Hanna, Gregory logo

Hanna, Gregory

1 Marks
Individual
First Filed:Jul 7, 2020Latest Filed:Jul 7, 2020Address:153 Northboro Road, Southborough, MA 01772

Portfolio Overview

Registered
1(100%)

Top Classes

Class 42
Software, IT Services & Scientific Research
1(100%)

TTAB Proceedings

No litigation activity

Top Firms

Schroeder Law PC(Jul 2020)
1

Trademark Portfolio

1 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
AMERICA'S TOP CYBER EXPERT
REGISTERED
Owner:
Serial:90039220
Filed:Jul 7, 2020
Classes:42
Registration:6218804
Registered:Dec 8, 2020
Goods & Services
Class 042: Computer security services in the nature of administering digital keys; Computer security threat analysis for protecting data; Computer security consultancy; Computer software consultancy; Computer software consultation; Computer software consulting; Computer technology consultancy; Consultation about the maintenance and updating of computer software; Consulting in the field of configuration management for computer hardware and software; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer disaster recovery planning; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Planning, design and management of information technology systems; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technology consultation in the field of cybersecurity; Testing, analysis, and evaluation of the goods of others to assure compliance with industry standards

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.