ABSOLUTE SOFTWARE CORPORATION logo

ABSOLUTE SOFTWARE CORPORATION

55 Marks
Corp.
First Filed:Sep 1, 1994Latest Filed:Mar 17, 2026Address:980 Howe Street, Vancouver, BC V6Z 0C8, CA

Portfolio Overview

Registered
16(29%)
Pending
12(22%)
Dead
27(49%)

Top Classes

Class 9
Electronics, Software & Scientific Equipment
50(91%)
Class 42
Software, IT Services & Scientific Research
24(44%)
Class 45
Personal services
19(35%)

TTAB Proceedings

Total Proceedings
3
As Plaintiff
2(67%)
As Defendant
1(33%)

Top Firms

DONAHUE FITZGERALD LLP(Nov 2025)
25
Christensen O'Connor Johnson...(Jan 2016)
13
Womble Bond Dickinson (US) L...(Apr 2016)
10
Carr & Ferrell LLP(May 2024)
2

Trademark Activity Timeline(1994 – 2026)

Trademark Portfolio

55 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
ABSOLUTE SECURITY RESILIENCE INDEX
PENDING
Owner:
Serial:99708179
Filed:Mar 17, 2026
Classes:9
RESILIENCE RISK INDEX
PENDING
Owner:
Serial:99708201
Filed:Mar 17, 2026
Classes:9
THE RESILIENT CISO
THE RESILIENT CISO
Service Mark
Unknown
PENDING
Owner:
Serial:79441097
Filed:Nov 7, 2025
Classes:35, 41, 42
Goods & Services
Class 035: Business data analysis in the field of cyber security, network security, computer security; benchmarking services; benchmarking services for business management purposes; business consultancy in the field of cybersecurity; cybersecurity risk assessment and analysis services for business purposes; preparation and compilation of business reports; providing business and commercial information in the field of cyber security, network security, computer security.; Class 041: Arranging and conducting seminars, webinars, conferences, and workshops in the field of cyber security, network security, computer security; business training in the field of information technology and cyber security; professional coaching services in the fields of business risk management, leadership development, information technology, and cyber security; education services namely, providing non-downloadable webinars, videos, and podcasts in the fields of business risk management, leadership development, information technology, and cyber security; providing online electronic publications, non downloadable, in the field of business risk management, information technology, and cyber security; providing analysis and commentary in the field of business risk management, information technology, and cyber security via podcasts, television shows, blogs and websites via the internet; providing recognition and incentives by the way of awards to promote excellence in the field of business risk management, information technology, and cyber security.; Class 042: Computer software installation, implementation, configuration, maintenance, and technical support services; maintenance and updating of computer software for computer and network security and prevention of computer risks; computer security services, namely, testing, monitoring, and prevention of unauthorized access to hard dives, computer networks, and data; software as a service (SaaS) services featuring non-downloadable software for computer, network, and data security, endpoint device management, data protection, and creation of secure distributed network environments; providing temporary use of non-downloadable software for detecting, reporting, and responding to security incidents and threats; computer security consultancy.
THE RESILIENT CISO
THE RESILIENT CISO
Service Mark
Word
ITU
PENDING
Owner:
Serial:99483588
Filed:Nov 6, 2025
Classes:35, 41, 42
Goods & Services
Class 035: Business data analysis in the field of cyber security, network security, computer security; benchmarking services; benchmarking services for business management purposes; business consultancy in the field of cybersecurity; cybersecurity risk assessment and analysis services for business purposes; preparation and compilation of business reports; providing business and commercial information in the field of cyber security, network security, computer security.; Class 041: Arranging and conducting seminars, webinars, conferences, and workshops in the field of cyber security, network security, computer security; business training in the field of information technology and cyber security; education services namely, providing non-downloadable webinars, videos, and podcasts in the fields of business risk management, leadership development, information technology, and cyber security; providing online electronic publications, non downloadable, in the field of business risk management, information technology, and cyber security; providing analysis and commentary in the field of business risk management, information technology, and cyber security via podcasts, television shows, blogs and websites via the internet; providing recognition and incentives by the way of awards to promote excellence in the field of business risk management, information technology, and cyber security.; Class 042: Computer software installation, implementation, configuration, maintenance, and technical support services; maintenance and updating of computer software for computer and network security and prevention of computer risks; computer security services, namely, testing, monitoring, and prevention of unauthorized access to hard dives, computer networks, and data; Software as a Service (SaaS) services featuring non-downloadable software for computer, network, and data security, endpoint device management, data protection, and creation of secure distributed network environments; providing temporary use of non-downloadable software for detecting, reporting, and responding to security incidents and threats; computer security consultancy.
ABSOLUTE RESILIENCE SCORE
PENDING
Owner:
Serial:99289739
Filed:Jul 17, 2025
Classes:9, 42, 45
Goods & Services
Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;; Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
RESILIENCE FOR AUTOMATION
PENDING
Owner:
Serial:99289725
Filed:Jul 17, 2025
Classes:9, 42, 45
Goods & Services
Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;; Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
RESILIENCE FOR SECURITY
RESILIENCE FOR SECURITY
Trademark
Word
ITU
PENDING
Owner:
Serial:99289713
Filed:Jul 17, 2025
Classes:9, 42, 45
Goods & Services
Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;; Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
RESILIENCE INDEX
RESILIENCE INDEX
Trademark
Word
ITU
PENDING
Owner:
Serial:99289734
Filed:Jul 17, 2025
Classes:9, 42, 45
Goods & Services
Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;; Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
ABSOLUTE REHYDRATE
ABSOLUTE REHYDRATE
Trademark
Word
ITU
PENDING
Owner:
Serial:98909468
Filed:Dec 18, 2024
Classes:9, 42
Goods & Services
Downloadable computer security software; downloadable computer security monitoring and tracking software; downloadable computer security software for monitoring and tracking computer security and prevention of computer risks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and security software for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable and recorded computer operating software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring recorded computer security operating software and electronic erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals in electronic format sold together as a unit therewith;; Installation, implementation and ongoing support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; automatic back-up of information on personal computers; installation, removal and updating of computer software on a personal computer; security testing of computer software applications; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services;
ABSOLUTE REHYDRATION
ABSOLUTE REHYDRATION
Trademark
Word
ITU
PENDING
Owner:
Serial:98909450
Filed:Dec 18, 2024
Classes:9, 42
Goods & Services
Downloadable computer security software; downloadable computer security monitoring and tracking software; downloadable computer security software for monitoring and tracking computer security and prevention of computer risks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and security software for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable and recorded computer operating software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring recorded computer security operating software and electronic erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals in electronic format sold together as a unit therewith;; Installation, implementation and ongoing support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; automatic back-up of information on personal computers; installation, removal and updating of computer software on a personal computer; security testing of computer software applications; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services;
ABSOLUTE RADIX
ABSOLUTE RADIX
Trademark
Word
ABANDONED
Owner:
Serial:98574650
Filed:May 29, 2024
Classes:9, 42, 45
Goods & Services
Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;; Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; installation, removal and updating of computer software on a personal computer; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
RADIX
RADIX
Trademark
Word
ABANDONED
Owner:
Serial:98575007
Filed:May 29, 2024
Classes:9, 42, 45
Goods & Services
Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;; Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
79389507
79389507
Trademark
Design
REGISTERED
Owner:
Serial:79389507
Filed:Sep 15, 2023
Classes:9
Registration:7998243
Registered:Oct 28, 2025
Goods & Services
Downloadable computer security software; downloadable computer security monitoring and tracking software; downloadable computer security software for monitoring and tracking computer security and prevention of computer risks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and security software for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable and recorded computer operating software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring recorded computer security operating software and electronic erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals in electronic format sold together as a unit therewith
ABSOLUTE SOFTWARE
ABSOLUTE SOFTWARE
Trademark
Word
REGISTERED
Owner:
Serial:79327050
Filed:May 7, 2021
Classes:9, 42, 45
Registration:7307177
Registered:Feb 20, 2024
Goods & Services
Downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptop personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (eproms) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; and instruction manuals sold together as a unit therewith; Providing investigation, surveillance and security services for the purpose of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purpose of protection of personal property, namely, monitoring and tracking of location of personal computers; surveillance services relating to the tracking of lost and stolen personal property; security services for the purpose of protection of personal property, namely, notification of law enforcement if personal computers are lost or stolen; "SOFTWARE"; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; technical support services, namely, installation, removal and updating of computer software on a personal computer
ABSOLUTE PROTECT
ABSOLUTE PROTECT
Trademark
Word
REGISTERED
Owner:
Serial:79327329
Filed:Apr 15, 2021
Classes:9, 42, 45
Registration:7307179
Registered:Feb 20, 2024
Goods & Services
Downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptop personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (eproms) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; and instruction manuals sold together as a unit therewith; Providing investigation, surveillance and security services for the purpose of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purpose of protection of personal property, namely, monitoring and tracking of location of personal computers; surveillance services relating to the tracking of lost and stolen personal property; security services for the purpose of protection of personal property, namely, notification of law enforcement if personal computers are lost or stolen; "PROTECT"; Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; technical support services, namely, installation, removal and updating of computer software on a personal computer
ABSOLUTE SECURE
ABSOLUTE SECURE
Trademark
Word
ITU
PENDING
Owner:
Serial:90639627
Filed:Apr 12, 2021
Classes:9, 42, 45
Goods & Services
Downloadable Security software in the field of generation of security access codes for accessing self-encrypting drives; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptop personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMS) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; and instruction manuals sold together as a unit therewith; Services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices; automatic deletion of files on personal computers and notification of law enforcement if personal computers are lost or stolen; "SECURE"; Installation, implementation, maintenance and ongoing technical support services in the nature of troubleshooting problems of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation, maintenance and ongoing technical support services in the nature of troubleshooting problems of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation, maintenance and ongoing technical support services in the nature of troubleshooting problems of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation, maintenance and ongoing technical support services in the nature of troubleshooting problems of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation, maintenance and ongoing technical support services in the nature of troubleshooting problems of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, users, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; computer security services, namely, monitoring and tracking of location of personal computers; automatic back-up of information on personal computers; installation, removal and updating of computer software on a personal computer; Computer security services, namely providing validation of identity of end users of personal computers; computer monitoring services which track application software performance, perform periodic maintenance, and provide reports and alerts concerning such performance
APPLICATION PERSISTENCE
REGISTERED
Owner:
Serial:88985166
Filed:Jun 11, 2020
Classes:9
Registration:7998720
Registered:Oct 28, 2025
Goods & Services
Downloadable computer software, namely, a feature of downloadable computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software downloaded to personal mobile devices, namely, a feature of computer software downloaded to personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software for computers, namely, a feature of security software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and manuals sold as a unit for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; "APPLICATION"
APPLICATION PERSISTENCE
APPLICATION PERSISTENCE
Service Mark
Word
REGISTERED
Owner:
Serial:88959857
Filed:Jun 11, 2020
Classes:42, 45
Registration:7198403
Registered:Oct 24, 2023
Goods & Services
Class 042: Installation, implementation and troubleshooting of computer software problems and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and troubleshooting of computer software problems and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; Class 045: Services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices
ENDPOINT RESILIENCE
ENDPOINT RESILIENCE
Trademark
Word
PENDING
Owner:
Serial:88914045
Filed:May 13, 2020
Classes:9, 42, 45
Goods & Services
Downloadable computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software downloaded to personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software and equipment for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and manuals sold as a unit for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; Services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices; Installation, implementation and troubleshooting of computer software problems and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and ongoing support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures
ABSOLUTE CONTROL
ABSOLUTE CONTROL
Trademark
Word
REGISTERED
Owner:
Serial:87497642
Filed:Jun 20, 2017
Classes:9, 42, 45
Registration:6331291
Registered:Apr 27, 2021
Goods & Services
Computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software and equipment for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and instructional manuals for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices sold as a unit | Installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures | services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices
ABSOLUTE REACH
ABSOLUTE REACH
Trademark
Word
REGISTERED
Owner:
Serial:87497616
Filed:Jun 20, 2017
Classes:9, 42, 45
Registration:6279721
Registered:Mar 2, 2021
Goods & Services
Computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software and equipment for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and instructional manuals for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices sold as a unit | Installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures | services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices
ABSOLUTE RESILIENCE
ABSOLUTE RESILIENCE
Trademark
Word
REGISTERED
Owner:
Serial:87497636
Filed:Jun 20, 2017
Classes:9, 42, 45
Registration:6279723
Registered:Mar 2, 2021
Goods & Services
Computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software and equipment for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and instructional manuals for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices sold as a unit | Installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures | services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices
ABSOLUTE VISIBILITY
ABSOLUTE VISIBILITY
Trademark
Word
REGISTERED
Owner:
Serial:87497624
Filed:Jun 20, 2017
Classes:9, 42, 45
Registration:6279722
Registered:Mar 2, 2021
Goods & Services
Computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software and equipment for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and instructional manuals for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices sold as a unit | Installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures | services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices
ABSOLUTE SECURITY
ABSOLUTE SECURITY
Trademark
Word
REGISTERED
Owner:
Serial:87365150
Filed:Mar 9, 2017
Classes:9, 42, 45
Registration:6061321
Registered:May 26, 2020
Goods & Services
Computer software in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; security software and equipment for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, disks and EPROMS and instructional manuals for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices sold as a unit; Services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service centre on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices; "SECURITY"; Installation, implementation and ongoing technical support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing technical support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures
SELF-HEALING ENDPOINT
REGISTERED
Owner:
Serial:87326612
Filed:Feb 7, 2017
Classes:9
Registration:5583336
Registered:Oct 16, 2018
Goods & Services
Embedded software for use in operational and security monitoring, alerting, repairing, cyber defense and cyber-security of computer systems, laptops, mobile devices and tablet computers, in the nature of endpoints, including identifying unauthorized, new or unknown software, data files, and executable files and blocking unauthorized software executions and data access
ABSOLUTE LOCK
ABSOLUTE LOCK
Trademark
Word
ABANDONED
Owner:
Serial:87019074
Filed:Apr 29, 2016
Classes:9
Goods & Services
"LOCK"
PARTNERCONNECT
PARTNERCONNECT
Service Mark
Word
ABANDONED
Owner:
Serial:86969171
Filed:Apr 8, 2016
Classes:35
CONFIDENT TO THE CORE
ABANDONED
Owner:
Serial:86891785
Filed:Jan 29, 2016
Classes:9
PERSISTENCE AS A PLATFORM
ABANDONED
Owner:
Serial:86875551
Filed:Jan 14, 2016
Classes:9
ABSOLUTE DDS
ABSOLUTE DDS
Trademark
Word
ABANDONED
Owner:
Serial:86730403
Filed:Aug 19, 2015
Classes:9
ABSOLUTE
ABSOLUTE
Trademark
Combined
REGISTERED
Owner:
Serial:86717471
Filed:Aug 6, 2015
Classes:9, 42, 45
Registration:5656052
Registered:Jan 15, 2019
Goods & Services
Computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; computer software for tracking and managing information for use in the field of information technology service management; computer software for tracking and managing information for use in the field of information technology asset management for mobile devices; computer software that generates security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; computer security software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMS) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; and instruction manuals sold together as a unit therewith; (Based on Section 44) Services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services for security purposes wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service center on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices; Installation, implementation and maintenance of computer software for use in the field of information technology asset and lifecycle management and power management; installation, implementation and maintenance of computer software for use in the field of information technology service management; installation, implementation and maintenance of computer software for use in the field of information technology asset management for mobile devices; installation, implementation and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures
ABSOLUTE SECURE
ABSOLUTE SECURE
Trademark
Word
ABANDONED
Owner:
Serial:86585954
Filed:Apr 2, 2015
Classes:9
ABSOLUTE PERSIST
ABSOLUTE PERSIST
Trademark
Word
ABANDONED
Owner:
Serial:86563487
Filed:Mar 13, 2015
Classes:9
ABSOLUTE
ABSOLUTE
Trademark
Word
REGISTERED
Owner:
Serial:86511335
Filed:Jan 22, 2015
Classes:9, 42
Registration:5324160
Registered:Oct 31, 2017
Goods & Services
Computer software for tracking and managing information, installation and system configuration, installation and deployment of software updates, encryption, access control, monitoring and protection of information in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures | Installation, implementation and ongoing support in the nature of troubleshooting of software and hardware problems and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing support in the nature of troubleshooting of software and hardware problems and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures
UNIFIED IT
UNIFIED IT
Trademark
Word
ABANDONED
Owner:
Serial:86211013
Filed:Mar 4, 2014
Classes:9
ABSOLUTE SERVICE
ABSOLUTE SERVICE
Trademark
Word
ABANDONED
Owner:
Serial:86038853
Filed:Aug 15, 2013
Classes:9
Goods & Services
"SERVICE"
COMPUTRACE
COMPUTRACE
Trademark
Word
ABANDONED
Owner:
Serial:86038874
Filed:Aug 15, 2013
Classes:9
PERSISTENCE
PERSISTENCE
Trademark
Word
REGISTERED
Owner:
Serial:86032085
Filed:Aug 8, 2013
Classes:9, 45
Registration:4967071
Registered:May 31, 2016
Goods & Services
Security software, computer disks and erasable programmable read only memories (EPROMS) for security systems for computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices, and manuals sold as a unit therewith; Monitoring and tracking services for locating lost or stolen computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices, namely, monitoring services wherein telecommunications equipment is maintained to receive telephone signals originating with computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices programmed with software designed to contact the monitoring service center on a regular basis or in the event of theft or loss of the computer tablets, personal digital assistants, mobile phones, cameras, and other computing devices
ABSOLUTE INSIGHT
ABSOLUTE INSIGHT
Trademark
Word
ABANDONED
Owner:
Serial:86029948
Filed:Aug 6, 2013
Classes:9
MOBILE THEFT MANAGEMENT
ABANDONED
Owner:
Serial:85842185
Filed:Feb 6, 2013
Classes:9
ABSOLUTE MOBILE THEFT MANAGEMENT
CANCELLED
Owner:
Serial:85777349
Filed:Nov 12, 2012
Classes:9
Registration:5163722
Registered:Mar 21, 2017
Goods & Services
"MOBILE THEFT MANAGEMENT"
FASTCONNECT
FASTCONNECT
Trademark
Word
ABANDONED
Owner:
Serial:85631622
Filed:May 22, 2012
Classes:9
ABSOLUTE MANAGE MDM
ABSOLUTE MANAGE MDM
Trademark
Word
CANCELLED
Owner:
Serial:85298106
Filed:Apr 18, 2011
Classes:9
Registration:4258428
Registered:Dec 11, 2012
Goods & Services
"MDM"
ABSOLUTE SECURE PASS
ABANDONED
Owner:
Serial:85171465
Filed:Nov 8, 2010
Classes:9
Goods & Services
"SECURE PASS"
ABSOLUTE SECURE DRIVE
CANCELLED
Owner:
Serial:85142375
Filed:Sep 30, 2010
Classes:9
Registration:4144952
Registered:May 22, 2012
Goods & Services
"SECURE DRIVE"
ABSOLUTE DATA PROTECT
CANCELLED
Owner:
Serial:85086871
Filed:Jul 16, 2010
Classes:9
Registration:4576122
Registered:Jul 29, 2014
ABSOLUTE MANAGE
ABSOLUTE MANAGE
Trademark
Word
CANCELLED
Owner:
Serial:77952857
Filed:Mar 8, 2010
Classes:9
Registration:3991667
Registered:Jul 12, 2011
Goods & Services
Class 009: Computer software for use in the field of information technology asset and lifecycle management, namely, computer software for tracking, managing and auditing computer software licenses and compliance; computer software for tracking and managing information on computer hardware assets, user, installation and system configuration and installation and deployment of computer software and software updates by local or remote means; computer software for power management
THEFTGUARD
THEFTGUARD
Trademark
Word
CANCELLED
Owner:
Serial:78887607
Filed:May 19, 2006
Classes:9, 45
Registration:3870211
Registered:Nov 2, 2010
Goods & Services
Class 009: Computer software for securing computer hardware and software from theft, provided in a hard disk or downloadable format; computer software for providing asset tracking and management of computer hardware and software, provided in a hard disk or downloadable format; Class 045: Monitoring of computer systems for security purposes related to the recovery or attempted recovery of lost or stolen computer hardware; and tracking services for retrieval of encoded computer hardware products
SECURE ASSET TRACKING
ABANDONED
Owner:
Serial:78390272
Filed:Mar 24, 2004
Classes:9
THEFTGUARD
THEFTGUARD
Trademark
Word
ABANDONED
Owner:
Serial:78384751
Filed:Mar 15, 2004
Classes:9
LAPTOP RETRIEVER
LAPTOP RETRIEVER
Trademark
Word
CANCELLED
Owner:
Serial:78257157
Filed:Jun 2, 2003
Classes:9
Registration:2983932
Registered:Aug 9, 2005
Goods & Services
"LAPTOP"
LIVETIME
LIVETIME
Trademark
Word
CANCELLED
Owner:
Serial:78105826
Filed:Jan 30, 2002
Classes:9
Registration:2833058
Registered:Apr 13, 2004
Goods & Services
Class 009: Computer software and hardware for extracting, analyzing and reporting business, financial, accounting and management information
ABSOLUTE
ABSOLUTE
Trademark
Word
ABANDONED
Owner:
Serial:76268098
Filed:Jun 7, 2001
Classes:9
Goods & Services
Computer software
ABSOLUTE
ABSOLUTE
Service Mark
Word
REGISTERED
Owner:
Serial:76268099
Filed:Jun 7, 2001
Classes:42
Registration:2765018
Registered:Sep 16, 2003
Goods & Services
computer services, namely, monitoring and tracking of location of personal computers; monitoring and tracking of information, data and status of software and other programs on personal computers; validation of identity of end users of personal computers; automatic deletion of files on personal computers and notification of law enforcement if personal computers are lost or stolen; automatic back-up of information on personal computers; installation, removal, and updating of computer software on a personal computer
COMPUTRACE
COMPUTRACE
Trademark
Word
REGISTERED
Owner:
Serial:74568725
Filed:Sep 1, 1994
Classes:9, 42
Registration:2086195
Registered:Aug 5, 1997
Goods & Services
computer software for use in tracing locations of lost or stolen computers; monitoring of computers by telephone to determine the location of lost or stolen computers

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.