UST Global (Singapore) Pte. Ltd.

 UST Global (Singapore) Pte. Ltd. contact information is shown below
Owner:UST GLOBAL (SINGAPORE) PTE. LTD.
Owner Address:31 Cantonment Road Singapore 089747 Singapore
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byUST Global (Singapore) Pte. Ltd.

Brand:

C

Description:

The mark consists of a half circle with a trinagle-shaped slope underneath, forming a three-dimensional letter C.;Computer software, namely, downloadable mobile applications for use in the field of cybersecurity; Downloadable computer software for use in the field of cybersecurity; Downloadable Computer software for detecting, analyzing, reporting on, and protecting computer networks and systems from cyber-attacks, including malware; Downloadable computer software for the collection and submission of cyber-attack data and malware for analysis and mitigation; Downloadable reports in the field of computer system and computer network security threats and computer system and computer network security threat consultation;Research reports in the field of computer system and computer network security threats and computer system and computer network security threat consultation;Color is not claimed as a feature of the mark.;Software as a services (SAAS) services featuring software for cyber threat detection in enterprise IT networks; Software as a service (SAAS) services featuring software for detecting, analyzing, reporting on, and protecting computer networks and systems from cyber-attacks, including malware; software as a service (SAAS) services featuring software for visualizing cyber-attacks and providing data on cyber-attacks; software as a service (SAAS) services featuring software for tracking, collecting, and analyzing the activities of users of computer networks and systems and for detecting malicious activities on computer networks and systems; software as a service (SAAS) services featuring software for detecting and analyzing the infrastructure of computer networks and systems, and identifying devices that are not under management; software as a service (SAAS) services featuring software for evaluating the performance of security measures used to protect computer networks and systems; software as a service (SAAS) services featuring software for performing security audits of computer networks and systems; Information technology consulting services; Business technology software consultation services; Computer security consultancy; Monitoring of computer systems for security purposes, namely, computer security services for protecting data and information from unauthorized access; Providing a web site featuring information in the field of computer security; Consulting services in the field of maintaining computer security for protecting the integrity of databases from unauthorized access; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technological research and analysis of computer system and computer network security threats; Providing an on-line computer database in the field of computer system and computer network security threats; Providing an Internet website portal and a website featuring technology that enables users to report computer system and computer network security threats; research in the field of artificial intelligence and computer system and computer network security technology; computer consultancy services, namely, technical analysis of computer system and computer network security threats; engineering, computer technology, and computer security consulting services; computer services, namely, monitoring and reporting on computer security threats for others; providing an internet website portal featuring information in the field of computer security; computer security consultancy, namely, electronic monitoring and reporting of computer system and computer network security threats for others; Providing temporary use of on-line, non-downloadable software for use in the field of computer security, for detecting, analyzing, reporting on, and protecting computer networks and systems from cyber-attacks, including malware, and for the collection and submission of cyber-attack data and malware for analysis and mitigation;

Category: