Brands and Their Owners
KROLL, LLC contact information is shown below | |
Owner: | KROLL, LLC |
---|---|
Owner Address: | 55 East 52nd Street New York NY 10055 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
COMETRIC |
---|---|
Description: | Computer search engine software;COMPUTER ELECTRIC; |
Category: | COMPUTER SEARCH ENGINE SOFTWARE |
Brand: |
CYBERDETECTER |
---|---|
Description: | CYBER DETECTER;Computer security consultancy in the field of IT equipment and devices to assess potential vulnerability; IT infrastructure and computer network security services for monitoring, detection, analysis, notification, and resolution of intrusion vulnerability and security threats and providing reports and assessments in connection therewith; |
Category: | CYBER DETECTER |
Brand: |
ID INTEGRITY |
---|---|
Description: | Monitoring consumer credit reports and providing an alert as to any changes;Personal assistance services to victims of identity theft, namely, providing advice, counsel and assistance to identity theft victims to repair damage caused by identity fraud and damage to credit history; providing information about incidents of identity theft to credit reporting agencies, credit companies, banks and other government, regulatory and private organizations for others; providing consulting services, advice and information to assist others in protecting against identity theft and fraud protection; providing interactive websites containing information on identity theft; background investigation and research services, namely, providing consumer historical information relating to criminal records, address, Social Security Numbers, rental housing, health benefits, liens, judgments, real estate owned, licenses, professions, utilities, education, employment, and other information available through public records;ID; |
Category: | MONITORING CONSUMER CREDIT REPORTS |
Brand: |
ID THEFTSMART |
---|---|
Description: | IDENTITY THEFT SMART;[ Insurance services, namely, providing insurance to cover the costs of restoring credit after identity fraud or theft; providing consumer credit reports ];Monitoring consumer credit reports and providing an alert as to any changes;Personal assistance services to assist victims of identity theft, namely, providing advice and counseling to individuals with regard to helping to resolve identity fraud issues and working on behalf of victims to restore consumer credit history; contacting credit reporting agencies, credit companies, banks and other government, regulatory and private organizations;ID; |
Category: | IDENTITY THEFT SMART |
Brand: |
KROLL |
---|---|
Description: | Education services, namely, providing seminars, conferences, classes and training for businesses in the fields of computer security, protection and risk and threat assessment information and management, expert services, business intelligence and investigations, financial restructuring, valuation, financial compliance and regulation, information management, environmental matters and governance; educational resource center on computer security, protection and risk and threat assessment information and management, expert services, business intelligence and investigations, financial restructuring, valuation, financial compliance and regulation, information management, environmental matters and governance; providing an educational website on computer security, protection and risk and threat assessment information and management, expert services, business intelligence and investigations, financial restructuring, valuation, financial compliance and regulation, information management, environmental matters and governance;Downloadable software and/or application software for computer security, protection and risk and threat assessment and management, expert services, business intelligence and investigations, financial restructuring, valuation, financial compliance and regulation, information management and governance; downloadable software for mobile devices, phones and hand-held computers for computer security, protection and risk and threat assessment; computer programs for recovering data on computer data storage devices after the occurrence of electrical or mechanical failure, computer operator errors, software malfunctions, natural disasters, computer viruses, and computer crimes; computer programs for recovering and/or analyzing data on computer data storage devices for purposes of detecting, recovering, and securing computer data evidence for use in forensics; computer utility programs for installing, formatting and partitioning hard disk drives; computer utility programs for managing storage devices in a networked environment; computer desktop utility software;Investment banking services; investment consulting services; investment management services; financial analysis and consulting; financial investigation services; financial valuation of business and investment securities; financial risk management; financial advisory services in the field of tax, transfer pricing, real estate, alternative assets, and fixed assets; corporate finance services; financial compliance and regulatory consulting for the financial services industry; asset evaluation and recovery services; credit verification services; corporate security services; risk, security and crisis advisory and consultancy services, consultancy and advisory services relating to security issues of computers and telecommunication systems; settlement administration; financial restructuring services, namely, restructurings, liquidations, receiverships and examinerships, out-of-court workouts, lender and creditor negotiations, recapitalizations including debt-for-equity conversions, debtor-in-possession and exit financing and insolvency; bankruptcy administration services, namely, pre-bankruptcy consulting, contract review, customized case websites, claims processing and analysis, global call center capabilities, solicitation consulting, facilitating secure disbursements, digital media plans, virtual data room support and creditors' committee work; issuer services; providing valuations for financial reporting, tax and management planning purposes; providing business valuation for intellectual property valuation, machinery and equipment valuation and strategic value advisory; secondary market advisory; real estate valuation and investment services; loan portfolio review services, namely, automated data processing platforms and cloud computing and proprietary cash-flow models; transfer pricing advisory services; property insurance valuation, fixed asset inventory and reconciliation services; advisory services for the sale, acquisition, divestiture, buyout or recapitalization of one or more businesses; transaction analysis and opinions; merger, acquisition and divestiture analysis services, namely, transaction structuring and accounting, strategy and commercial due diligence, technology due diligence, transaction data analytics, process improvement, merger integration/divestiture and comprehensive due diligence to private equity, hedge funds and strategic/corporate investors on buy-side, sell-side and lender transactions; providing process improvement, post-transaction advisory services, operational improvement analyses, working capital analyses and liquidity and cash flow analyses for distressed investments; debt advisory services;Business investigation services; business risk management; forensic accounting services; business intelligence services; screening, credentialing, and organizing third-party vendors, suppliers, and contractors, and documentation and information on behalf of others; business credit evaluation; identity theft and breach notification, call center and credit and identity monitoring, recall notification; regulatory compliance and risk assessment; reputational risk assessment; commercial information agency services; business research; commercial information agencies; corporate analysis services; information services for corporate and financial transactions; services relating to the provision of corporate and company profiles; business consulting and auditing in the field of information technology systems and computer forensic services; business enquiries and investigations; risk governance and advisory services, namely, system assessments and testing, incident preparedness, endpoint monitoring and threat detection and response, managed and outsourced services, cybersecurity threat intelligence consulting and preventative services, incident response investigation, data breach notification, identity monitoring and identity restoration; analysis related to commercial, construction, financial and technology disputes, namely, commercial litigation and international arbitration support, construction delay and quantum disputes support, fraud investigations and remediation expertise, intellectual property advisory, investigation and disputes consulting services, regulatory, accounting and economics disputes support, technology delay and disruption disputes support and project advisory expertise; analysis related to public record and human source intelligence to support decision making on strategic initiatives, namely, MandA, capital markets activity, joint ventures, political risk, new market entry, supply chain integrity and reputational risk management;Investigation, surveillance, security and risk analysis services for the safety of businesses and individuals; corporate and business vendor investigation services, including investigations of financial fraud, trade secret theft, threats of hostile acts, gray market and counterfeit products, intellectual property infringement investigations and monitoring, surveillance and vendor integrity programs; employee investigations including sexual harassment, pre-employment background checking; private investigation services; security consulting; corporate security including security architecture and security planning services; security guard services; consulting services in the field of risk and crisis management relating to escort, safety, guarding and security services; monitoring of companies for compliance with federal state regulatory requirements or corporate policies; providing country and city specific risk analysis relating to safety; monitoring security services for residential and commercial establishments through the use of computer hardware and software; auditing of hardware and software for potential security risks, computer crime and fraud prevention; licensing of computer software; due diligence services; providing advice on disputes and litigation, fraud and corruption, employee malfeasance, compliance failures, regulatory probes, sanctions breaches, unexplained business/transactional failures, money laundering, shareholder disputes, leaks of information, IP infringement, monitorships and asset search and recovery; compliance and diligence services, namely, pre-transactional intelligence, vendor/supplier/distributor due diligence, vendor risk management platform, supply chain risk management and sanctions screening and monitoring;Private investigation; security consulting; environmental social and governance compliance and risk consulting; computer security consultancy; computer services, namely, recovering and/or analyzing data from computer data storage devices after the occurrence of electrical or mechanical failure, computer operation errors, software malfunctions, natural disasters, commuter viruses, and computer crimes; computer services, namely, detecting, recovering and securing computer data evidence for use in forensics; computer services, namely, analyzing data to detect, eradicate, and prevent the occurrence of computer viruses; providing temporary use of non-downloadable computer software for computer security, protection and risk and threat assessment; computer breach security consultancy and coordinating breach notifications for a compromised entity and the consumer-facing organizations with which they work; providing risk management and security threat analysis services; providing an Internet website portal that allows users to assess and determine computer breach and coordination of breach notifications; consulting, advisory and outsourcing global financial services, namely, regulatory compliance, governance and risk programs, global registration/authorization assistance; regulatory advice, investigations and commissioned reviews, MandA regulatory and operational due diligence, risk management, compliance role secondments and tax and business advisory services; software as a service featuring software for governance, risk and transparency, namely, valuation, expert services, investigations, cyber security, corporate finance, restructuring, legal and business solutions, data analytics and regulatory compliance; platform as a service featuring a platform for governance, risk and transparency, namely, valuation, expert services, investigations, cyber security, corporate finance, restructuring, legal and business solutions, data analytics and regulatory compliance; |
Category: | EDUCATION SERVICES |
Brand: |
KROLL |
---|---|
Description: | Education services, namely, providing seminars, conferences, classes and training for businesses in the fields of computer security, protection and risk and threat assessment information and management, expert services, business intelligence and investigations, financial restructuring, valuation, financial compliance and regulation, information management, environmental matters and governance; educational resource center on computer security, protection and risk and threat assessment information and management, expert services, business intelligence and investigations, financial restructuring, valuation, financial compliance and regulation, information management, environmental matters and governance; providing an educational website on computer security, protection and risk and threat assessment information and management, expert services, business intelligence and investigations, financial restructuring, valuation, financial compliance and regulation, information management, environmental matters and governance;The mark consists of the word KROLL with a lens design in the letter O with the inside of the letter O in the shape of a triangle.;Downloadable software and/or application software for computer security, protection and risk and threat assessment and management, expert services, business intelligence and investigations, financial restructuring, valuation, financial compliance and regulation, information management and governance; downloadable software for mobile devices, phones and hand-held computers for computer security, protection and risk and threat assessment; computer programs for recovering data on computer data storage devices after the occurrence of electrical or mechanical failure, computer operator errors, software malfunctions, natural disasters, computer viruses, and computer crimes; computer programs for recovering and/or analyzing data on computer data storage devices for purposes of detecting, recovering, and securing computer data evidence for use in forensics; computer utility programs for installing, formatting and partitioning hard disk drives; computer utility programs for managing storage devices in a networked environment; computer desktop utility software;Investment banking services; investment consulting services; investment management services; financial analysis and consulting; financial investigation services; financial valuation of business and investment securities; financial risk management; financial advisory services in the field of tax, transfer pricing, real estate, alternative assets, and fixed assets; corporate finance services; financial compliance and regulatory consulting for the financial services industry; asset evaluation and recovery services; credit verification services; corporate security services; risk, security and crisis advisory and consultancy services, consultancy and advisory services relating to security issues of computers and telecommunication systems; settlement administration; financial restructuring services, namely, restructurings, liquidations, receiverships and examinerships, out-of-court workouts, lender and creditor negotiations, recapitalizations including debt-for-equity conversions, debtor-in-possession and exit financing and insolvency; bankruptcy administration services, namely, pre-bankruptcy consulting, contract review, customized case websites, claims processing and analysis, global call center capabilities, solicitation consulting, facilitating secure disbursements, digital media plans, virtual data room support and creditors' committee work; issuer services; providing valuations for financial reporting, tax and management planning purposes; providing business valuation for intellectual property valuation, machinery and equipment valuation and strategic value advisory; secondary market advisory; real estate valuation and investment services; loan portfolio review services, namely, automated data processing platforms and cloud computing and proprietary cash-flow models; transfer pricing advisory services; property insurance valuation, fixed asset inventory and reconciliation services; advisory services for the sale, acquisition, divestiture, buyout or recapitalization of one or more businesses; transaction analysis and opinions; merger, acquisition and divestiture analysis services, namely, transaction structuring and accounting, strategy and commercial due diligence, technology due diligence, transaction data analytics, process improvement, merger integration/divestiture and comprehensive due diligence to private equity, hedge funds and strategic/corporate investors on buy-side, sell-side and lender transactions; providing process improvement, post-transaction advisory services, operational improvement analyses, working capital analyses and liquidity and cash flow analyses for distressed investments; debt advisory services;Business investigation services; business risk management; forensic accounting services; business intelligence services; screening, credentialing, and organizing third-party vendors, suppliers, and contractors, and documentation and information on behalf of others; business credit evaluation; identity theft and breach notification, call center and credit and identity monitoring, recall notification; regulatory compliance and risk assessment; reputational risk assessment; commercial information agency services; business research; commercial information agencies; corporate analysis services; information services for corporate and financial transactions; services relating to the provision of corporate and company profiles; business consulting and auditing in the field of information technology systems and computer forensic services; business enquiries and investigations; risk governance and advisory services, namely, system assessments and testing, incident preparedness, endpoint monitoring and threat detection and response, managed and outsourced services, cybersecurity threat intelligence consulting and preventative services, incident response investigation, data breach notification, identity monitoring and identity restoration; analysis related to commercial, construction, financial and technology disputes, namely, commercial litigation and international arbitration support, construction delay and quantum disputes support, fraud investigations and remediation expertise, intellectual property advisory, investigation and disputes consulting services, regulatory, accounting and economics disputes support, technology delay and disruption disputes support and project advisory expertise; analysis related to public record and human source intelligence to support decision making on strategic initiatives, namely, MandA, capital markets activity, joint ventures, political risk, new market entry, supply chain integrity and reputational risk management;Investigation, surveillance, security and risk analysis services for the safety of businesses and individuals; corporate and business vendor investigation services, including investigations of financial fraud, trade secret theft, threats of hostile acts, gray market and counterfeit products, intellectual property infringement investigations and monitoring, surveillance and vendor integrity programs; employee investigations including sexual harassment, pre-employment background checking; private investigation services; security consulting; corporate security including security architecture and security planning services; security guard services; consulting services in the field of risk and crisis management relating to escort, safety, guarding and security services; monitoring of companies for compliance with federal state regulatory requirements or corporate policies; providing country and city specific risk analysis relating to safety; monitoring security services for residential and commercial establishments through the use of computer hardware and software; auditing of hardware and software for potential security risks, computer crime and fraud prevention; licensing of computer software; due diligence services; providing advice on disputes and litigation, fraud and corruption, employee malfeasance, compliance failures, regulatory probes, sanctions breaches, unexplained business/transactional failures, money laundering, shareholder disputes, leaks of information, IP infringement, monitorships and asset search and recovery; compliance and diligence services, namely, pre-transactional intelligence, vendor/supplier/distributor due diligence, vendor risk management platform, supply chain risk management and sanctions screening and monitoring;Private investigation; security consulting; environmental social and governance compliance and risk consulting; computer security consultancy; computer services, namely, recovering and/or analyzing data from computer data storage devices after the occurrence of electrical or mechanical failure, computer operation errors, software malfunctions, natural disasters, commuter viruses, and computer crimes; computer services, namely, detecting, recovering and securing computer data evidence for use in forensics; computer services, namely, analyzing data to detect, eradicate, and prevent the occurrence of computer viruses; providing temporary use of non-downloadable computer software for computer security, protection and risk and threat assessment; computer breach security consultancy and coordinating breach notifications for a compromised entity and the consumer-facing organizations with which they work; providing risk management and security threat analysis services; providing an Internet website portal that allows users to assess and determine computer breach and coordination of breach notifications; consulting, advisory and outsourcing global financial services, namely, regulatory compliance, governance and risk programs, global registration/authorization assistance; regulatory advice, investigations and commissioned reviews, MandA regulatory and operational due diligence, risk management, compliance role secondments and tax and business advisory services; software as a service featuring software for governance, risk and transparency, namely, valuation, expert services, investigations, cyber security, corporate finance, restructuring, legal and business solutions, data analytics and regulatory compliance; platform as a service featuring a platform for governance, risk and transparency, namely, valuation, expert services, investigations, cyber security, corporate finance, restructuring, legal and business solutions, data analytics and regulatory compliance; |
Category: | EDUCATION SERVICES |
Brand: |
KROLL ADVISORY SOLUTIONS |
---|---|
Description: | Financial risk management services; financial due diligence; financial evaluations of assets and debt recovery services relating thereto; business credit verification services;Business investigation services; business risk management; forensic accounting services; business intelligence services; screening, credentialing, and organizing third-party vendors, suppliers, and contractors, and documentation and information on behalf of others;Pre-employment background screening; identification verification services, namely, providing authentication of personal identification information; consulting services in the field of privacy and security laws, regulations and requirements; consulting services in the field of maintaining the security and integrity of databases; consultation in the field of privacy, security and data governance law; investigation of assets, credit reports, fiscal assessments, and collection reports for security or authentication purposes; security services, namely, conducting recovery operations for the recovery of property and personnel; providing security assessments for businesses; fraud detection services in the fields of insurance, banking, credit cards, and business transactions; regulatory compliance consulting in the fields of anti-money laundering and bribery; consultation services in the field of privacy, security and data governance laws and regulations and requirements; legal consultation services; litigation support services; litigation support services, namely, conducting electronic legal discovery; consultation in the field of data theft and identity theft; security services, namely, threat vulnerability analysis and mitigation and emergency and crisis response and management; security services, namely, providing executive protection; intellectual property consultation; security services, namely, providing security assessments of physical locations, information systems, and working environments; private investigation services; security consultancy; regulatory compliance consulting in the field of environmental regulation; consulting and legal services in the field of privacy and security laws, regulations, and compliance requirements as they relate to data governance;ADVISORY SOLUTIONS;Computer security consultancy; design and development of electronic data security systems and contingency planning for information systems; maintenance of computer software relating to computer security and prevention of computer risks; computer forensic services; consulting services in the field of forensic science; data mining; computer consultation in the field of computer security technology relating to data governance, analytics and compliance; computer services, namely, data recovery services; computer security consulting services in the nature of high-tech cyber testing, testing of malicious code/malware, network vulnerability and penetration testing for computer systems; |
Category: | FINANCIAL RISK MANAGEMENT SERVICES |
Brand: |
KROLL CYBER INTRUSION LIFECYCLE |
---|---|
Description: | CYBER INTRUSION;Computer security consulting services in the field of digital forensics, incident response, cyberattack simulations, managed detection and response, and professional cyber security services including testing, assessments, and technical advisory; Technology research in the field of cyber threat intelligence, cyber security technology, and detection and response technology; Computer security consultancy in the field of monitoring, scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security planning services, namely, development of customized plans for improving computer and network security and preventing unauthorized and criminal activity for businesses and governmental agencies; |
Category: | CYBER INTRUSION |
Brand: |
KROLL CYBERRISKRANKER |
---|---|
Description: | KROLL CYBER RISK RANKER;CYBERRISKRANKER;Providing an Internet website portal featuring technology that allows users to assess and determine overall cyber security risk and to identify mitigating actions that can help reduce risk; cyber and computer risk management services, namely, computer and online security threat analysis for protecting data; |
Category: | KROLL CYBER RISK RANKER |
Brand: |
KROLL INTRUSION LIFECYCLE |
---|---|
Description: | INTRUSION;Computer security consulting services in the field of digital forensics, incident response, cyberattack simulations, managed detection and response, and professional cyber security services including testing, assessments, and technical advisory; Technology research in the field of cyber threat intelligence, cyber security technology, and detection and response technology; Computer security consultancy in the field of monitoring, scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security planning services, namely, development of customized plans for improving computer and network security and preventing unauthorized and criminal activity for businesses and governmental agencies; |
Category: | INTRUSION |
Brand: |
KROLL NOTIFICATION NAVIGATOR |
---|---|
Description: | NOTIFICATION;Providing a third-party internet-based website featuring information in the field of computer security, for use by entities compromised by computer security breaches and the consumer-facing organizations with which they work, for the purpose of obtaining information regarding logistical considerations involved when coordinating responses to computer security breaches; platform as a service (PAAS) featuring interactive multimedia computer software platforms for providing third-party information, used by consumer-facing organizations and their consumer-facing clients, to become informed on computer breach exposures, how to protect themselves from such exposures, and providing options for opting in to regulatory and individual notices of breach; |
Category: | NOTIFICATION |
Brand: |
KROLL REDSCAN |
---|---|
Description: | Downloadable computer software for controlling and managing databases, server access logs, user permissions, and endpoint, network, and firewall configurations; downloadable computer software for monitoring a global computer network and the security of electronic mail platforms; downloadable information security computer software platform to conduct IT asset inventory, retrieve asset information, and monitor system integration; downloadable security software for delivering alerts based on anomaly detection, suspicious behavior, or detected threats; downloadable security software for ingesting and collecting digital forensics artifacts remotely;KROLL RED SCAN;Providing a cloud-based web portal in the nature of a website featuring non-downloadable software for controlling and managing databases, server access logs, user permissions, endpoints, and network, firewall, and cloud computing configurations; providing online non-downloadable computer software for monitoring a global computer network and the security of electronic mail platforms; Information security services, namely, data security consulting in the field of protecting data and information from unauthorized access; providing online non-downloadable security software for ingesting and collecting digital forensics artifacts remotely; computer security consultancy in the field of IT equipment and devices to assess potential vulnerabilities, deliver penetration assessments, and conduct cyberattack investigations; software as a service (SaaS) services featuring software in the field of computer network and information security services for monitoring, detection, analysis, notification, and resolution of intrusion vulnerability and security threats and providing reports and assessments in connection therewith; platform as a service (PAAS) featuring computer software platform to conduct IT asset inventory, retrieve asset information, and monitor system integration; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE CONTROLLING |
Brand: |
KROLL REPORT |
---|---|
Description: | Downloadable publications in the nature of customized reports in the fields of investigative due diligence and business intelligence;Printed publications, namely, customized reports in the fields of investigative due diligence and business intelligence;Preparation of customized reports for business and commercial purposes related to due diligence investigations and business intelligence;REPORT; |
Category: | DOWNLOADABLE PUBLICATIONS NATURE |
Brand: |
KROLL RESPONDER |
---|---|
Description: | Computer security risk analysis for protecting data; computer security services for protecting data and information from theft, abuse, or unauthorized access; software as a service (SaaS) services featuring software to monitor and address threats against endpoints, networks, and cloud systems; information security consultancy being computer security consulting services for augmenting organizations' security operations against cyberattacks and digital threats, such as ransomware, malware, data theft, cryptomining, and software vulnerabilities; computer network security services for monitoring, detection, proactive threat searching, analysis, notification, and addressing resolution of intrusion vulnerability and security threats and providing reports and assessments in connection therewith, all of the foregoing being computer security consulting services; digital risk protection software as a service (SaaS) services featuring software for dark web monitoring, credential monitoring, reputation monitoring, and account takeover protections; |
Category: | COMPUTER SECURITY RISK ANALYSIS |
Brand: |
KROLL RISKRANKER |
---|---|
Description: | KROLL RISK RANKER;RISKRANKER;Providing an Internet website portal featuring technology that allows users to assess and determine overall cyber security risk, and to identify mitigating actions that can help reduce risk; computer security consultancy, namely, providing risk management, and security threat analysis services; |
Category: | KROLL RISK RANKER |
Brand: |
KROLL RISKRATING |
---|---|
Description: | Training in the field of national security; providing training in the fields of protective services, security and risk assessment, and anti-terrorism;The mark consists of KROLL RISKRATING in black with three blue panels.;KROLL RISK RATING;Financial risk management services; financial due diligence; financial evaluations of assets and debt recovery services relating thereto; business credit verification services;The color(s) blue and black is/are claimed as a feature of the mark.;Business consultation services featuring management, organizational, and business improvement; business consulting services, namely, assisting clients in the development of personnel and operating policies and practices; business investigation services; business risk management; forensic accounting services; business intelligence services; screening, credentialing, and organizing third-party vendors, suppliers, and contractors, and documentation and information on behalf of others;Identification verification services, namely, providing authentication of personal identification information; consulting services in the field of privacy and security laws, regulations and requirements; consulting services in the field of maintaining the security and integrity of databases; consulting services in the field of national security; consultation in the field of privacy, security and data governance law; investigation of assets, fiscal assessments, and collection reports for security or authentication purposes; security services, namely, conducting recovery operations for the recovery of property and personnel; fraud resolution and assistance services provided in the event of data and identity theft and fraud; providing security assessments for businesses; fraud detection services in the fields of insurance, banking, credit cards, and business transactions; regulatory compliance consulting in the fields of anti-money laundering and bribery; consultation services in the field of privacy, security and data governance laws and regulations and requirements; legal consultation services; litigation support services; consultation in the field of data theft and identity theft; providing data theft and identity theft monitoring, alerts and reports for the protection of data and identity; security services, namely, threat vulnerability analysis and mitigation and emergency and crisis response and management; security services, namely, providing executive protection; intellectual property consultation; security services, namely, providing security assessments of physical locations, information systems, and working environments; private investigation services; security consultancy; regulatory compliance consulting in the field of environmental regulation; consulting and legal services in the field of privacy and security laws, regulations, and compliance requirements as they relate to data governance; security consultation and security assessments for businesses, namely, the development of specialized security procedures, security risk mitigation procedures ad crisis management and emergency communications planning; planning and design of policies and procedures to protect the physical security of people, premises, assets and information; investigation services, namely, detective investigations, private investigations; providing an interactive online database for use in background investigations; consultation in the field of corporate and business compliance, namely, reviewing standards and practices to ensure compliance with civil and criminal laws and regulations;Computer security consultancy; design and development of electronic data security systems and contingency planning for information systems; maintenance of computer software relating to computer security and prevention of computer risks; computer forensic services; consulting services in the field of forensic science; data mining; computer consultation in the field of computer security technology relating to data governance, analytics and compliance; computer services, namely, data recovery services; computer security consulting services in the nature of high-tech cyber testing, testing of malicious code/malware, network vulnerability and penetration testing for computer systems; |
Category: | TRAINING FIELD |
Brand: |
KROLL RISKSCORE |
---|---|
Description: | Training in the field of national security; providing training in the fields of protective services, security and risk assessment, and anti-terrorism;The mark consists of KROLL RISKSCORE in black and three blue panels.;KROLL RISK SCORE;Financial risk management services; financial due diligence; financial evaluations of assets and debt recovery services relating thereto; business credit verification services;The color(s) blue and black is/are claimed as a feature of the mark.;Business consultation services featuring management, organizational, and business improvement; business consulting services, namely, assisting clients in the development of personnel and operating policies and practices; business investigation services; business risk management; forensic accounting services; business intelligence services; screening, credentialing, and organizing third-party vendors, suppliers, and contractors, and documentation and information on behalf of others;Identification verification services, namely, providing authentication of personal identification information; consulting services in the field of privacy and security laws, regulations and requirements; consulting services in the field of maintaining the security and integrity of databases; consulting services in the field of national security; consultation in the field of privacy, security and data governance law; investigation of assets, fiscal assessments, and collection reports for security or authentication purposes; security services, namely, conducting recovery operations for the recovery of property and personnel; fraud resolution and assistance services provided in the event of data and identity theft and fraud; providing security assessments for businesses; fraud detection services in the fields of insurance, banking, credit cards, and business transactions; regulatory compliance consulting in the fields of anti-money laundering and bribery; consultation services in the field of privacy, security and data governance laws and regulations and requirements; legal consultation services; litigation support services; consultation in the field of data theft and identity theft; providing data theft and identity theft monitoring, alerts and reports for the protection of data and identity; security services, namely, threat vulnerability analysis and mitigation and emergency and crisis response and management; security services, namely, providing executive protection; intellectual property consultation; security services, namely, providing security assessments of physical locations, information systems, and working environments; private investigation services; security consultancy; regulatory compliance consulting in the field of environmental regulation; consulting and legal services in the field of privacy and security laws, regulations, and compliance requirements as they relate to data governance; security consultation and security assessments for businesses, namely, the development of specialized security procedures, security risk mitigation procedures ad crisis management and emergency communications planning; planning and design of policies and procedures to protect the physical security of people, premises, assets and information; investigation services, namely, detective investigations, private investigations; providing an interactive online database for use in background investigations; consultation in the field of corporate and business compliance, namely, reviewing standards and practices to ensure compliance with civil and criminal laws and regulations;Computer security consultancy; design and development of electronic data security systems and contingency planning for information systems; maintenance of computer software relating to computer security and prevention of computer risks; computer forensic services; consulting services in the field of forensic science; data mining; computer consultation in the field of computer security technology relating to data governance, analytics and compliance; computer services, namely, data recovery services; computer security consulting services in the nature of high-tech cyber testing, testing of malicious code/malware, network vulnerability and penetration testing for computer systems; |
Category: | TRAINING FIELD |
Brand: |
KROLL THREATDETECT |
---|---|
Description: | KROLL THREAT DETECT;Information security risk analysis being computer security risk consulting servicesfor protecting data; computer security services for protecting data and information from unauthorized access; Information security services for monitoring a global computer network and the security of electronic mail platforms; Information security services being computer security threat analysis for protecting data and information from unauthorized access; providing online non-downloadable security software for ingesting and collecting digital forensics artifacts remotely; computer security consultancy in the field of IT equipment and devices to assess potential vulnerability; IT infrastructure and computer network security services for monitoring, identification, analysis, notification, and resolution of intrusion vulnerability and security threats and providing reports and assessments in connection therewith, all of the foregoing being computer security consulting service; |
Category: | KROLL THREAT DETECT |
Brand: |
LOOK BEYOND |
---|---|
Description: | Training in the field of national security; providing training in the fields of protective services, security and risk assessment, and anti-terrorism;Financial risk management services; financial due diligence; financial evaluations of assets and debt recovery services relating thereto; business credit verification services;Business consulting services, namely, assisting clients in the development of personnel and operating policies and practices; business investigation services; business risk management; forensic accounting services; business intelligence services;Security services, namely, conducting recovery operations for the recovery of property and personnel; regulatory compliance consulting in the fields of anti-money laundering and bribery; security services, namely, providing executive protection; intellectual property consultation; private investigation services; regulatory compliance consulting in the field of environmental regulation; investigation services, namely, detective investigations, private investigations;Computer security consultancy; design and development of electronic data security systems and contingency planning for information systems; maintenance of computer software relating to computer security and prevention of computer risks; computer forensic services; consulting services in the field of forensic science; data mining; computer services, namely, data recovery services; computer security consulting services in the nature of high-tech cyber testing, testing of malicious code/malware, network vulnerability and penetration testing for computer systems; monitoring the Internet; data analytics; |
Category: | TRAINING FIELD |
Brand: |
SIMPLY CYBER |
---|---|
Description: | Education services, namely, providing seminars, conferences, classes and training for small and medium businesses in the field of computer security; Educational resource center in the nature of providing workshops and training in the field of computer security;Downloadable software and/or application software for computer security, protection and risk and threat assessment; downloadable software for mobile devices, phones and hand-held computers for computer security, protection and risk and threat assessment;CYBER;Providing an Internet website portal featuring technology that allows users to assess and determine overall computer security risk, and to identify mitigating actions that can help reduce risk; computer security consultancy, namely, providing risk management, and security threat analysis services; providing temporary use of non-downloadable computer software for computer security, protection and risk and threat assessment; Providing computer security information; Educational resource center in the nature of providing a website featuring educational information in the field of computer security; Providing an educational website featuring educational information on computer security; |
Category: | EDUCATION SERVICES |
Brand: |
SIMPLYCYBER |
---|---|
Description: | Education services, namely, providing seminars, conferences, classes and training for small and medium businesses in the field of computer security; Educational resource center in the nature of providing workshops and training in the field of computer security;Downloadable software and/or application software for computer security, protection and risk and threat assessment; downloadable software for mobile devices, phones and hand-held computers for computer security, protection and risk and threat assessment;SIMPLY CYBER;Providing an Internet website portal featuring technology that allows users to assess and determine overall computer security risk, and to identify mitigating actions that can help reduce risk; computer security consultancy, namely, providing risk management, and security threat analysis services; providing temporary use of non-downloadable computer software for computer security, protection and risk and threat assessment; Providing computer security information; Educational resource center in the nature of providing a website featuring educational information in the field of computer security; Providing an educational website featuring educational information on computer security; |
Category: | EDUCATION SERVICES |
Brand: |
TRUSTED INTELLIGENCE |
---|---|
Description: | Storage services for archiving electronic data;Financial risk management services; financial due diligence; financial evaluation of assets and debt recovery services related thereto; business credit verification services;Business investigation services; business risk management; forensic accounting services; business intelligence services; screening, credentialing, and organizing third-party vendors, suppliers, and contractors, and documentation and information on behalf of others;Pre-employment background screening; identification verification services, namely, providing authentication of personal identification information; consulting services in the field of privacy and security laws, regulations and requirements; consulting services in the field of maintaining the security and integrity of databases; consultation in the field of privacy, security and data governance law; investigation of assets, credit reports, fiscal assessments, and collection reports for security or authentication purposes; security services, namely conducting recovery operations for the recovery of property and personnel; providing security assessments for businesses; fraud detection services in the fields of insurance, banking, credit cards, and business transactions; regulatory compliance consulting in the fields of anti-money laundering and bribery; consultation services in the field of privacy, security and data governance laws and regulations and requirements; legal consultation services; litigation support services; litigation support services, namely, conducting electronic legal discovery; consultation in the field of data theft and identity theft; security services, namely, threat vulnerability analysis and mitigation and emergency and crisis response and management; security services, namely, providing executive protection; intellectual property consultation; security services, namely, providing security assessments of physical locations, information systems, and working environments; private investigation services; security consultancy; regulatory compliance consulting in the field of environmental regulation; consulting and legal services in the field of privacy and security laws, regulations, and compliance requirements as they relate to data governance;INTELLIGENCE;Computer security consultancy; design and development of electronic data security systems and contingency planning for information systems; maintenance of computer software relating to computer security and prevention of computer risks; computer forensic services; consulting services in the field of forensic science; data mining; computer consultation in the field of computer security technology relating to data governance, analytics and compliance; computer services, namely, data recovery services; computer security consulting services in the nature of high-tech cyber testing, testing of malicious code/malware, network vulnerability and penetration testing for computer systems; |
Category: | STORAGE SERVICES ARCHIVING ELECTRONIC |
Brand: |
VERVE |
---|---|
Description: | Computer services, namely, providing search and processing platforms to allow users to manage data under their control via a hosted environment or on premise; |
Category: | COMPUTER SERVICES |
Brand: |
YOUR IDENTITY IS YOUR BUSINESS, PROTECTING IT IS OURS |
---|---|
Description: | Educational training, namely, providing online learning forums to organizations and individuals that include suggested best practices, links to general and proprietary resources, and next steps for reducing likelihood and impact of a data breach and any resulting identity theft; providing webcasts to educate the victim of fraud about consumer rights under applicable state and federal regulations, and distributing course materials therewith; providing e-learning courses, pod-casts and web-based seminars about identity fraud; providing online learning forums to researchers, journalists and policymakers in identity fraud; online electronic publishing of books and industry papers with editorials, commentaries, and articles on identity theft and its solutions;Monitoring consumer credit reports and providing an alert as to any changes; promoting public awareness of identity fraud and identity fraud solutions;Personal assistance services to victims of identity theft, namely, providing advice, counsel and assistance to identity theft victims to repair damage caused by identity fraud and damage to credit history; providing information about incidents of identity theft to credit reporting agencies, credit companies, banks and other government, regulatory and private organizations for others; providing consulting services, advice and information to assist others in protecting against identity theft and fraud protection; providing links to websites of others featuring identity fraud and identity theft; background investigation and research services, namely, providing consumer historical information relating to criminal, personal, and financial records of suspected criminals available through public records; |
Category: | EDUCATIONAL TRAINING |