BAE SYSTEMS PLC

 BAE SYSTEMS PLC contact information is shown below
Owner:BAE SYSTEMS PLC
Owner Address:6 Carlton Gardens London SW1Y5AD United Kingdom
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byBAE SYSTEMS PLC

Brand:

APPLIED INTELLIGENCE

Description:

Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modeling data; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modeling transactions; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modeling patterns and networks in data; computer software, firmware and hardware for detecting suspicious behaviour; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in supply chain management; computer software, firmware and hardware for use in relation to cloud computing; computer software, firmware and hardware for information technology and communications technology security purposes; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in defence, law enforcement, and business process optimisation; data processing apparatus and instruments; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data, of information, and of electronic communications; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data, information and electronic communications; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware, hardware, sensors and apparatus for gathering intelligence and evidence; computer software, firmware, hardware, sensors and apparatus relating to explosive ordnance disposal; computer software, firmware, hardware, sensors and apparatus for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form;Printed matter; printed reports; printed publications; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials;Communications technology consultancy services; information, advice and consultancy relating to all of the aforesaid services;Installation, configuration, customisation, servicing, maintenance, updating, upgrading, repair and operational support services for computer hardware, computer networks, communications networks, communications equipment and wireless communications equipment; diagnostic and maintenance services for computers, computer operating systems and computer networks; information, advice and consultancy relating to all of the aforesaid services;Information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to risk management;Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely, identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modeling of data and transactions, and of patterns and networks in data and transactions; business consulting; business project management services; management consulting; technical management consulting; strategy consulting; customer relationship management; supply chain management services; outsourcing services in the field of customer relationship management; provision of business information; provision of business management information; business analysis services; business data analytics; supply chain analytics; analytics, including business intelligence and business lifecycle analysis; business operational analysis and research services; carrying out studies to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; business modelling; business process modelling; supply chain modelling; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; advice and consultancy relating to supply chain management; advice and consultancy relating to customer relationship management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; information, advice and consultancy relating to regulatory compliance, operational efficiency and corporate governance; information, advice and consultancy relating to all of the aforesaid services;Security services; security project management services; data security services; information, advice and consultancy relating to security; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks; information, advice and consultancy relating to secure cloud computing; information, advice and consultancy relating to detecting, combating and defending against financial crime, including money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; consultancy and advice relating to the gathering of intelligence and evidence; consultancy and advice relating to explosive ordnance disposal; consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting;Information technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modeling, viewing, sharing and monitoring of data and transactions, including patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services relating to predictive modeling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services relating to due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; diagnostic and maintenance services for computer operating systems; analytical services relating to computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services relating to the matching, transforming, sampling, partitioning and analysis of data; analytical services relating to computers, computer software, computer networks and communications networks; artificial intelligence and neural network modeling; project management services; industrial analysis and research services; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services relating to the gathering of intelligence and evidence; computer software services relating to explosive ordnance disposal; computer software services relating to the countering of improvised explosive devices (IEDs), including minefield clearance; installation, configuration, customisation, servicing, maintenance, updating, upgrading, repair and operational support services for computer firmware; data security services; technical data services, namely, identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data transactions; military and defence analysis and consulting; cloud computing services; cloud hosting provider services; consulting services in the field of cloud computing; computer software services relating to secure cloud computing; computer software services relating to supply chain management; design and development of computer software for supply chain management; software as a service; information, advice and consultancy relating to all of the aforesaid services;

Category: COMPUTER SOFTWARE
Brand:

AVRO

Description:

manufacture of aircraft to the order and specification of others;maintenance and repair of aircraft;aircraft and parts therefor, namely, airplanes and jet airplanes;

Category: MANUFACTURE AIRCRAFT
Brand:

BAE SYSTEMS

Description:

Educational services in the nature of training courses on the subject of avionic systems consisting primarily of the installation, maintenance, repair and operation of avionic systems;Scientific, navigational, nautical, avionic, communications, radar, surveying, electric, electronic, acoustic, optical, photographic, cinematographic, signaling, teaching, measuring, sensing, and testing apparatus and instruments, namely, signal processors, parallel processors, printed circuit boards, display screens, LED displays, liquid crystal displays, multi-function displays, monitors, data display controllers, head up displays for aircraft, laser targeting projectors, information and data projectors, night vision goggles, helmet-mounted displays for displaying information to the wearer, optical and telescopic lens helmet-mounted sights, optical and telescopic lens night sights, telescopes, periscopes, laser range finders, optical and telescopic lens electronic simulated sights; Digital terrain systems consisting of software for storing map and terrain information and for generating maps and terrain images on a display monitor; Computer-based learning systems consisting of computer hardware and training software; Timer devices; Image processors; Apparatus for testing electrical and electronic equipment, namely, cables, electrical leads, power sources, voltmeters, ammeters, test program software and computer hardware; Acoustic processors for processing acoustic signals; Sonar arrays; Acoustic counter measure devices, namely, ship and submarine launched countermeasures; Active noise reduction headsets; Active noise reduction apparatus comprising electrical filters, signal generator, loudspeaker, microphone, signal processor, and circuits, namely, update modification circuits, fast fourier transform circuits, arithmetic circuits and inverse fast fourier transform circuits; Active noise reduction apparatus comprising a housing, a power source, electromagnets, vibration sensors, accelerometers, proximity sensors and actuators;Voice recognition software; Sonar detectors; Electrical filters for enhancing speech-related sound and reducing background noise; Electronic interfaces for interfacing weapons to onboard control systems of air, land and marine vehicles; Radar; Radomes; Identification friend or foe (1FF) transponders; Radar jammers; Missile approach warners; Laser warning receivers; Forward looking infra-red (FLIR) sensors; Infra-red counter measures; Infra-red detectors; Laser designator pods; Rotary mirror optical scanners; Radar counter measures; Electronic decoys in the nature of radar decoys and electro-optic tracker decoys; Radar detectors; Radar for identifying, prioritizing, tracking and engaging targets; Local area networks for submarines; Surveillance equipment, namely cameras, thermal imaging cameras and infra-red sensors; Missile trackers; Flight data recorders; Auto stabilizers; Auto-pilots; Fly by wire active controls for air vehicles; Accelerometers; Control surface actuators; Electro mechanical servo actuators; Multiplexors; Cockpit voice recorders; Electronic throttle boxes; Vehicle control panels; Sensors, namely, infra-red sensors, proximity sensors, ultra violet sensors, seeker stabilization rate sensors, precision digital stabilization and pointing sensors, electro magnetic radiation sensors, temperature sensors, gyro sensors, thermal imaging sensors, velocity sensors, environmental sensors and smoke emission detectors; Doppler navigation systems consisting of navigational software, computer hardware, signal transmitters and receivers; Integrated Doppler/GPS navigation systems consisting of navigational software, computer hardware, signal transmitters and receivers; Inertial navigation units; Gyroscopes; Altimeters; Vehicle collision warning alarms; Altitude loss warning alarms; Wind shield warning alarms; Ground proximity warning alarms; Aircraft landing aids; Gyromagnetic directional compasses; Inter-vehicle communication systems consisting of radio transmitters and receivers, and data radio transmitters and receivers and data links, and communication controllers for channel management, and call logging, and encryption and decoding; Intra-vehicle communication systems consisting of radio transmitters and receivers, headsets, electrical cables and wires, and fiber optic cables; Satellite communication systems consisting of satellites, control stations, and ground terminals; Radio transmitters; Radio receivers, namely, airborne audio receivers, airborne laser warning receivers, airborne electromagnetic signal receivers, and ground communication radio receivers; Headsets; Electrical cables and wires; Fiber optic cables; Antennae; In-flight telephones; Modems; Radio modems; Voice encrypters; Voice decoders; Data encrypters; Data decoders; Software-programmable radios; Microwave transmitters; Microwave detectors; Microwave absorbers; Ku-band transmitters; Anechoic chambers; Optical apparatus and instruments, namely, camera lenses, lenses for focusing and dispersing electromagnetic energy, optical mirrors, optical signal processors, optical filters, holograms, charge couple devices (CCD) and image processors; Flight simulators; Ship motion simulators; Aerial combat simulators; Weapon simulators; Laboratory robots; Electronic chaff signal dispensers for use in radar defense; Aircraft decoys; Missile decoys; Data processors; Computers; Calculating machines; Blank magnetic data carriers and blank floppy, hard and compact recording discs for computers; Apparatus for the recording, transmission and reproduction of sounds and images, namely, tape recorders, tape players, video recorders, video players, video cameras, cameras, compact disc recorders, radio transmitters and receivers, electrical cables, fiber optic cables, loud speakers, display screens and monitors, and parts and fittings for all of the aforesaid goods; Computer software for controlling the movement of an aircraft, land vehicle, sea vehicle, missile, spacecraft and weapon system; Computer software for controlling the operation of an aircraft, land vehicle, sea vehicle, missile, spacecraft and weapon system; Computer software for managing communication networks; Computer software for training users in the maintenance of aircraft, land vehicles, sea vehicles, missiles, spacecraft and weapon systems; Computer software for training users in the use of aircraft, land vehicles, missiles, spacecraft, sea vehicles and weapon systems; Computer software for the detection, identification and interrogation of targets; Computer software for data, image and signal processing; Computer software for combat systems management; Computer software for generating digital maps and terrain; Computer software for testing electrical and electronic systems; Computer software for flight simulation, weapon simulation and aerial combat simulation;Writing instruments; printed matter, namely, manuals, brochures and books all on the subject of land, sea, air, space and amphibious vehicles, and weapons, explosives, firearms, missiles, defense technology, military equipment, electrical, electronic and avionic equipment, and scientific, nautical, navigational, communications, radar, surveying, acoustic, optical, photographic, cinematographic, signaling, teaching, measuring, sensing, and testing apparatus and instruments, and computer software and computer hardware, and engineering consultancy services, and construction, maintenance, repair and refurbishment services; posters, wall charts; maps and navigational charts; instructional training and teaching materials in the fields of design, development, installation, manufacturing, servicing, maintenance, repair, refurbishment, renovation and usage of land, sea, air, space and amphibious vehicles, and weapons, explosives, firearms, missiles, defense technology, military equipment, electrical, electronic and avionic equipment, and scientific, nautical, navigational, communications, radar, surveying, acoustic, optical, photographic, cinematographic, signaling, teaching, measuring, sensing, and testing apparatus and instruments, and computer hardware and computer software; unmounted photographs; decals [; blank paper tapes and cards for recorded computer programs ];construction, installation, maintenance, servicing, refurbishment, renovation and repair services, all relating to buildings, civil engineering installations such as bridges, hangars, roads, runways, and test beds for propulsion units for aircraft, rockets and missiles, except that all of the above exclude the manufacture, installation and servicing of baggage handling, claiming and sorting systems, and the servicing of airline boarding bridges; maintenance. servicing, refurbishment, renovation and repair services for aircraft, helicopters, aerial vehicles, air cushion borne vehicles, spacecraft, land vehicles, amphibious vehicles, marine and submersible vehicles, weapons, weapon systems, firearms, missiles, military equipment, avionic systems, electrical and electronic equipment, computers data processors, scientific, nautical, navigational, communications, radar, surveying, acoustic, optical, photographic cinematographic, signaling, measuring, sensing, and testing apparatus, namely, for testing avionics, vehicle controls, and weapons, and instruments, and the parts and fittings within aircraft, telecommunications and transmission apparatus for military use, except that all of the above exclude the manufacture, installation and servicing of baggage handling, claiming and sorting systems, and the servicing of airline boarding bridges; rental and leasing of construction equipment, except that all of the above exclude the manufacture, installation and servicing of baggage handling, claiming and sorting systems, and the servicing of airline boarding bridges;BRITISH AEROSPACE SYSTEMS;Firearms; Ammunition; Projectiles; Explosives; Missiles; Weapons, namely, tear gas weapons, air pistols, tanks, missile launchers, torpedoes, sea mines, anti-aircraft guns, artillery guns, grenades and warheads; Bombs; Howitzers; Bomb sights; Gun sights for firearms; Non-optical and non-telescopic sights, namely, open sights for use on firearms; Missile guidance systems comprising attitude and guidance control units for missiles; Fuses; Fuse setters; Safety and arming units for fuses; Motor ignition delay units; Attitude and guidance control units for missiles, and parts and fittings for all the aforesaid goods;Land, air, water, space and amphibious vehicles, namely, automobiles, tanks, all terrain vehicles, motorized and non-motorized land vehicles equipped for the transport and launch and operation of weapons, airplanes, helicopters, unmanned air vehicles, hovercraft, wing-in-ground effect vehicles, boats ships, submarines, unmanned underwater vehicles, submersibles, sea planes, amphibious airplanes, amphibious land vehicles, space vehicles, and parts and fittings for all the aforesaid goods;SYSTEMS;Engineering consultancy; technical consultancy in the fields of aerospace, defense, civil engineering, and marine engineering; environmental consultancy; air traffic control consultancy; air defense consultancy; engineering logistics service; computer software programming services for others; combat systems requirement analysis, design, integration, test, trials and support services; ship design consultancy; submarine design consultancy; circuit board design services; laboratory testing services in the fields of aerospace, defense, civil engineering, marine engineering, weapons and contaminated environments using simulated environments, environmental stress screening, metrology, and calibration of equipment; tool design services; electro magnetic compatibility testing services for military and civilian equipment; avionics systems integration services for aerospace systems; nuclear power consultancy in the fields of safety, nuclear power generation, operational support, waste management, and decommissioning; civil engineering services;

Category: EDUCATIONAL SERVICES NATURE
Brand:

BAE SYSTEMS

Description:

The mark consists of the words BAE SYSTEMS in white appearing within a red rectangular box.;Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modeling data; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modeling transactions; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modeling patterns and networks in data; computer software, firmware and hardware for detecting suspicious behaviour; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for information technology and communications technology security purposes; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in defence, law enforcement, and business process optimisation; data processing apparatus and instruments; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data, of information, and of electronic communications; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data, information and electronic communications; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware, hardware, electronic sensors and apparatus in the nature of electronic surveillance devices for gathering intelligence and evidence; computer software, firmware, hardware, sensors and apparatus for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; structural and replacement parts and fittings for computer firmware and computer hardware; downloadable electronic publications, namely, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in the field of computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics;Printed reports in the field of computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics; printed publications, namely, books and magazines in the field of computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics; technical manuals in the field of computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics; instruction manuals in the field of computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics; user manuals in the field of computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics; printed user guides in the field of computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics; printed educational, training, and instructional materials, in the field of computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics; printed certificates; newsletters in the field of computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics; pamphlets in the field computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics; brochures in the field of computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics; catalogues in the field of computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics; printed advertising materials, namely, advertising signs of paper or cardboard;Information, advice and consultancy in the field of clearing and reconciling financial transactions; financial information, advice and consultancy relating to financial risk management;The color(s) red and white is/are claimed as a feature of the mark.;Compilation and systematization of information into computer databases; management of computer databases; computer data processing; business research services, namely, providing data searches in computer files for others; data processing services, namely, data logging and retrieval services; data management services for use in analyzing and managing cyber security and intelligence, financial crime and data encryption; business consulting; business project management services; management consulting; business strategy consulting; provision of business information; provision of business management information; business analysis services; business data analytics; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis and research services; business research services, namely, carrying out business studies to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; business management services, namely, business modelling, business process modelling, supply chain modelling, and business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; providing business information through business simulation to understand and explain business performance; business consultation in the nature of enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; business operations consultancy, namely, identification of business or organisational performance indicators; business information, advice and consultancy relating to all of the aforesaid services; business information, advice and consultancy relating to regulatory compliance, operational efficiency and corporate governance; business information, advice and consultancy relating to business risk management;Security services, namely, security threat analysis, advice and management for personal protection purposes; security project management services; information, advice and consultancy in the field of security threat analysis, advice and management; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on now to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks; information, advice and consultancy relating to detecting, combating and defending against financial crime, including money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to security due diligence, background checks and vetting of customers and potential customers; security information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; personal physical security consultancy and advice relating to the gathering of intelligence and evidence; consultancy and advice relating to explosive ordnance disposal; personal physical security consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; Information, advice and consultancy in the field of fraud detection services related to financial behavior and reducing monetary losses;SYSTEMS;Information technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; information technology consulting services, namely, preparation of technical reports in the field of computer science, financial crime, data encryption, data management and cyber security, intelligence and threat analytics; computer consultation services, namely, preparation of reports in the field of computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; computer software installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and technical support services in the nature of troubleshooting of computer software problems; software as a service (SAAS) services featuring software for searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, including patterns and networks in data and transactions; software as a service (SAAS) services featuring software for detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; software as a service (SAAS) services featuring software for identifying, investigating, reviewing and managing cases of financial crime of all types; software as a service (SAAS) services featuring software for predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; software as a service (SAAS) services featuring software for due diligence investigations on customers and potential customers; software as a service (SAAS) services featuring software for analysis and prediction of customer behaviour; computer system monitoring services; diagnostic and maintenance services for computer operating systems; analytical services relating to computers, computer networks and communications networks; forensic analysis, reverse engineering, electronic storage, recovery, digital compression and migration of computer data; software as a service (SAAS) services featuring software for matching, transforming, sampling, partitioning and analysis of data; analytical services relating to computers, computer software, computer networks and communications networks; artificial intelligence and neural network modelling; technical and technological project management services; industrial analysis and research services; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; software as a service (SAAS) services featuring software for gathering of intelligence and evidence; software as a service (SAAS) services featuring software for explosive ordnance disposal; software as a service (SAAS) services featuring software for countering of improvised explosive devices (IEDs), including minefield clearance; computer firmware installation, configuration, customisation, servicing, maintenance, updating, upgrading, repair and operational support services for computer firmware technical support services in the nature of troubleshooting of computer firmware problems; data security services; technical data services, namely, identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; information, advice and consultancy relating to all of the aforesaid services; information, advice, and consultancy in the field of computer security;

Category: