CONETRIX, LLC
11 Marks
LLC
First Filed:Aug 26, 1986Latest Filed:Feb 18, 2021Address:5225 S Loop 289 Suite 207, Lubbock, TX 79424
Portfolio Overview
Registered
7(64%)Dead
4(36%)Previous
3Top Classes
Class 42
Software, IT Services & Scientific ResearchClass 9
Electronics, Software & Scientific EquipmentClass 35
Advertising, Business Services & RetailTTAB Proceedings
No litigation activity
Top Firms
Simpson Trademark Law, PLLC(Feb 2021)
11
Law Office of Christopher Da...(Dec 2017)
1
Trademark Portfolio
14 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
11
3
Status
9
0
3
2
0
Mark Type
8
1
0
5
0
4
1
1
8
Goods & Services
Business analysis and business strategic planning services in the technology industry; Business consulting services in the field of cybersecurity; Business consulting services in the field of information security
Goods & Services
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Backup services for computer hard drive data; Computer disaster recovery planning; Computer network configuration services; Computer network design for others; Computer project management services; Computer security consultancy; Computer services, namely, cloud hosting provider services; Computer services, namely, computer system administration for others; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer software installation and maintenance; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting in the field of information technology; Consulting in the field of virtualization technologies for enterprises and businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Development of security systems and contingency planning for information systems; Hosting the software, websites and other computer applications of others on a virtual private server; Installation and maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems by remote access to ensure proper functioning; Providing virtual computer systems and virtual computer environments through cloud computing; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Computer services, namely, data recovery services; Computer systems analysis; Installation of computer software; Integration of computer systems and networks; Information technology audit services, namely, testing and analysis of information technology systems; technical support, namely, monitoring technological functions of computer network systems; Business technology software consultation services; Computer services, namely, management of cybersecurity specifically computer security systems management; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity; Computer services, namely, monitoring technological functions of networks for malicious activity and exploits, stopping malicious activity and exploits by means of restricting access and blocking unauthorized programs and users of computer systems, alerting network users and owners via notifications of computer network system events, and restoring or recovering normal network operations; Computer services, namely, monitoring technological functions of computer systems for malicious activity and exploits, stopping malicious activity and exploits by means of restricting access and blocking unauthorized programs and users of computer systems, alerting network users and owners via notification of computer network system events, and restoring or recovering normal system operations; Computer services, namely, providing network threat protection services by means of restricting unauthorized access to computer systems and networks; Managed security services, namely, network threat protection services specifically computer security threat analysis for protecting data
Goods & Services
Downloadable computer application software for mobile devices, namely, software for information security; Downloadable computer application software for mobile devices, namely, software for business continuity planning; Downloadable computer application software for mobile devices, namely, software for vendor management programs; Downloadable computer application software for mobile devices, namely, software for information security and regulatory compliance for financial institutions | Providing on-line non-downloadable software for information security; Providing on-line non-downloadable software for cybersecurity; Providing on-line non-downloadable software for regulatory compliance; Providing on-line non-downloadable software for audit management; Providing on-line non-downloadable software for business continuity planning; Providing on-line non-downloadable software for regulatory compliance management; Providing on-line non-downloadable software for cybersecurity assessments; Providing on-line non-downloadable software for identity theft prevention programs; Providing on-line non-downloadable software for internet banking security programs; Providing on-line non-downloadable software for phishing security awareness programs; Providing on-line non-downloadable software for phishing simulations; Providing on-line non-downloadable software for policy and procedure management; Providing on-line non-downloadable software for information security risk assessment; Providing on-line non-downloadable software for management of security and compliance related to social media; Providing on-line non-downloadable software for vendor management programs; Providing on-line non-downloadable software for information security and regulatory compliance for financial institutions; Providing temporary use of online, non-downloadable enterprise software for information security; Providing temporary use of online, non-downloadable enterprise software for cybersecurity; Providing temporary use of online, non-downloadable enterprise software for regulatory compliance; Providing temporary use of online, non-downloadable enterprise software for audit management; Providing temporary use of online, non-downloadable enterprise software for business continuity planning; Providing temporary use of online, non-downloadable enterprise software for regulatory compliance management; Providing temporary use of online, non-downloadable enterprise software for cybersecurity assessments; Providing temporary use of online, non-downloadable enterprise software for identity theft prevention programs; Providing temporary use of online, non-downloadable enterprise software for internet banking security programs; Providing temporary use of online, non-downloadable enterprise software for phishing security awareness programs; Providing temporary use of online, non-downloadable enterprise software for phishing simulations; Providing temporary use of online, non-downloadable enterprise software for policy and procedure management; Providing temporary use of online, non-downloadable enterprise software for information security risk assessment; Providing temporary use of online, non-downloadable enterprise software for management of security and compliance related to social media; Providing temporary use of online, non-downloadable enterprise software for vendor management programs; Providing temporary use of online, non-downloadable enterprise software for information security and regulatory compliance for financial institutions; Providing a secured-access, members only website featuring technology that gives members the ability to manage information security risk; Providing a secured-access, members only website featuring technology that gives members the ability to manage regulatory compliance; Providing a secured-access, members only website featuring technology that gives members the ability to manage audits and exams; Providing a secured-access, members only website featuring technology that gives members the ability to manage Business continuity and disaster recovery; Providing a secured-access, members only website featuring technology that gives members the ability to assess cybersecurity risk; Providing a secured-access, members only website featuring technology that gives members the ability to develop an identity theft prevention program; Providing a secured-access, members only website featuring technology that gives members the ability to manage risks of e-banking services; Providing a secured-access, members only website featuring technology that gives members the ability to train employees to avoid phishing attacks; Providing a secured-access, members only website featuring technology that gives members the ability to manage workplace policies and procedures; Providing a secured-access, members only website featuring technology that gives members the ability to manage and store third-party vendor information and data; Providing a secured-access, members only website featuring technology that gives members the ability to manage a social media compliance and risk management program; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding information security; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding cybersecurity; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding regulatory compliance; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding audit management; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding business continuity planning; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding regulatory compliance management; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding cybersecurity assessments; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding identity theft prevention programs; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding internet banking security programs; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding policy and procedure management; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding information security risk assessment; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding management of security and compliance related to social media; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding vendor management programs; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding information security and regulatory compliance for financial institutions; Providing on-line non-downloadable software for incident management programs; Providing temporary use of online, non-downloadable enterprise software for incident management programs; Providing a web site featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes regarding incident management programs
Goods & Services
Cloud computing featuring software for use word processing, spreadsheets, and presentations.; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, cloud hosting provider services; Computer services, namely, integration of private and public cloud computing environments; Consulting services in the field of cloud computing; Providing virtual computer systems and virtual computer environments through cloud computing; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Updating and maintaining cloud-based computer software through online updates, enhancements and patches
Goods & Services
Backup services for computer hard drive data; Computer consultation; Computer consultation in the field of computer security; Computer disaster recovery planning; Computer network configuration services; Computer network design for others; Computer programming; Computer project management services; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer services, namely, cloud hosting provider services; Computer services, namely, computer system administration for others; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer software development and computer programming development for others; Computer software development, computer programming and maintenance of computer software for business accounting and management.; Computer software installation and maintenance; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting in the field of IT project management; Consulting in the field of virtualization technologies for enterprises and businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Design, maintenance, development and updating of computer software; Development of security systems and contingency planning for information systems; Hosting the software, websites and other computer applications of others on a virtual private server; Installation and maintenance of computer software; IT consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems by remote access to ensure proper functioning; Providing virtual computer systems and virtual computer environments through cloud computing; Software as a service (SAAS) services featuring software for financial institutions to meet regulatory compliance of Gramm-Leach-Bliley Act (GLBA); Technical support services, namely, remote administration and management of in-house and hosted datacenter devices, databases and software applications; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems
ACCOUNTINGWARE
Goods & Services
Class 009: COMPUTER PROGRAM
Goods & Services
On-line journals, namely, blogs featuring information on accounting software and best practices