FORTRA, LLC logo

FORTRA, LLC

92 Marks
LLC
First Filed:Jan 10, 1990Latest Filed:Mar 21, 2025Address:11095 Viking Drive, Eden Prairie, MN 55344, US

Portfolio Overview

Registered
66(72%)
Pending
9(10%)
Dead
17(18%)
Previous
3

Top Classes

Class 9
Electronics, Software & Scientific Equipment
85(92%)
Class 42
Software, IT Services & Scientific Research
30(33%)
Class 41
Education and Entertainment
1(1%)

TTAB Proceedings

Total Proceedings
2
As Plaintiff
1(50%)
As Defendant
1(50%)

Top Firms

FREDRIKSON & BYRON, P.A.(Mar 2025)
93
Unlimi-Tech Software Inc(Apr 2006)
1

Trademark Activity Timeline(1990 – 2025)

Trademark Portfolio

95 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
99097561
99097561
Service Mark
Design
PENDING
Owner:
Serial:99097561
Filed:Mar 21, 2025
Classes:42
Goods & Services
Class 042: Software as a service (SAAS) services featuring software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
FORTRA WE BREAK THE ATTACK CHAIN
PENDING
Owner:
Serial:99097583
Filed:Mar 21, 2025
Classes:42
Goods & Services
Class 042: Software as a service (SAAS) services featuring software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
WE BREAK THE ATTACK CHAIN
PENDING
Owner:
Serial:99047581
Filed:Feb 19, 2025
Classes:42
Goods & Services
Software as a service (SAAS) services featuring software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
WE BREAK THE CHAIN
WE BREAK THE CHAIN
Service Mark
Word
PENDING
Owner:
Serial:99040437
Filed:Feb 13, 2025
Classes:42
Goods & Services
Software as a service (SAAS) services featuring software for for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
FORTRA PLATFORM
FORTRA PLATFORM
Service Mark
Word
PENDING
Owner:
Serial:98643490
Filed:Jul 11, 2024
Classes:9, 42
Goods & Services
Downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling computer software updates, computer systems management, computer message management, backup and recovery of computer systems, management of computer system performance reports, computer system security management, computer system data access, application development, machine learning intelligence, monitoring computer security threats, and for sharing and accessing security expertise information in the field of security threat analysis for protecting computer cloud, networks, applications and endpoints in on-premises, hybrid and cloud environments; "PLATFORM"; Computer security services, namely, security intelligence in the nature of monitoring of computer systems for detecting unauthorized access for protecting data and information for security purposes; Computer security services, namely, development of customized software for others for use in risk assessment in the field of security threat analysis for protecting computer networks from unauthorized access; Providing online non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling computer software updates, computer systems management, computer message management, backup and recovery of computer systems, management of computer system performance reports, computer system security management, computer system data access, application development, machine learning intelligence, monitoring computer security threats, and for sharing and accessing security expertise information in the field of security threat analysis for protecting computer cloud, networks, applications and endpoints in on-premises, hybrid and cloud environments; Providing resources, namely, providing information and consulting services in the fields of software design and technology support in the nature of detecting, analyzing and troubleshooting computer software problems
FORTRA THREAT BRAIN
FORTRA THREAT BRAIN
Service Mark
Word
PENDING
Owner:
Serial:98643498
Filed:Jul 11, 2024
Classes:9, 42
Goods & Services
Downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling computer software updates, computer systems management, computer message management, backup and recovery of computer systems, management of computer system performance reports, computer system security management, computer system data access, application development, machine learning intelligence, monitoring computer security threats, and for sharing and accessing security expertise information in the field of security threat analysis for protecting computer cloud, networks, applications and endpoints in on-premises, hybrid and cloud environments; "THREAT"; Computer security services, namely, security intelligence in the nature of monitoring of computer systems for detecting unauthorized access for protecting data and information for security purposes; Computer security services, namely, development of customized software for others for use in risk assessment in the field of security threat analysis for protecting computer networks from unauthorized access; Providing online non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling computer software updates, computer systems management, computer message management, backup and recovery of computer systems, management of computer system performance reports, computer system security management, computer system data access, application development, machine learning intelligence, monitoring computer security threats, and for sharing and accessing security expertise information in the field of security threat analysis for protecting computer cloud, networks, applications and endpoints in on-premises, hybrid and cloud environments; Providing resources, namely, providing information and consulting services in the fields of software design and technology support in the nature of detecting, analyzing and troubleshooting computer software problems
97740803
97740803
Trademark
Design
REGISTERED
Owner:
Serial:97740803
Filed:Jan 4, 2023
Classes:9, 42
Registration:7560292
Registered:Nov 5, 2024
Goods & Services
Downloadable and recorded computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development
FORTRA
FORTRA
Trademark
Combined
PENDING
Owner:
Serial:97740789
Filed:Jan 4, 2023
Classes:9, 42
Goods & Services
Downloadable and recorded computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; Providing online, non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
POSITIVE CHANGE IS COMING TO CYBERSECURITY
Owner:
Serial:97737550
Filed:Dec 30, 2022
Classes:9
PROBLEM SOLVER. PROACTIVE PROTECTOR. RELENTLESS ALLY.
Owner:
Serial:97737537
Filed:Dec 30, 2022
Classes:9, 42
Goods & Services
Downloadable and recorded computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; Providing online, non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
YOUR CYBERSECURITY ALLY
PENDING
Owner:
Serial:97562869
Filed:Aug 24, 2022
Classes:9, 42
Goods & Services
Downloadable and recorded computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; "CYBERSECURITY"; Providing online, non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
CYBERSECURITY DONE DIFFERENTLY
ABANDONED
Owner:
Serial:97526558
Filed:Jul 29, 2022
Classes:9
Goods & Services
"CYBERSECURITY"
NOTHING IS UNSOLVABLE
ABANDONED
Owner:
Serial:97526564
Filed:Jul 29, 2022
Classes:9
BOKS
BOKS
Trademark
Word
REGISTERED
Owner:
Serial:97444848
Filed:Jun 6, 2022
Classes:9
Registration:7086750
Registered:Jun 20, 2023
Goods & Services
Downloadable computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development, account management, compliance facilitation
HELPX
HELPX
Trademark
Word
ABANDONED
Owner:
Serial:97417072
Filed:May 18, 2022
Classes:9
FORTRA
FORTRA
Trademark
Word
PENDING
Owner:
Serial:97398397
Filed:May 6, 2022
Classes:9, 42
Goods & Services
Downloadable and recorded computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; Providing online, non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
TITUS ACCELERATOR FOR PRIVACY
ABANDONED
Owner:
Serial:90689452
Filed:May 4, 2021
Classes:9
Goods & Services
"PRIVACY"
BOLDON JAMES
BOLDON JAMES
Trademark
Word
REGISTERED
Owner:
Serial:90609622
Filed:Mar 29, 2021
Classes:9, 42
Registration:7056127
Registered:May 16, 2023
Goods & Services
Downloadable computer software for managing, monitoring and organizing information technology infrastructure, systems management, performance management, security management, data access, batch management, job scheduling and cross platform automation | Providing temporary use of online non-downloadable software for managing, monitoring and organizing information technology infrastructure, systems management, performance management, security management, data access, batch management, job scheduling and cross platform automation
AUTOMATE INTELLIGENT CAPTURE
REGISTERED
Owner:
Serial:90254407
Filed:Oct 14, 2020
Classes:9
Registration:6901904
Registered:Nov 15, 2022
Goods & Services
"INTELLIGENT CAPTURE"
TITUS CLASSIFICATION SUITE
REGISTERED
Owner:
Serial:90097941
Filed:Aug 6, 2020
Classes:9
Registration:6616380
Registered:Jan 11, 2022
Goods & Services
"CLASSIFICATION SUITE"
TITUS ILLUMINATE
TITUS ILLUMINATE
Trademark
Word
REGISTERED
Owner:
Serial:90098022
Filed:Aug 6, 2020
Classes:9
Registration:6901815
Registered:Nov 15, 2022
Goods & Services
Downloadable database management software for use by businesses in identifying and classifying unstructured data
HALCYON
HALCYON
Trademark
Word
REGISTERED
Owner:
Serial:88944101
Filed:Jun 2, 2020
Classes:9
Registration:6598684
Registered:Dec 21, 2021
Goods & Services
Downloadable computer software, namely, downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development
HELPSYSTEMS ONE
HELPSYSTEMS ONE
Trademark
Word
REGISTERED
Owner:
Serial:88935470
Filed:May 27, 2020
Classes:9
Registration:6839985
Registered:Sep 6, 2022
Goods & Services
Downloadable computer software, namely, downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development
BUILD A BETTER IT
BUILD A BETTER IT
Trademark
Word
REGISTERED
Owner:
Serial:88768119
Filed:Jan 21, 2020
Classes:9
Registration:7101219
Registered:Jul 4, 2023
Goods & Services
Downloadable computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development
GOANYWHERE INSIDERS
GOANYWHERE INSIDERS
Service Mark
Word
REGISTERED
Owner:
Serial:88338792
Filed:Mar 13, 2019
Classes:35
Registration:6364924
Registered:May 25, 2021
Goods & Services
Administration of a customer loyalty program; providing a website featuring information about software; providing a website facilitating a web-based community where consumers can communicate, share ideas, promote products and services and provide feedback, namely, providing a website featuring recommendations, ratings and reviews posted by consumers about service providers and products in the field of computer hardware and software for commercial purposes
WHERE IT COMES TOGETHER
REGISTERED
Owner:
Serial:88190297
Filed:Nov 12, 2018
Classes:9, 42
Registration:6301815
Registered:Mar 23, 2021
Goods & Services
Downloadable computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development | Technical support services, namely, troubleshooting computer software problems
CORE IMPACT
CORE IMPACT
Trademark
Word
REGISTERED
Owner:
Serial:88105768
Filed:Sep 5, 2018
Classes:9, 42
Registration:5744620
Registered:May 7, 2019
Goods & Services
Software for providing network security and penetration testing services; computer software for exploiting and conducting post-exploitation efforts of vulnerabilities discovered in a target computer network; computer software for the automation of repeatable penetration test exploit techniques; computer software for conducting penetration tests for computer terminals, services, networks and end points for determining and identifying information security exploits; software for identifying vulnerability trends and tracking vulnerabilities identified by manual testing and other assurance activities, namely, penetration tests, code reviews, and threat modeling; Providing network security and penetration testing services; update, installation and maintenance of computer security software; providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computer and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, computer incident response, network incident response, and forensics and penetration testing
CORE NETWORK INSIGHT
REGISTERED
Owner:
Serial:87181456
Filed:Sep 23, 2016
Classes:9, 42
Registration:6069691
Registered:Jun 2, 2020
Goods & Services
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; computer software for use to compile, manage, encrypt and store personal information; computer software for use to access, collect and modify network user identification; computer software for workflow, helpdesk and network security management; computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; computer software for registering and authenticating digital certificates; computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; "NETWORK"; Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
CORE ACCESS
CORE ACCESS
Trademark
Word
REGISTERED
Owner:
Serial:87059199
Filed:Jun 3, 2016
Classes:9, 42
Registration:5697722
Registered:Mar 12, 2019
Goods & Services
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; "ACCESS"; Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
CORE ACCESS INSIGHT
CORE ACCESS INSIGHT
Trademark
Word
REGISTERED
Owner:
Serial:87059249
Filed:Jun 3, 2016
Classes:9, 42
Registration:5697725
Registered:Mar 12, 2019
Goods & Services
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; "ACCESS"; Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
CORE COMPLIANCE
CORE COMPLIANCE
Trademark
Word
REGISTERED
Owner:
Serial:87059228
Filed:Jun 3, 2016
Classes:9, 42
Registration:5697724
Registered:Mar 12, 2019
Goods & Services
Class 009: Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; Class 042: Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
CORE IMPACT
CORE IMPACT
Trademark
Word
REGISTERED
Owner:
Serial:87059089
Filed:Jun 3, 2016
Classes:9, 42
Registration:5728244
Registered:Apr 16, 2019
Goods & Services
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
CORE PASSWORD
CORE PASSWORD
Trademark
Word
REGISTERED
Owner:
Serial:87059163
Filed:Jun 3, 2016
Classes:9, 42
Registration:5697721
Registered:Mar 12, 2019
Goods & Services
Class 009: Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; Class 042: Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
CORE PROVISIONING
CORE PROVISIONING
Trademark
Word
REGISTERED
Owner:
Serial:87059211
Filed:Jun 3, 2016
Classes:9, 42
Registration:5697723
Registered:Mar 12, 2019
Goods & Services
Class 009: Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; Class 042: Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
CORE VULNERABILITY INSIGHT
CANCELLED
Owner:
Serial:87059144
Filed:Jun 3, 2016
Classes:9, 42
Registration:5697720
Registered:Mar 12, 2019
Goods & Services
"VULNERABILITY"
CORE SECURITY
CORE SECURITY
Trademark
Combined
CANCELLED
Owner:
Serial:86959604
Filed:Mar 31, 2016
Classes:9, 42
Registration:5703623
Registered:Mar 19, 2019
Goods & Services
"SECURITY"
CORE SECURITY
CORE SECURITY
Trademark
Word
REGISTERED
Owner:
Serial:86959609
Filed:Mar 31, 2016
Classes:9, 42
Registration:5237929
Registered:Jul 4, 2017
Goods & Services
Class 009: Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; Class 042: Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
CORE SECURITY
CORE SECURITY
Trademark
Combined
CANCELLED
Owner:
Serial:86959605
Filed:Mar 31, 2016
Classes:9, 42
Registration:5237928
Registered:Jul 4, 2017
Goods & Services
"SECURITY"
GOANYWHERE
GOANYWHERE
Trademark
Word
REGISTERED
Owner:
Serial:86857589
Filed:Dec 22, 2015
Classes:9
Registration:5017281
Registered:Aug 9, 2016
Goods & Services
software, namely, a managed file transfer software solution for streamlining and auditing the exchange of data between systems, employees, customers and trading partners
TEAMQUEST
TEAMQUEST
Trademark
Stylized
REGISTERED
Owner:
Serial:86850501
Filed:Dec 16, 2015
Classes:9
Registration:5470072
Registered:May 15, 2018
Goods & Services
Computer software for use in managing and administering computer systems and the instructional manuals therefor sold as a unit
VITYL ADVISER
VITYL ADVISER
Trademark
Word
CANCELLED
Owner:
Serial:86850502
Filed:Dec 16, 2015
Classes:9
Registration:5167664
Registered:Mar 21, 2017
Goods & Services
"ADVISER"
VITYL DASHBOARD
VITYL DASHBOARD
Trademark
Word
CANCELLED
Owner:
Serial:86850507
Filed:Dec 16, 2015
Classes:9
Registration:5470073
Registered:May 15, 2018
Goods & Services
"DASHBOARD"
HELPSYSTEMS INSITE
HELPSYSTEMS INSITE
Service Mark
Word
REGISTERED
Owner:
Serial:86808976
Filed:Nov 4, 2015
Classes:42
Registration:5271848
Registered:Aug 22, 2017
Goods & Services
Software as a service services featuring software for unifying, viewing and managing software products from a central location
WEBDOCS
WEBDOCS
Trademark
Word
REGISTERED
Owner:
Serial:86442068
Filed:Nov 1, 2014
Classes:9
Registration:5152933
Registered:Feb 28, 2017
Goods & Services
Computer software, namely, software for document management and automating data processing
HELPSYSTEMS
HELPSYSTEMS
Trademark
Combined
REGISTERED
Owner:
Serial:86167709
Filed:Jan 16, 2014
Classes:9
Registration:4960668
Registered:May 17, 2016
Goods & Services
Computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development
HELPSYSTEMS
HELPSYSTEMS
Trademark
Word
REGISTERED
Owner:
Serial:86167702
Filed:Jan 16, 2014
Classes:9, 42
Registration:4958100
Registered:May 17, 2016
Goods & Services
Computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; Technical support services, namely, troubleshooting of computer software problems
DELIVERNOW
DELIVERNOW
Trademark
Word
CANCELLED
Owner:
Serial:85931773
Filed:May 14, 2013
Classes:9
Registration:4504395
Registered:Apr 1, 2014
Goods & Services
Class 009: Computer software for wireless content delivery
TEAMQUEST CMIS FOR STORAGE
CANCELLED
Owner:
Serial:85752631
Filed:Oct 12, 2012
Classes:9
Registration:4482199
Registered:Feb 11, 2014
Goods & Services
"CMIS FOR STORAGE"
COBALT STRIKE
COBALT STRIKE
Trademark
Word
REGISTERED
Owner:
Serial:85631410
Filed:May 22, 2012
Classes:9
Registration:4272000
Registered:Jan 8, 2013
Goods & Services
Computer software for penetration testing, namely, for evaluating the security of a computer or network
LINOMA SOFTWARE
LINOMA SOFTWARE
Trademark
Word
REGISTERED
Owner:
Serial:77816477
Filed:Aug 31, 2009
Classes:9, 42
Registration:3780617
Registered:Apr 27, 2010
Goods & Services
Class 009: [ Software, namely, software that protects the exchange of data and provides for the automation of data movement ]; Class 042: Design and development of software
ROBOT/SCHEDULE ENTERPRISE
REGISTERED
Owner:
Serial:77755686
Filed:Jun 9, 2009
Classes:9
Registration:3766523
Registered:Mar 30, 2010
Goods & Services
Class 009: Computer programs for coordinating and monitoring job runs across different computer systems
A
A
Trademark
Combined
REGISTERED
Owner:
Serial:77569238
Filed:Sep 12, 2008
Classes:9
Registration:3678769
Registered:Sep 8, 2009
Goods & Services
Automation computer software for streamlining business processes, workflows, IT, data flows, and operations across data networks
AUTOMATE
AUTOMATE
Trademark
Word
REGISTERED
Owner:
Serial:77569236
Filed:Sep 12, 2008
Classes:9
Registration:3611822
Registered:Apr 28, 2009
Goods & Services
Automation computer software for streamlining business processes, workflows, IT, data flows, and operations across data networks
TEAMQUEST MANAGER
TEAMQUEST MANAGER
Trademark
Word
REGISTERED
Owner:
Serial:77462696
Filed:May 1, 2008
Classes:9
Registration:3629884
Registered:Jun 2, 2009
Goods & Services
Class 009: Computer software for use in managing and administrating computer systems and the instructional manuals therefor sold as a unit
TEAMQUEST ALERT
TEAMQUEST ALERT
Trademark
Word
REGISTERED
Owner:
Serial:77453805
Filed:Apr 21, 2008
Classes:9
Registration:3629820
Registered:Jun 2, 2009
Goods & Services
Class 009: Computer software for use in managing and administrating computer systems and the instructional manuals therefor sold as a unit
ROLECOURIER
ROLECOURIER
Trademark
Word
REGISTERED
Owner:
Serial:77034104
Filed:Nov 1, 2006
Classes:9
Registration:3281820
Registered:Aug 21, 2007
Goods & Services
Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization
DAMBALLA
DAMBALLA
Trademark
Word
REGISTERED
Owner:
Serial:77014412
Filed:Oct 5, 2006
Classes:9
Registration:3822220
Registered:Jul 20, 2010
Goods & Services
Downloadable software for detecting, identifying, and analyzing malicious software over computer networks for use in the field of information security
FILES2U
FILES2U
Trademark
Word
REGISTERED
Owner:
Serial:78859990
Filed:Apr 12, 2006
Classes:9
Registration:3462322
Registered:Jul 8, 2008
Goods & Services
Class 009: Web-based computer software for transferring files during the creation and management of digital assets
NOW YOU KNOW
NOW YOU KNOW
Trademark
Word
REGISTERED
Owner:
Serial:78719256
Filed:Sep 23, 2005
Classes:9
Registration:3320470
Registered:Oct 23, 2007
Goods & Services
Computer software for use in monitoring business operations and to capture and disseminate business information on global and internal computer networks for use by business organizations as it relates to the management of a business
PURESHARE
PURESHARE
Trademark
Word
REGISTERED
Owner:
Serial:78719248
Filed:Sep 23, 2005
Classes:9
Registration:3157560
Registered:Oct 17, 2006
Goods & Services
Computer software for use in monitoring business operations and to capture and disseminate business information on global and internal computer networks for use by business organizations as it relates to the management of a business
DIRECT!
DIRECT!
Trademark
Word
REGISTERED
Owner:
Serial:78616358
Filed:Apr 25, 2005
Classes:9
Registration:3089904
Registered:May 9, 2006
Goods & Services
Computer software for password management allowing users to securely reset and synchronize passwords
FILECATALYST
FILECATALYST
Trademark
Word
REGISTERED
Owner:
Serial:78567543
Filed:Feb 15, 2005
Classes:9
Registration:3065707
Registered:Mar 7, 2006
Goods & Services
Computer software that increases data transfer speed over networks suffering from high packet loss and high latency
ACTIVEMETRICS
ACTIVEMETRICS
Trademark
Word
REGISTERED
Owner:
Serial:78509876
Filed:Nov 2, 2004
Classes:9
Registration:3058856
Registered:Feb 14, 2006
Goods & Services
Computer software for use in monitoring business operations and to capture and disseminate business information on global and internal computer networks for use by business organizations as it relates to the management of a business
POWER NAVIGATOR
POWER NAVIGATOR
Trademark
Word
CANCELLED
Owner:
Serial:78442738
Filed:Jun 29, 2004
Classes:9
Registration:2976245
Registered:Jul 26, 2005
Goods & Services
Computer programs for gathering, measuring, analyzing and reporting computer system performance data
PERFNAV
PERFNAV
Trademark
Word
REGISTERED
Owner:
Serial:78435780
Filed:Jun 15, 2004
Classes:9
Registration:2983363
Registered:Aug 9, 2005
Goods & Services
Computer programs for gathering, measuring, analyzing and reporting computer system performance data
SHOWCASE
SHOWCASE
Trademark
Word
CANCELLED
Owner:
Serial:78265704
Filed:Jun 23, 2003
Classes:9
Registration:2853829
Registered:Jun 15, 2004
Goods & Services
Computer programs for interfacing personal computers to larger capacity computers in order to make greater capacity databases accessible for use and update by personal computers, and manuals therefor sold as a unit
WHAT IF
WHAT IF
Trademark
Word
REGISTERED
Owner:
Serial:76467925
Filed:Nov 18, 2002
Classes:9
Registration:2975100
Registered:Jul 26, 2005
Goods & Services
Computer programs and features and modules thereof used in computer capacity planning and computer modeling and in gathering, measuring, analyzing and reporting computer system performance data
CORE FORCE
CORE FORCE
Trademark
Word
REGISTERED
Owner:
Serial:76383400
Filed:Mar 14, 2002
Classes:9
Registration:3101077
Registered:Jun 6, 2006
Goods & Services
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network
CORE IMPACT
CORE IMPACT
Trademark
Word
REGISTERED
Owner:
Serial:76383401
Filed:Mar 14, 2002
Classes:9
Registration:2921112
Registered:Jan 25, 2005
Goods & Services
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network
CORE WISDOM
CORE WISDOM
Trademark
Word
REGISTERED
Owner:
Serial:76382015
Filed:Mar 14, 2002
Classes:9
Registration:3080058
Registered:Apr 11, 2006
Goods & Services
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within; computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network
STANDGUARD
STANDGUARD
Trademark
Word
CANCELLED
Owner:
Serial:76271880
Filed:Jun 15, 2001
Classes:9
Registration:2709972
Registered:Apr 22, 2003
Goods & Services
Computer software, namely software for providing security for computer systems
CORELABS
CORELABS
Service Mark
Word
REGISTERED
Owner:
Serial:76257532
Filed:May 15, 2001
Classes:42
Registration:3073887
Registered:Mar 28, 2006
Goods & Services
Computer consultation services, namely computer software design and development for others in the field of computer security; security printing, namely encoding identification on valuable documents and products
ROBOT/SPACE
ROBOT/SPACE
Trademark
Word
REGISTERED
Owner:
Serial:76229137
Filed:Mar 21, 2001
Classes:9
Registration:2534166
Registered:Jan 29, 2002
Goods & Services
Class 009: COMPUTER PROGRAMS FOR AUTOMATING THE MONITORING AND CONTROL OF DISK STORAGE
PERFORMANCE NAVIGATOR
REGISTERED
Owner:
Serial:76079787
Filed:Jun 28, 2000
Classes:9
Registration:2590588
Registered:Jul 9, 2002
Goods & Services
Class 009: Computer programs for gathering, measuring, analyzing and reporting computer system performance data
POWERTECH
POWERTECH
Trademark
Word
REGISTERED
Owner:
Serial:75883972
Filed:Jan 3, 2000
Classes:9, 41, 42
Registration:2421221
Registered:Jan 16, 2001
Goods & Services
COMPUTER SOFTWARE, NAMELY SOFTWARE THAT PROVIDES NETWORK SECURITY FOR COMPUTER SYSTEMS | COMPUTER EDUCATION AND TRAINING THROUGH SEMINARS AND THROUGH HANDS-ON COURSES RELATING TO USE OF COMPUTER SYSTEMS, COMPUTER PROGRAMMING, AND COMPUTER NETWORK SECURITY | COMPUTER CONSULTING RELATING TO MANAGEMENT OF COMPUTER SYSTEMS AND TECHNICAL CONSULTING relating TO SERVERS AND COMPUTER SYSTEMS
INTERMAPPER
INTERMAPPER
Trademark
Word
REGISTERED
Owner:
Serial:75864402
Filed:Dec 6, 1999
Classes:9
Registration:2473027
Registered:Jul 31, 2001
Goods & Services
Network monitoring software for detecting failures and operational problems in a computer network, and for reporting to a network administrator for action in the field of network maintenance
ROBOT/SCHEDULE
ROBOT/SCHEDULE
Trademark
Word
REGISTERED
Owner:
Serial:75713605
Filed:May 25, 1999
Classes:9
Registration:2450545
Registered:May 15, 2001
Goods & Services
COMPUTER PROGRAMS FOR AUTOMATING DATA PROCESSING TASKS, NAMELY, FOR HANDLING JOB RUNS ON COMPUTER SYSTEMS
ROBOT/CLIENT
ROBOT/CLIENT
Trademark
Word
REGISTERED
Owner:
Serial:75377200
Filed:Oct 21, 1997
Classes:9
Registration:2208887
Registered:Dec 8, 1998
Goods & Services
COMPUTER PROGRAMS FOR INTERFACING COMPUTERS
COURION
COURION
Trademark
Word
REGISTERED
Owner:
Serial:75125597
Filed:Jun 26, 1996
Classes:9
Registration:2184614
Registered:Aug 25, 1998
Goods & Services
computer software which enables users of other computer products to access and use customer help and customer support functions
ROBOT/REPORTS
ROBOT/REPORTS
Trademark
Word
REGISTERED
Owner:
Serial:74703386
Filed:Jul 19, 1995
Classes:9
Registration:1976839
Registered:May 28, 1996
Goods & Services
computer programs for managing the generation and distribution of computer output

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.