Network Test Labs Inc. logo

Network Test Labs Inc.

2 Marks
Corp.
First Filed:Feb 5, 2020Latest Filed:Feb 5, 2020Address:Vancouver, BC, V6B2Z4, CA

Portfolio Overview

Registered
2(100%)

Top Classes

Class 35
Advertising, Business Services & Retail
2(100%)

TTAB Proceedings

No litigation activity

Top Firms

Wilson Elser Moskowitz Edelm...(Feb 2020)
2

Trademark Portfolio

2 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
CC
CC
Service Mark
Stylized
REGISTERED
Owner:
Serial:88785343
Filed:Feb 5, 2020
Classes:35
Registration:6325224
Registered:Apr 20, 2021
Goods & Services
Business consulting services in the field of cybercrime; Business risk assessment services in the fields of computer, network, and data security and privacy; Business compliance, audit services and technical assessment in the field of information governance and security | Computer consulting services in the field of computer and computer network security; Computer consulting services in the field of critical incident response to information, computer, network, and internet security breaches; Computer forensic services and computer network forensic services; Computer security consulting services the field of security and vulnerability of computers, computer systems, and computer networks; Computer security consulting services in the field of scanning of computers and networks to assess information security vulnerability; Computer security consulting services in the field of malware, intrusion and penetration testing and diagnosis of computers and computer networks, and restricting and controlling access privileges of users of computing resources based on assigned credentials; Computer security services, namely, assessing information technology security and vulnerability of computers and networks; Computer services, namely, providing forensic services to recover lost and deleted data; Information technology system security remediation services, namely, recovery of computer data; Security audits, namely, computer security consultancy in the field of scanning and penetration testing of computer and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Information technology restoration of systems, data, application; Information security consulting services including secure awareness training and social engineering; Web application, mobile application and API testing and code review; Dark web investigation and analysis of sensitive data; Managed Cyber Security Services for intranet, servers, networks and applications providing monitoring services, intrusion detection, active threat hunting, testing and training, encryption, ransomware, and advance threat protection | Consulting services in the field of maintaining the security and integrity of computers, networks, and databases; Monitoring of computer systems for evidence of external criminal attacks; Analyzing data in computer databases for criminal activity; Private investigations concerning information technology system security; Cyber risk and resilience consulting services with active response to emerging cyber security threats to computer systems, networks, applications, users and mobile devices; eDiscovery identifying, collecting and producing electronically stored information in response to a request for production in a law suit or investigation
CYBERCLAN
CYBERCLAN
Service Mark
Word
REGISTERED
Owner:
Serial:88785332
Filed:Feb 5, 2020
Classes:35
Registration:6344675
Registered:May 11, 2021
Goods & Services
Business consulting services in the field of cybercrime; Business risk assessment services in the fields of computer, network, and data security and privacy; Business compliance, audit services and technical assessment in the field of information governance and security | Computer consulting services in the field of computer and computer network security; Computer consulting services in the field of critical incident response to information, computer, network, and internet security breaches; Computer forensic services and computer network forensic services; Computer security consulting services the field of security and vulnerability of computers, computer systems, and computer networks; Computer security consulting services in the field of scanning of computers and networks to assess information security vulnerability; Computer security consulting services in the field of malware, intrusion and penetration testing and diagnosis of computers and computer networks, and restricting and controlling access privileges of users of computing resources based on assigned credentials; Computer security services, namely, assessing information technology security and vulnerability of computers and networks; Computer services, namely, providing forensic services to recover lost and deleted data; Information technology system security remediation services, namely, recovery of computer data; Security audits, namely, computer security consultancy in the field of scanning and penetration testing of computer and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Information technology restoration of systems, data, application; Information security consulting services including secure awareness training and social engineering; Web application, mobile application and API testing and code review; Dark web investigation and analysis of sensitive data; Managed Cyber Security Services for intranet, servers, networks and applications providing monitoring services, intrusion detection, active threat hunting, testing and training, encryption, ransomware, and advance threat protection | Consulting services in the field of maintaining the security and integrity of computers, networks, and databases; Monitoring of computer systems for evidence of external criminal attacks; Analyzing data in computer databases for criminal activity; Private investigations concerning information technology system security; Cyber risk and resilience consulting services with active response to emerging cyber security threats to computer systems, networks, applications, users and mobile devices; eDiscovery identifying, collecting and producing electronically stored information in response to a request for production in a law suit or investigation

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.