber skills training and cyber security education; provision of online training, namely, administering online courses and seminars to teach participants cyber security skills and how to protect themselves from cyber threats; providing information, consultation, research and advice in relation to cyber security education services; providing information via a global computer network in relation to cyber security education services; preparation of reports relating to cyber security education services;Downloadable computer software for cyber security, namely, software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; computer hardware; downloadable computer software in the field of cyber security; downloadable computer software platforms for cyber security;Technical support services, namely, technical advice relating to the installation, maintenance and repair of computer hardware and cyber security installations; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security hardware systems for others;Business consultancy relating to cyber security; business data gathering and analysis services in the field of cyber security; business and marketing research; business risk assessment services; business information services; strategic business consultation in the field of computer software, network management and network security; business risk assessment and management;Security threat analysis, namely, due-diligence checks of prospective employees relating to cyber security; licensing of computer software and technology solutions, namely, software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks;

Category: EDUCATION TRAINING SERVICES
Brand:

IMMERSIVE SIMULATION ENGINE

Description:

Education and training services, namely, offering courses of instruction in cyber security, cyber skills training and cyber security education; provision of online training, namely, administering online courses and seminars to teach participants cyber security skills and how to protect themselves from cyber threats; provision of virtual training labs on the subject of cyber security skills; providing information, consultation, research and advice in relation to cyber security education services; providing information via a global computer network in relation to cyber security education services; preparation of reports relating to cyber security education services;Downloadable computer software for cyber security, namely, software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; computer hardware; downloadable computer software in the field of cyber security; downloadable computer software platforms for cyber security;Technical support services, namely, technical advice relating to the installation, maintenance and repair of computer hardware and cyber security installations; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security hardware systems for others;Business consultancy relating to cyber security; business data gathering and analysis services in the field of cyber security; business and marketing research; business risk assessment services; business information services; strategic business consultation in the field of computer software, network management and network security; business risk assessment and management;Security threat analysis, namely, due-diligence checks of prospective employees relating to cyber security; licensing of computer software and technology solutions, namely, software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks;SIMULATION;Software as a Service (SAAS) services featuring software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; Platform as a Service (PAAS) services featuring software for the upskilling and training of individuals in the identification, mitigation and defense against actual and potential computer and network security threats utilizing the latest threat intelligence, gamified learning and simulated realistic live attacks; Software as a Service (SAAS) services featuring software for use in cyber security for the detection and mitigation of advanced persistent threat attacks; developing computer software and computer software platforms for online learning environments to teach participants cyber security and how to protect themselves from cyber threats; providing online information in the field of cyber security and cyber threats via a computer database or the Internet; design, development, and implementation of technology solutions for the purposes of cyber security; design, development and implementation of the creation of computer solutions for cyber, computer, data and Internet security threats; technological advisory services relating to cyber, computer, Internet and data security management information; technological consultancy services relating to cyber, computer, Internet and data security; technological advisory services relating to measurement of cyber risks; providing online non-downloadable software for cyber skills and threats training and education; technological advisory services relating to cyber, computer, Internet and data security, protection and restoration services; computer system monitoring for detecting unauthorized access or data breach; technical support, namely, monitoring technological functions of computer network systems; computer system analysis; advisory services relating to computer systems analysis; compilation of technological information relating to cyber security; testing, analysis, monitoring, software maintenance and technological advisory services regarding cyber security and data security services; data security services, namely, monitoring of computer systems for security purposes and vulnerabilities; design and development of computer software and computer systems for monitoring computer network behavioral patterns to discover risks; design and development of computer software and computer systems for monitoring computer network behavioral patterns to correlate security information; design and development of computer software and computer systems for monitoring computer network behavioral patterns to assess vulnerabilities, and managing and communicating compliance; provision of IT consultancy services to protect against and remedy cyber security breaches and incidents; consultancy, design, testing, research and technological advisory services, all relating to computer security and computer networks; technical consultation in the field of computer software, network management and network security; technical support services, namely, technical advice relating to the installation, maintenance and repair of computer software and cyber security software; technical support services relating to computer software networks and the Internet; design and development of Internet security software programs; testing of computer programs; technological advising services, namely, cyber security threat analysis for protecting data; monitoring services for enhancing the performance, function and security of computer networks; provision of security services for computer networks in the nature of administering digital keys; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security software systems for others; services relating to the protection of computer software, computer hardware, computer networks and computer systems against attacks from computer viruses and security threats; monitoring of computer network behavioral patterns for detecting and removing security threats; monitoring of computer network behavioral patterns for security purposes for detecting, classifying and removing computer viruses and security threats; computer services, namely, creating an online virtual computer, namely, training labs to educate users on cyber security threats; advisory services relating to data security; monitoring of computer systems for data breach and security purposes; provision of a computer monitoring service which tracks computer hardware and computer software performance and sends out historical reports and alerts;

Category: EDUCATION TRAINING SERVICES
Brand:

TEAM SIM

Description:

Education and training services, namely, offering courses of instruction in cyber security, cyber skills training and cyber security education; provision of online training, namely, administering online courses and seminars to teach participants cyber security skills and how to protect themselves from cyber threats; provision of virtual training labs on the subject of cyber security skills; providing information, consultation, research and advice in relation to cyber security education services; providing information via a global computer network in relation to cyber security education services; preparation of reports relating to cyber security education services;Downloadable computer software for cyber security, namely, software for the upskilling and training of individuals in the identification, mitigation and defence against actual and potential computer and network security threats utilising the latest threat intelligence, gamified learning and simulated realistic live attacks; computer hardware; downloadable computer software in the field of cyber security; downloadable computer software platforms for cyber security; none of the aforesaid being or relating to computer or video games, mobile games, online games or online entertainment, or computer game, video game, mobile game or interactive entertainment software on any medium;Technical support services, namely, technical advice relating to the installation, maintenance and repair of computer hardware and cyber security installations; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security hardware systems for others;TEAM SUBSCRIBER IDENTITY MODULE;Business consultancy relating to cyber security; business data gathering and analysis services in the field of cyber security; business and marketing research; business risk assessment services; business information services; strategic business consultation in the field of computer software, network management and network security; business risk assessment and management;Security threat analysis, namely, due-diligence checks of prospective employees relating to cyber security; licensing of computer software and technology solutions, namely, software for the upskilling and training of individuals in the identification, mitigation and defence against actual and potential computer and network security threats utilising the latest threat intelligence, gamified learning and simulated realistic live attacks;SIM;Software as a Service (SAAS) services featuring software for the upskilling and training of individuals in the identification, mitigation and defence against actual and potential computer and network security threats utilising the latest threat intelligence, gamified learning and simulated realistic live attacks; Platform as a Service (PAAS) services featuring software for the upskilling and training of individuals in the identification, mitigation and defence against actual and potential computer and network security threats utilising the latest threat intelligence, gamified learning and simulated realistic live attacks; Software as a Service (SAAS) services featuring software for use in cyber security for the detection and mitigation of advanced persistent threat attacks; developing computer software and computer software platforms for online learning environments to teach participants cyber security and how to protect themselves from cyber threats; providing online information in the field of cyber security and cyber threats via a computer database or the Internet; design, development, and implementation of technology solutions for the purposes of cyber security; design, development and implementation of the creation of computer solutions for cyber, computer, data and Internet security threats; technological advisory services relating to cyber, computer, Internet and data security management information; technological consultancy services relating to cyber, computer, Internet and data security; technological advisory services relating to measurement of cyber risks; providing online non-downloadable software for cyber skills and threats training and education; technological advisory services relating to cyber, computer, Internet and data security, protection and restoration services; computer system monitoring for detecting unauthorized access or data breach; technical support, namely, monitoring technological functions of computer network systems; computer system analysis; advisory services relating to computer systems analysis; compilation of technological information relating to cyber security; testing, analysis, monitoring, software maintenance and technological advisory services regarding cyber security and data security services; design and development of computer software and computer systems for monitoring computer network behavioral patterns to discover risks; design and development of computer software and computer systems for monitoring computer network behavioral patterns to correlate security information; design and development of computer software and computer systems for monitoring computer network behavioral patterns to assess vulnerabilities, and managing and communicating compliance; provision of IT consultancy services to protect against and/or remedy cyber security breaches and incidents; consultancy, design, testing, research and technological advisory services, all relating to computer security and computer networks; technical consultation in the field of computer software, network management and network security; technical support services, namely, technical advice relating to the installation, maintenance and repair of computer software and cyber security software; technical support services relating to computer software networks and the Internet; design and development of Internet security software programs; testing of computer programs; technological advising services, namely, cyber security threat analysis for protecting data; monitoring services for enhancing the performance, function and security of computer networks; provision of security services for computer networks in the nature of administering digital keys; technical advisory services relating to computer systems security, namely, advisory services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber security software systems for others; monitoring of computer network behavioral patterns for detecting and removing security threats; monitoring of computer network behavioral patterns for security purposes for detecting, classifying and removing computer viruses and security threats; computer services, namely, creating an online virtual computer, namely, training labs to educate users on cyber security threats; advisory services relating to data security; monitoring of computer systems for data breach and security purposes; provision of a computer monitoring service which tracks computer hardware and computer software performance and sends out historical reports and alerts;

Category: EDUCATION TRAINING SERVICES