REDSIFT LIMITED
26 Marks
Other
First Filed:Jun 25, 2015Latest Filed:Aug 29, 2023Address:3rd Floor 1 Ashley Road, Altrincham, Cheshire, WA142DT, GB
Portfolio Overview
Registered
24(92%)Dead
2(8%)Top Classes
Class 42
Software, IT Services & Scientific ResearchClass 35
Advertising, Business Services & RetailClass 9
Electronics, Software & Scientific EquipmentTTAB Proceedings
No litigation activity
Top Firms
Usa(Aug 2023)
20
Trademark Activity Timeline(2015 – 2025)
- Filings
- Registrations
Trademark Portfolio
26 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
26
0
Status
24
0
0
2
0
Mark Type
13
1
10
2
0
3
11
22
Goods & Services
Business consulting in the field of information technology (IT) and cloud computing; business consulting in the field of cybersecurity; business advisory services in the field of information technology (IT) and cloud computing; business advisory services in the field of cybersecurity; Business data analysis in the field of information technology (IT) and cloud computing; Business data analysis in the field of cybersecurity; data processing services in the field of information technology (IT) and cloud computing; data processing services in the field of cybersecurity; Design and development of computer software; Providing temporary use of on-line non-downloadable software for data security and user identification; Providing temporary use of on-line non-downloadable software for the detection and protection against IT security breaches; Providing temporary use of on-line non-downloadable software for protection against phishing; Providing temporary use of on-line non-downloadable software for security and user identification; Providing temporary use of on-line non-downloadable software for IT security, protection and restoration; Providing temporary use of on-line non-downloadable software for using machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Software as a service (SAAS) services featuring software for use in the analysis and protection of the security of email, network communications, and data; Software as a service (SAAS) services featuring software for monitoring of computer systems; Software as a service (SAAS) services featuring software for providing cybersecurity services using machine learning; Software as a service (SAAS) services featuring software for providing cybersecurity services
Goods & Services
Business consulting in the field of information technology (IT) and cloud computing; business consulting in the field of cybersecurity; business advisory services in the field of information technology (IT) and cloud computing; business advisory services in the field of cybersecurity; Business data analysis in the field of information technology (IT) and cloud computing; Business data analysis in the field of cybersecurity; data processing services in the field of information technology (IT) and cloud computing; data processing services in the field of cybersecurity; Design and development of computer software; Providing temporary use of on-line non-downloadable software for data security and user identification; Providing temporary use of on-line non-downloadable software for the detection and protection against IT security breaches; Providing temporary use of on-line non-downloadable software for protection against phishing; Providing temporary use of on-line non-downloadable software for security and user identification; Providing temporary use of on-line non-downloadable software for IT security, protection and restoration; Providing temporary use of on-line non-downloadable software for using machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Software as a service (SAAS) services featuring software for use in the analysis and protection of the security of email, network communications, and data; Software as a service (SAAS) services featuring software for monitoring of computer systems; Software as a service (SAAS) services featuring software for providing cybersecurity services using machine learning; Software as a service (SAAS) services featuring software for providing cybersecurity services
Goods & Services
Business consulting in the field of information technology (IT) and cloud computing; business consulting in the field of cybersecurity; business advisory services in the field of information technology (IT) and cloud computing; business advisory services in the field of cybersecurity; Business data analysis in the field of information technology (IT) and cloud computing; Business data analysis in the field of cybersecurity; data processing services in the field of information technology (IT) and cloud computing; data processing services in the field of cybersecurity; Design and development of computer software; Providing temporary use of on-line non-downloadable software for data security and user identification; Providing temporary use of on-line non-downloadable software for the detection and protection against IT security breaches; Providing temporary use of on-line non-downloadable software for protection against phishing; Providing temporary use of on-line non-downloadable software for security and user identification; Providing temporary use of on-line non-downloadable software for IT security, protection and restoration; Providing temporary use of on-line non-downloadable software for using machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Software as a service (SAAS) services featuring software for use in the analysis and protection of the security of email, network communications, and data; Software as a service (SAAS) services featuring software for monitoring of computer systems; Software as a service (SAAS) services featuring software for providing cybersecurity services using machine learning; Software as a service (SAAS) services featuring software for providing cybersecurity services
Goods & Services
Business consulting in the field of information technology (IT) and cloud computing; business consulting in the field of cybersecurity; business advisory services in the field of information technology (IT) and cloud computing; business advisory services in the field of cybersecurity; Business data analysis in the field of information technology (IT) and cloud computing; Business data analysis in the field of cybersecurity; data processing services in the field of information technology (IT) and cloud computing; data processing services in the field of cybersecurity; Design and development of computer software; Providing temporary use of on-line non-downloadable software for data security and user identification; Providing temporary use of on-line non-downloadable software for the detection and protection against IT security breaches; Providing temporary use of on-line non-downloadable software for protection against phishing; Providing temporary use of on-line non-downloadable software for security and user identification; Providing temporary use of on-line non-downloadable software for IT security, protection and restoration; Providing temporary use of on-line non-downloadable software for using machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Software as a service (SAAS) services featuring software for use in the analysis and protection of the security of email, network communications, and data; Software as a service (SAAS) services featuring software for monitoring of computer systems; Software as a service (SAAS) services featuring software for providing cybersecurity services using machine learning; Software as a service (SAAS) services featuring software for providing cybersecurity services
Goods & Services
Business consulting in the field of information technology (IT) and cloud computing; business consulting in the field of cybersecurity; business advisory services in the field of information technology (IT) and cloud computing; business advisory services in the field of cybersecurity; Business data analysis in the field of information technology (IT) and cloud computing; Business data analysis in the field of cybersecurity; data processing services in the field of information technology (IT) and cloud computing; data processing services in the field of cybersecurity; Design and development of computer software; Providing temporary use of on-line non-downloadable software for data security and user identification; Providing temporary use of on-line non-downloadable software for the detection and protection against IT security breaches; Providing temporary use of on-line non-downloadable software for protection against phishing; Providing temporary use of on-line non-downloadable software for security and user identification; Providing temporary use of on-line non-downloadable software for IT security, protection and restoration; Providing temporary use of on-line non-downloadable software for using machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Software as a service (SAAS) services featuring software for use in the analysis and protection of the security of email, network communications, and data; Software as a service (SAAS) services featuring software for monitoring of computer systems; Software as a service (SAAS) services featuring software for providing cybersecurity services using machine learning; Software as a service (SAAS) services featuring software for providing cybersecurity services
Goods & Services
Business consulting in the field of information technology (IT) and cloud computing; business consulting in the field of cybersecurity; business advisory services in the field of information technology (IT) and cloud computing; business advisory services in the field of cybersecurity; Business data analysis in the field of information technology (IT) and cloud computing; Business data analysis in the field of cybersecurity; data processing services in the field of information technology (IT) and cloud computing; data processing services in the field of cybersecurity; Design and development of computer software; Providing temporary use of on-line non-downloadable software for data security and user identification; Providing temporary use of on-line non-downloadable software for the detection and protection against IT security breaches; Providing temporary use of on-line non-downloadable software for protection against phishing; Providing temporary use of on-line non-downloadable software for security and user identification; Providing temporary use of on-line non-downloadable software for IT security, protection and restoration; Providing temporary use of on-line non-downloadable software for using machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Software as a service (SAAS) services featuring software for use in the analysis and protection of the security of email, network communications, and data; Software as a service (SAAS) services featuring software for monitoring of computer systems; Software as a service (SAAS) services featuring software for providing cybersecurity services using machine learning; Software as a service (SAAS) services featuring software for providing cybersecurity services
Goods & Services
Class 035: Business consulting in the field of information technology (IT) and cloud computing; business consulting in the field of cybersecurity; business advisory services in the field of information technology (IT) and cloud computing; business advisory services in the field of cybersecurity; Business data analysis in the field of information technology (IT) and cloud computing; Business data analysis in the field of cybersecurity; data processing services in the field of information technology (IT) and cloud computing; data processing services in the field of cybersecurity; Class 042: Design and development of computer software; Providing temporary use of on-line non-downloadable software for data security and user identification; Providing temporary use of on-line non-downloadable software for the detection and protection against IT security breaches; Providing temporary use of on-line non-downloadable software for protection against phishing; Providing temporary use of on-line non-downloadable software for security and user identification; Providing temporary use of on-line non-downloadable software for IT security, protection and restoration; Providing temporary use of on-line non-downloadable software for using machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Software as a service (SAAS) services featuring software for use in the analysis and protection of the security of email, network communications, and data; Software as a service (SAAS) services featuring software for monitoring of computer systems; Software as a service (SAAS) services featuring software for providing cybersecurity services using machine learning; Software as a service (SAAS) services featuring software for providing cybersecurity services
Goods & Services
Class 035: Business consulting in the field of information technology (IT) and cloud computing; business consulting in the field of cybersecurity; business advisory services in the field of information technology (IT) and cloud computing; business advisory services in the field of cybersecurity; Business data analysis in the field of information technology (IT) and cloud computing; Business data analysis in the field of cybersecurity; data processing services in the field of information technology (IT) and cloud computing; data processing services in the field of cybersecurity; Class 042: Design and development of computer software; Providing temporary use of on-line non-downloadable software for data security and user identification; Providing temporary use of on-line non-downloadable software for the detection and protection against IT security breaches; Providing temporary use of on-line non-downloadable software for protection against phishing; Providing temporary use of on-line non-downloadable software for security and user identification; Providing temporary use of on-line non-downloadable software for IT security, protection and restoration; Providing temporary use of on-line non-downloadable software for using machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Software as a service (SAAS) services featuring software for use in the analysis and protection of the security of email, network communications, and data; Software as a service (SAAS) services featuring software for monitoring of computer systems; Software as a service (SAAS) services featuring software for providing cybersecurity services using machine learning; Software as a service (SAAS) services featuring software for providing cybersecurity services
Goods & Services
Class 035: Business consulting in the field of information technology (IT) and cloud computing; business consulting in the field of cybersecurity; business advisory services in the field of information technology (IT) and cloud computing; business advisory services in the field of cybersecurity; Business data analysis in the field of information technology (IT) and cloud computing; Business data analysis in the field of cybersecurity; data processing services in the field of information technology (IT) and cloud computing; data processing services in the field of cybersecurity; Class 042: Design and development of computer software; Providing temporary use of on-line non-downloadable software for data security and user identification; Providing temporary use of on-line non-downloadable software for the detection and protection against IT security breaches; Providing temporary use of on-line non-downloadable software for protection against phishing; Providing temporary use of on-line non-downloadable software for security and user identification; Providing temporary use of on-line non-downloadable software for IT security, protection and restoration; Providing temporary use of on-line non-downloadable software for using machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Software as a service (SAAS) services featuring software for use in the analysis and protection of the security of email, network communications, and data; Software as a service (SAAS) services featuring software for monitoring of computer systems; Software as a service (SAAS) services featuring software for providing cybersecurity services using machine learning; Software as a service (SAAS) services featuring software for providing cybersecurity services
Goods & Services
Business consulting in the field of information technology (IT) and cloud computing; business consulting in the field of cybersecurity; business advisory services in the field of information technology (IT) and cloud computing; business advisory services in the field of cybersecurity; Business data analysis in the field of information technology (IT) and cloud computing; Business data analysis in the field of cybersecurity; data processing services in the field of information technology (IT) and cloud computing; data processing services in the field of cybersecurity | Design and development of computer software; Providing temporary use of on-line non-downloadable software for data security and user identification; Providing temporary use of on-line non-downloadable software for the detection and protection against IT security breaches; Providing temporary use of on-line non-downloadable software for protection against phishing; Providing temporary use of on-line non-downloadable software for security and user identification; Providing temporary use of on-line non-downloadable software for IT security, protection and restoration; Providing temporary use of on-line non-downloadable software for using machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Software as a service (SAAS) services featuring software for use in the analysis and protection of the security of email, network communications, and data; Software as a service (SAAS) services featuring software for monitoring of computer systems; Software as a service (SAAS) services featuring software for providing cybersecurity services using machine learning; Software as a service (SAAS) services featuring software for providing cybersecurity services
Goods & Services
"VENDOR SECURE"
Goods & Services
Design and development of computer software; Providing temporary use of on-line non-downloadable software for data security and user identification; Providing temporary use of on-line non-downloadable software for the detection and protection against it security breaches; Providing temporary use of on-line non-downloadable software for protection against phishing; Providing temporary use of on-line non-downloadable software for security and user identification; Providing temporary use of on-line non-downloadable software for use in machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Providing temporary use of on-line non-downloadable software for IT security, protection and restoration; Software as a service (SAAS) services featuring software for use in the analysis and protection of the security of email, network communications, and data; Software as a service (SAAS) services featuring software for monitoring of computer systems; Software as a service (SAAS) services featuring software for providing cybersecurity services using machine learning; Software as a service (SAAS) services featuring software for providing cybersecurity services
Goods & Services
Class 042: Design and development of computer software; Providing temporary use of on-line non-downloadable software for data security and user identification; Providing temporary use of on-line non-downloadable software for the detection and protection against it security breaches; Providing temporary use of on-line non-downloadable software for protection against phishing; Providing temporary use of on-line non-downloadable software for security and user identification; Providing temporary use of on-line non-downloadable software for IT security, protection and restoration; Providing temporary use of on-line non-downloadable software for using machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Software as a service (SAAS) services featuring software for use in the analysis and protection of the security of email, network communications, and data; Software as a service (SAAS) services featuring software for monitoring of computer systems; Software as a service (SAAS) services featuring software for providing cybersecurity services using machine learning; Software as a service (SAAS) services featuring software for providing cybersecurity services
Goods & Services
Downloadable web application software for IT security ; downloadable web application and server software for IT security ; downloadable artificial intelligence and machine learning software for reducing vulnerability in computers and computer networks; downloadable cloud network monitoring software; downloadable computer software for reducing vulnerability in computers and computer networks. | Online non-downloadable software as a service for reducing vulnerability in computers and computer networks; IT consultancy, advisory and information services in the field of computer security; computer security services for protecting data and information from unauthorized access; scientific and technological services for computer security; computer security services for protection against illegal network access; computer security services in the nature of administering digital certificates; internet security consultancy; digital certificates inventory and monitoring; network and security configuration monitoring; cyber and web security services; consultancy, design, testing, research and advisory services, all relating to computing and computer network security; scientific and technological services and research and design relating to computer security.

Goods & Services
Downloadable software for providing cybersecurity; downloadable software for providing information regarding cybersecurity | Software as a service featuring software for use in the analysis and protection of the security of email, network communications, and data; software as a service featuring software for providing cybersecurity services; software as a service featuring software for providing cybersecurity services using machine learning; software as a service featuring software for monitoring of computer systems; it security, protection and restoration services, namely, computer security consultancy; design and development of computer software; IT services for the analysis and protection of the security of email, network communications, and data

Goods & Services
Downloadable software for providing cybersecurity community forum services | Software as a service for providing cybersecurity community forum services

Goods & Services
Design and development of computer software; computer software consulting services; software as a service (SAAS) featuring software for use in the analysis and protection of the security of email, network communications, and data; software as a service (SAAS) featuring software for providing cybersecurity services; software as a service (SAAS) featuring software for providing cybersecurity services using machine learning; software as a service (SAAS) featuring software for monitoring of computer systems; IT security, protection and restoration services, namely, computer security consultancy

Goods & Services
Design and development of computer software; computer software consulting services; software as a service (SAAS) featuring software for use in the analysis and protection of the security of email, network communications, and data; software as a service (SAAS) featuring software for providing cybersecurity services; software as a service (SAAS) featuring software for providing cybersecurity services using machine learning; software as a service (SAAS) featuring software for monitoring of computer systems; IT security, protection and restoration services, namely, computer security consultancy

Goods & Services
Design and development of computer software; computer software consulting services; software as a service (SAAS) featuring software for use in the analysis and protection of the security of email, network communications, and data; software as a service (SAAS) featuring software for providing cybersecurity services; software as a service (SAAS) featuring software for providing cybersecurity services using machine learning; software as a service (SAAS) featuring software for monitoring of computer systems; IT security, protection and restoration services, namely, computer security consultancy

Goods & Services
Design and development of computer software; computer software consulting services; software as a service (SAAS) featuring software for use in the analysis and protection of the security of email, network communications, and data; software as a service (SAAS) featuring software for providing cybersecurity services; software as a service (SAAS) featuring software for providing cybersecurity services using machine learning; software as a service (SAAS) featuring software for monitoring of computer systems; IT security, protection and restoration services, namely, computer security consultancy

Goods & Services
Design and development of computer software; computer software consulting services; software as a service (SAAS) featuring software for use in the analysis and protection of the security of email, network communications, and data; software as a service (SAAS) featuring software for providing cybersecurity services; software as a service (SAAS) featuring software for providing cybersecurity services using machine learning; software as a service (SAAS) featuring software for monitoring of computer systems; IT security, protection and restoration services, namely, computer security consultancy

Goods & Services
Design and development of computer software; computer software consulting services; software as a service (SAAS) featuring software for use in the analysis and protection of the security of email, network communications, and data; software as a service (SAAS) featuring software for providing cybersecurity services; software as a service (SAAS) featuring software for providing cybersecurity services using machine learning; software as a service (SAAS) featuring software for monitoring of computer systems; IT security, protection and restoration services, namely, computer security consultancy

Goods & Services
Downloadable software in the field of cybersecurity for the detection and protection against IT security breaches; Downloadable software for use in the analysis and protection of the security of email, network communications, and data; Downloadable software using machine learning in the field of cybersecurity for the detection and protection against IT security breaches; Downloadable software for monitoring of computer systems; Downloadable software for IT security, protection and restoration; Downloadable software for protection against phishing; Downloadable software for data security and user identification; Design and development of computer software; computer software consulting services; software as a service (SAAS) featuring software for use in the analysis and protection of the security of email, network communications, and data; software as a service (SAAS) featuring software for providing cybersecurity services; software as a service (SAAS) featuring software for providing cybersecurity services using machine learning; software as a service (SAAS) featuring software for monitoring of computer systems; IT security, protection and restoration services, namely, computer security consultancy

