SOPHOS LTD.
91 Marks
Other
First Filed:Jan 24, 1994Latest Filed:Mar 5, 2026Address:The Pentagon, Abingdon Science Park, Abingdon, OX143YP, GB
Portfolio Overview
Registered
69(76%)Pending
8(9%)Dead
14(15%)Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 42
Software, IT Services & Scientific ResearchClass 41
Education and EntertainmentTTAB Proceedings
Total Proceedings
29As Plaintiff
29(100%)As Defendant
0(0%)Top Firms
SOPHOS INC.(Dec 2025)
81
FisherBroyles, LLP(Feb 2016)
3
Danielson Legal LLC(Jun 2015)
1
Trademark Activity Timeline(1994 – 2026)
- Filings
- Registrations
Trademark Portfolio
91 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
91
0
Status
69
8
9
5
0
Mark Type
74
8
1
8
0
1
51
8
1
5
Goods & Services
Class 009: Downloadable computer software for encryption; Downloadable computer antivirus software; Computer hardware; Computer networking hardware; USB computer security key; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of cybersecurity, data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable computer software for cybersecurity; Downloadable computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable computer software for IT infrastructure and cybersecurity automation; WAN (wide area network) hardware; Wide area network (WAN) routers; Downloadable WAN (wide area network) operating software; Class 025: Footwear; Tops as clothing; Clothing jackets; Hats; Class 041: Technical consulting in the field of cybersecurity risk management training; Computer education training; Providing information relating to education services; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, cybersecurity, data security, computer security, and network security and distribution of educational materials in connection therewith; Class 042: Technology consultation in the field of cybersecurity; Monitoring of computer systems to detect cybersecurity incidents; Computer security threat analysis for protecting data; Electronic monitoring of personally identifying information to detect identity theft via the internet; Providing temporary use of non-downloadable computer anti-virus software; Cloud computing featuring software for use managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; Technical support services, namely, troubleshooting of computer software problems; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Consulting services in the design and implementation of computer-based information systems for businesses; Computer programming consultancy in the field of cybersecurity
Goods & Services
Class 009: Downloadable computer software for encryption; Downloadable computer antivirus software; Computer hardware; Computer networking hardware; USB computer security key; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of cybersecurity, data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable computer software for cybersecurity; Downloadable computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable computer software for IT infrastructure and cybersecurity automation; WAN (wide area network) hardware; Wide area network (WAN) routers; Downloadable WAN (wide area network) operating software; Class 025: Footwear; Tops as clothing; Clothing jackets; Hats; Class 041: Technical consulting in the field of cybersecurity risk management training; Computer education training; Providing information relating to education services; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, cybersecurity, data security, computer security, and network security and distribution of educational materials in connection therewith; Class 042: Technology consultation in the field of cybersecurity; Monitoring of computer systems to detect cybersecurity incidents; Computer security threat analysis for protecting data; Electronic monitoring of personally identifying information to detect identity theft via the internet; Providing temporary use of non-downloadable computer anti-virus software; Cloud computing featuring software for use managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; Technical support services, namely, troubleshooting of computer software problems; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Consulting services in the design and implementation of computer-based information systems for businesses; Computer programming consultancy in the field of cybersecurity
Goods & Services
Class 009: Downloadable computer software for encryption; Downloadable computer antivirus software; Computer hardware; Computer networking hardware; USB computer security key; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of cybersecurity, data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable computer software for cybersecurity; Downloadable computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable computer software for IT infrastructure and cybersecurity automation; WAN (wide area network) hardware; Wide area network (WAN) routers; Downloadable WAN (wide area network) operating software; Class 025: Footwear; Tops as clothing; Clothing jackets; Hats; Class 041: Technical consulting in the field of cybersecurity risk management training; Computer education training; Providing information relating to education services; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, cybersecurity, data security, computer security, and network security and distribution of educational materials in connection therewith; Class 042: Technology consultation in the field of cybersecurity; Monitoring of computer systems to detect cybersecurity incidents; Computer security threat analysis for protecting data; Electronic monitoring of personally identifying information to detect identity theft via the internet; Providing temporary use of non-downloadable computer anti-virus software; Cloud computing featuring software for use managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; Technical support services, namely, troubleshooting of computer software problems; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Consulting services in the design and implementation of computer-based information systems for businesses; Computer programming consultancy in the field of cybersecurity
Goods & Services
Class 009: Downloadable computer software for encryption; Downloadable computer anti-virus software; Computer hardware; Computer networking hardware; USB computer security key; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of cybersecurity, data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable computer software for cybersecurity; Downloadable computer software for ownloadable computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile device; Downloadable computer software for IT infrastructure and cybersecurity automation; Security token hardware for user authentication; Class 041: Technical consulting in the field of cybersecurity risk management training; Computer education training; Providing information relating to education services; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, cybersecurity, data security, computer security, and network security and distribution of educational materials in connection therewith; Class 042: Technology consultation in the field of cybersecurity; Monitoring of computer systems to detect cybersecurity incidents; Computer security threat analysis for protecting data; Electronic monitoring of personally identifying information to detect identity theft via the internet; Providing temporary use of non-downloadable computer anti-virus software; Cloud computing featuring software for use managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; Technical support services, namely, troubleshooting of computer software problems; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks
Goods & Services
Class 009: Downloadable computer software for encryption; Downloadable computer software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices
Goods & Services
Downloadable computer anti-virus software; Downloadable computer software for anti-malware, anti-ransomware, intrusion detection, and intrusion prevention
Goods & Services
Computer education training; Providing information relating to education services; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, cybersecurity, data security, computer security, and network security and distribution of educational materials in connection therewith; Downloadable computer anti-virus software; Computer hardware; Computer networking hardware; Downloadable computer software for encryption; Downloadable computer software for IT infrastructure and cybersecurity automation; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable computer software for cybersecurity; Downloadable computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile device; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of cybersecurity, data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; USB computer security key; Providing temporary use of non-downloadable computer anti-virus software; Cloud computing featuring software for use managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; Technical support services, namely, troubleshooting of computer software problems; Technology consultation in the field of cybersecurity; Computer security threat analysis for protecting data; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks
Owner:
Serial:98897732
Filed:Dec 11, 2024
Classes:9, 25, 35, +3
Registration:8027896
Registered:Nov 18, 2025
Goods & Services
Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars for others in the field of cybersecurity; Providing information relating to education services; Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for automation of IT infrastructure and cybersecurity; Downloadable software for cybersecurity, namely, for scanning, detecting, blocking, quarantining and eliminating of viruses, worms, trojans, spyware, adware, spam, malware, vulnerabilities, intrusions, and unauthorized data and programs on computers and electronic devices; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key; Communication by computer terminals; Information transmission via electronic communications networks; Providing telecommunications connections to a global computer network; Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network; Telecommunication access services; Footwear; Gloves; Pants; Shirts; Socks; Vests; Baseball caps and hats; Cyclists' jerseys; Leg warmers; Outer jackets; Visors being headwear; Clothing, namely, arm warmers; Business administration services; Business services, namely, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; Customer service management for others; Database management; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing a website used to place on-line commercial orders in the field of computer hardware and computer software; Value-added reseller services, namely, distributorship services featuring computer security and information technology products; Wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Computer virus protection services; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish software system installation and configuration automation; Software authoring; Technical support services, namely, troubleshooting of computer software problems; Technology consultation in the field of cybersecurity
Goods & Services
Computer hardware, namely, firewalls; Downloadable computer software for the creation of firewalls
Goods & Services
"CLOUD NATIVE SECURITY"; (Based on Use in Commerce) (Based on 44(d) Priority Application) (Based on 44(e)) Authentication of data in the field of e-commerce and digital payments using blockchain technology; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer programming services; Computer programming services for the protection of software; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer software development; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer virus protection services; Consultancy in the design and development of computer hardware; Consultation services relating to computer software; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Data security consultancy; Design and development of computer game software and virtual reality software; Design and development of operating software for accessing and using a cloud computing network; Design and development of wireless communication systems for transmission and reception of voice, data and video; Installation, maintenance and repair of computer software; Leasing of computers; Monitoring of computer systems for detecting unauthorized access or data breach; Outsource service provider in the field of information technology consulting relating to installation, maintenance and repair of computer software; Outsource service providers in the field of information technology relating to installation, maintenance and repair of computer software; Platform as a service (PAAS) featuring computer software platforms for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Providing a secure electronic online system featuring technology which allows data authentication via blockchain; Providing a secure electronic online system featuring technology which allows data storage via blockchain; Providing a secure electronic online system featuring technology which allows blockchain as a service; Providing a secure electronic online system featuring technology which allows digital asset management; Providing a secure electronic online system featuring technology which allows user authentication services using blockchain technology; Providing a secure electronic online system featuring technology which allows access to digital assets; Providing on-line non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Providing on-line non-downloadable software for managing computer compliance; Providing on-line non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Providing temporary use of on-line non-downloadable software and applications for enabling the collection of non-fungible tokens registered on a blockchain; Providing temporary use of on-line non-downloadable software and applications for enabling the generation of non-fungible tokens for use in online virtual environments and the metaverse; Providing temporary use of on-line non-downloadable software and applications for enabling the generation of cryptographic keys for use in online virtual environments and the metaverse; Providing temporary use of on-line non-downloadable software and applications for cryptographic keys for receiving and sending crypto assets; Providing temporary use of on-line non-downloadable software and applications for managing downloadable digital files authenticated by non-fungible tokens; Providing temporary use of on-line non-downloadable software and applications for accessing digital assets; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of cybersecurity on a blockchain; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of payment tokens on a blockchain; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of cryptocurrency on a blockchain; Rental of computers relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for for IT infrastructure and cybersecurity automation; Software as a service (SAAS) services featuring software for securing users, and security policies; Software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, computer networks, and traffic flow; Software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, computer systems, and computer networks; Software as a service (SAAS) services featuring software for automated monitoring of users, security policies, computer systems, and computer networks; Software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, computer systems, and computer networks; Software as a service (SAAS) services featuring software for network asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; Software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users; Software as a service (SAAS) services featuring software for computer network and computer system security; Technical advice relating to operation of computers; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, troubleshooting of computer software problems; Technical support, namely, monitoring technological functions of computer network systems; Technology consultation in the field of cybersecurity; Troubleshooting of computer software problems; Updating of computer software relating to computer security and prevention of computer risks; User authentication services using blockchain technology for cybersecurity
Owner:
Serial:97749661
Filed:Jan 11, 2023
Classes:9, 36, 39, +1
Registration:7700599
Registered:Feb 25, 2025
Goods & Services
3D spectacles; Downloadable augmented reality software for virtual reality; Downloadable cloud-computing software for network monitoring; Downloadable computer operating software for virtual worlds; Downloadable computer software for managing and verifying financial transactions; Downloadable computer software for managing crypto asset transactions using blockchain technology; Downloadable computer software for managing cryptocurrency transactions using blockchain technology; Downloadable electronic data files featuring digital goods for use in online virtual worlds; Downloadable software for providing, managing and storing non-fungible tokens; Downloadable software for e-commerce and electronic payments; Downloadable software for storing and managing non-fungible tokens; Downloadable software for digital file management; Downloadable software for enabling the generation of non-fungible tokens for use in online virtual environments and metaverses; Downloadable software for enabling the generation of cryptographic keys for use in online virtual environments and the metaverse; Downloadable virtual reality game software; Downloadable WAN (wide area network) operating software; Smart glasses; Viewing devices, namely, digital photograph viewers, 3D digital photograph viewers, underwater digital photograph viewers, underwater 3D digital photographs viewers, underwater LCD displays, underwater enclosures for LCD displays and underwater enclosures for video players; Virtual reality glasses; Virtual reality headsets; WAN (wide area network) hardware; Wide area network (WAN) routers; Physical storage of electronically stored data or documents; Physical storage of electronically stored digital images; Assessing insurance claims; Banking services; Cryptocurrency exchange services; Cryptocurrency exchange services featuring blockchain technology; Financial consultation in the field of cryptocurrency; Financial exchange of crypto assets; Financial services, namely, electronic transfer of crypto assets; Insurance administration in the field of cybersecurity; Insurance and financial information and consultancy services; Insurance claims administration; Processing of electronic wallet payments; Providing an internet website portal in the field of financial transaction and payment processing services; Authentication of data in the field of e-commerce and digital payments using blockchain technology; Design and development of computer game software and virtual reality software; Design and development of wireless communication systems for transmission and reception of voice, data and video; Installation and maintenance of computer software; Monitoring of computer systems for detecting unauthorized access or data breach; Programming virtual non-downloadable goods for use in online virtual worlds; Providing a secure electronic online system featuring technology which allows data authentication via blockchain; Providing a secure electronic online system featuring technology which allows data storage via blockchain; Providing a secure electronic online system featuring technology which allows blockchain as a service ; Providing a secure electronic online system featuring technology which allows digital asset management; Providing a secure electronic online system featuring technology which allows user authentication services using blockchain technology; Providing a secure electronic online system featuring technology which allows access to digital assets; Providing temporary use of on-line non-downloadable software and applications for enabling the collection of non-fungible tokens registered on a blockchain; Providing temporary use of on-line non-downloadable software and applications for enabling the generation of non-fungible tokens for use in online virtual environments and metaverses; Providing temporary use of on-line non-downloadable software and applications for enabling the generation of cryptographic keys for use in online virtual environments and the metaverse; Providing temporary use of on-line non-downloadable software and applications for cryptographic keys for receiving and sending crypto assets; Providing temporary use of on-line non-downloadable software and applications for managing downloadable digital files authenticated by non-fungible tokens; Providing temporary use of on-line non-downloadable software and applications for accessing digital assets; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of cybersecurity on a blockchain; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of payment tokens on a blockchain; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of cryptocurrency on a blockchain; Providing user authentication services using blockchain-based software technology for cryptocurrency transactions; User authentication services using blockchain technology for cybersecurity
Goods & Services
"XDR SENSOR"
Goods & Services
(Based on 44(d) Priority Application) Downloadable computer software for controlling and managing access server applications; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable computer software for use in clean-up of software and uninstalling endpoint and server products; Downloadable computer software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices(Based on 44(e)) Downloadable computer software for controlling and managing access server applications; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable computer software for use in clean-up of software and uninstalling endpoint and server products; Downloadable computer software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices

Owner:
Serial:97403661
Filed:May 10, 2022
Classes:9, 16, 21, +3
Registration:7674660
Registered:Feb 4, 2025
Goods & Services
Battery chargers for mobile phones; Cases for mobile phones; Mouse pads; USB computer security key; Balls for sports, namely, soccer balls and golf balls; Golf divot repair tools; Golf tees; Markers; Paper and cardboard; Pens; Printed calendars; Staplers being office requisites; Stationery; Stickers; Baseball caps and hats; Clothing, namely, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; Footwear; Visors being headwear; Business administration services; Customer service management for others; "CYBERSECURITY"; Drinking vessels; Household containers for foods; Lunch boxes; Water bottles sold empty

Owner:
Serial:97401914
Filed:May 9, 2022
Classes:9, 16, 21, +8
Registration:7464906
Registered:Aug 6, 2024
Goods & Services
Class 009: Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable computer software to automate IT infrastructure and cybersecurity; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity, namely, for scanning, detecting, blocking, quarantining and eliminating of viruses, worms, trojans, spyware, adware, spam, malware, vulnerabilities, intrusions, and unauthorized data and programs on computers and electronic devices; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key; Class 016: Markers; Paper and cardboard; Pens; Printed calendars; Printed instructional and teaching materials in the field of information technology; Printed matter, namely, paper signs, books, manuals, curricula, newsletters, informational cards and brochures in the field of data security, computer security and network security; Staplers being office requisites; Stationery; Printed stickers; Class 021: Drinking vessels; Household containers for foods; Lunch boxes; Water bottles sold empty; Class 025: Baseball caps and hats; Clothing, namely, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; Footwear; Visors being headwear; Class 028: Action figure toys; Balls for sports; Golf divot repair tools; Golf tees; Playing cards; Puzzles; Spinning fidget toys; Class 035: Business administration services; Business services, namely, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; Customer service management for others; Database management; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing a website used to place on-line commercial orders in the field of computer hardware and computer software; Value-added reseller services, namely, distributorship services featuring computer security and information technology products; Wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software; Class 037: Installation, maintenance and repair of computer hardware; Technical support services, namely, troubleshooting in the nature of the repair of computer hardware; Class 038: Communication by computer terminals; Information transmission via electronic communications networks; Providing telecommunications connections to a global computer network; Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network; Telecommunication access services; Class 041: Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, data security, computer security, and network security and distribution of course materials in connection therewith in printed or electronic format; Providing information relating to education services; Class 042: Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Computer virus protection services; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish software system installation and configuration automation; Software authoring; Technical support services, namely, troubleshooting of computer software problems; Technology consultation in the field of cybersecurity; Class 045: Providing information on the development of privacy, security and data governance law via a website

Owner:
Serial:97401913
Filed:May 9, 2022
Classes:9, 16, 21, +8
Registration:7464905
Registered:Aug 6, 2024
Goods & Services
Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, data security, computer security, and network security and distribution of course materials in connection therewith in printed or electronic format; Providing information relating to education services; Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable computer software to automate IT infrastructure and cybersecurity; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity, namely, for scanning, detecting, blocking, quarantining and eliminating of viruses, worms, trojans, spyware, adware, spam, malware, vulnerabilities, intrusions, and unauthorized data and programs on computers and electronic devices; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key; Action figure toys; Balls for sports; Golf divot repair tools; Golf tees; Playing cards; Puzzles; Spinning fidget toys; Communication by computer terminals; Information transmission via electronic communications networks; Providing telecommunications connections to a global computer network; Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network; Telecommunication access services; Markers; Paper and cardboard; Pens; Printed calendars; Printed instructional and teaching materials in the field of information technology; Printed matter, namely, paper signs, books, manuals, curricula, newsletters, informational cards and brochures in the field of data security, computer security and network security; Staplers being office requisites; Stationery; Printed stickers; Installation, maintenance and repair of computer hardware; Technical support services, namely, troubleshooting in the nature of the repair of computer hardware; Baseball caps and hats; Clothing, namely, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; Footwear; Visors being headwear; Business administration services; Business services, namely, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; Customer service management for others; Database management; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing a website used to place on-line commercial orders in the field of computer hardware and computer software; Value-added reseller services, namely, distributorship services featuring computer security and information technology products; Wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software; Providing information on the development of privacy, security and data governance law via a website; "CYBERSECURITY"; Drinking vessels; Household containers for foods; Lunch boxes; Water bottles sold empty; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Computer virus protection services; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish software system installation and configuration automation; Software authoring; Technical support services, namely, troubleshooting of computer software problems; Technology consultation in the field of cybersecurity

Goods & Services
Class 009: Downloadable computer anti-virus software; Downloadable software for cybersecurity, namely, for scanning, detecting, blocking, quarantining and eliminating of viruses, worms, trojans, spyware, adware, spam, malware, vulnerabilities, intrusions, and unauthorized data and programs on computers and electronic devices; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable computer anti-malware software

Goods & Services
"SCAN & CLEAN"

Goods & Services
Computer hardware, namely, for data networking; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data on computer hardware for data networking; Downloadable software for cybersecurity, namely, for scanning, detecting, blocking, quarantining and eliminating of viruses, worms, trojans, spyware, adware, spam, malware, vulnerabilities, intrusions, and unauthorized data and programs on computers and electronic devices; Downloadable computer software to automate IT infrastructure and cybersecurity; "SWITCH"; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing computer hardware for data networking

Goods & Services
"X-OPS"

Goods & Services
"ADAPTIVE CYBERSECURITY ECOSYSTEM"

Goods & Services
Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer virus protection services; Consultation services relating to computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Data security consultancy; Installation, maintenance and repair of computer software; Internet security consultancy

Goods & Services
Class 009: (Based on 44(e)) Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for cybersecurity, namely, for scanning, detecting, blocking, quarantining and eliminating of viruses, worms, trojans, spyware, adware, spam, malware, vulnerabilities, intrusions, and unauthorized data and programs on computers and electronic devices; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable software for collaboratively designing, building, managing, maintaining, testing, running, and publishing the installation, configuration, and security automation of endpoints, network security devices, network and system infrastructure, computer systems, computer networks, servers, and mobile devices; Downloadable software for automating IT infrastructure and cybersecurity; Class 042: (Based on 44(e)) (Based on Use in Commerce) Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer network security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Computer virus protection services; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for automating IT infrastructure and cybersecurity; Software as a service (SAAS) services featuring software for use in collaboratively designing, building, managing, maintaining, testing, running, and publishing the installation, configuration, and security automation of endpoints, network security devices, network and system infrastructure, computer systems, computer networks, servers, and mobile devices; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, troubleshooting of computer software problems

Goods & Services
Class 042: Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer virus protection services; Consultation services relating to computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Installation, maintenance and repair of computer software

Goods & Services
Class 042: (Based on Use in Commerce) Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer virus protection services; Consultation services relating to computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Installation, maintenance and repair of computer software(Based on 44(d) Priority Application) Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer virus protection services; Consultation services relating to computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Installation, maintenance and repair of computer software

Goods & Services
(Based on Use in Commerce) Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the field of information technology, computers, data security, computer security, and network security and distribution of training material in connection therewith; Educational services, namely, providing on-line threat simulations and tutorials in the field of cybersecurity; Technical consulting in the field of cybersecurity risk management training; (Based on 44(e)) Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the field of information technology, computers, data security, computer security, and network security and distribution of training material in connection therewith; Educational services, namely, providing on-line threat simulations and tutorials in the field of cybersecurity; Technical consulting in the field of cybersecurity risk management training; (Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key; (Based on 44(e)) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key; (Based on Use in Commerce) Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems; (Based on 44(e)) Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems

Goods & Services
Class 009: (Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key; (Based on 44(e)) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key; Class 041: (Based on Use in Commerce) Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the field of information technology, computers, data security, computer security, and network security and distribution of training material in connection therewith; Educational services, namely, providing on-line threat simulations and tutorials in the field of cybersecurity; Technical consulting in the field of cybersecurity risk management training; (Based on 44(e)) Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the field of information technology, computers, data security, computer security, and network security and distribution of training material in connection therewith; Educational services, namely, providing on-line threat simulations and tutorials in the field of cybersecurity; Technical consulting in the field of cybersecurity risk management training; Class 042: (Based on Use in Commerce) Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems; (Based on 44(e)) Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems

Goods & Services
Class 009: (Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key; (Based on 44(e)) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key; Class 042: (Based on Use in Commerce) Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems; (Based on 44(e)) Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems

Goods & Services
Class 042: Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems

Goods & Services
Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems

Goods & Services
Class 009: Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key; Class 041: Technical consulting in the field of cybersecurity risk management training(Based on 44(e)) Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the field of information technology, computers, data security, computer security, and network security and distribution of training material in connection therewith; Educational services, namely, providing on-line threat simulations and tutorials in the field of cybersecurity; Technical consulting in the field of cybersecurity risk management training; Class 042: Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems

Goods & Services
Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the field of information technology, computers, data security, computer security, and network security and distribution of training material in connection therewith; Educational services, namely, providing on-line threat simulations and tutorials in the field of cybersecurity; Technical consulting in the field of cybersecurity risk management training; Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key; "TECHNOLOGY"; Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems

Goods & Services
Class 042: Computer diagnostic services; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy being computer forensic services; Computer security consultancy in the field of computer disaster recovery planning; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials

Goods & Services
Class 009: Downloadable software for managing, monitoring, protecting, authenticating, and securing endpoints, computer systems, computer networks, data, servers, the Internet, and mobile devices; Downloadable software for cybersecurity; Downloadable computer anti-virus software

Goods & Services
(Based on Use in Commerce) Downloadable computer software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable computer software for enforcing data policies; Downloadable computer software for administrative control and management of software applications; Downloadable computer software for the generation, storage and management of cryptographic keys; Downloadable computer software for user password, authentication, identity, and rights management; Downloadable computer software for USB device access control; Downloadable computer software for encryption (Based on 44(e)) Downloadable computer software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable computer software for enforcing data policies; Downloadable computer software for administrative control and management of software applications; Downloadable computer software for the generation, storage and management of cryptographic keys; Downloadable computer software for user password, authentication, identity, and rights management; Downloadable computer software for USB device access control; Downloadable computer software for encryption

Goods & Services
(Based on Use in Commerce) Computer virus protection services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing an on-line searchable database in the field of software, data, computer, and network security for personal and business purposes and for scientific research purposes; Providing temporary use of on-line non-downloadable cloud computing software for use in on-line scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing temporary use of on-line non-downloadable cloud computing software for for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Providing temporary use of on-line non-downloadable cloud computing software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security threat analysis for protecting data; Providing temporary use of non-downloadable computer anti-virus software(Based on 44(d) Priority Application) Computer virus protection services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing an on-line searchable database in the field of software, data, computer, and network security for personal and business purposes and for scientific research purposes; Providing temporary use of on-line non-downloadable cloud computing software for use in on-line scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing temporary use of on-line non-downloadable cloud computing software for for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Providing temporary use of on-line non-downloadable cloud computing software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security threat analysis for protecting data; Providing temporary use of non-downloadable computer anti-virus software(Based on 44(e)) Computer virus protection services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing an on-line searchable database in the field of software, data, computer, and network security for personal and business purposes and for scientific research purposes; Providing temporary use of on-line non-downloadable cloud computing software for use in on-line scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing temporary use of on-line non-downloadable cloud computing software for for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Providing temporary use of on-line non-downloadable cloud computing software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security threat analysis for protecting data; Providing temporary use of non-downloadable computer anti-virus software

Goods & Services
Class 009: Downloadable computer software for prevention of data theft and loss; Downloadable computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable computer software for administrative control and management of software applications; Downloadable computer software for the generation, storage and management of cryptographic keys; Downloadable computer software for user password, authentication, identity, and rights management; Downloadable computer program manuals for software for encryption and decryption; Downloadable computer program manuals for software for prevention of data theft and loss; Downloadable computer program manuals for software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable computer program manuals for software for administrative control and management of software applications; Downloadable computer program manuals for software for the generation, storage and management of cryptographic keys; Downloadable computer program manuals for software for user password, authentication, identity, and rights management; Downloadable computer software for encryption; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files

Goods & Services
Class 042: Software as a service (SAAS) services featuring software for managing, monitoring, and securing users' authorizations, security policies, and computer systems, and featuring artificial intelligence analytics for security purposes; Software as a service (SAAS) services featuring software for visualizing permissions and configurations of users and configuration of security policies, computer systems, and traffic flow, and featuring artificial intelligence analytics for security purposes; Software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, computer systems, and computer networks, and featuring artificial intelligence analytics for security purposes; Software as a service (SAAS) services featuring software for automated monitoring of users, security policies, computer systems, and computer networks, and featuring artificial intelligence analytics for security purposes; Software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, computer systems, and computer networks, and featuring artificial intelligence analytics for security purposes; Software as a service (SAAS) services featuring software for network asset inventory management, and featuring artificial intelligence analytics for security purposes; Software as a service (SAAS) services featuring software for conducting security and compliance assessments, and featuring artificial intelligence analytics for security purposes; Software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users, and featuring artificial intelligence analytics for security purposes



Owner:
Serial:87909335
Filed:May 6, 2018
Classes:9, 25, 41, +1
Registration:6549847
Registered:Nov 9, 2021
Goods & Services
Class 009: Anti-spyware software; Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer software for monitoring, protecting, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer anti-virus software; USB (universal serial bus) hardware; Computer software for administration of computer networks; Computer hardware, namely, wireless access point (WAP) devices (Based on 44(e)) Anti-spyware software; Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer software for monitoring, protecting, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer anti-virus software; USB (universal serial bus) hardware; Computer software for administration of computer networks; Computer hardware, namely, wireless access point (WAP) devices; Class 025: Bicycle gloves; Hats; Jackets; Shirts; Socks; Sports pants; Sweatshirts; Cyclists' jerseys; Sports caps and hats; Sports jerseys (Based on 44(e)) Bicycle gloves; Hats; Jackets; Shirts; Socks; Sports pants; Sweatshirts; Cyclists' jerseys; Sports caps and hats; Sports jerseys; Class 041: Educational services, namely, providing educational technical demonstrations, presentations, workshops, and training seminars in the fields of information technology, computers, data security, computer security, and network security; Computer education training services; Providing educational demonstrations (Based on 44(e)) Educational services, namely, providing educational technical demonstrations, presentations, workshops, and training seminars in the fields of information technology, computers, data security, computer security, and network security; Computer education training services; Providing educational demonstrations; Class 042: Computer security threat analysis for protecting data; Hosting an on-line community web site featuring information in the field of computer security; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Providing on-line non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer virus protection services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing temporary use of non-downloadable computer anti-virus software; Technical support services, namely, troubleshooting of computer software problems; Updating of computer software relating to computer security and prevention of computer risks (Based on 44(e)) Computer security threat analysis for protecting data; Hosting an on-line community web site featuring information in the field of computer security; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Providing on-line non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer virus protection services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing temporary use of non-downloadable computer anti-virus software; Technical support services, namely, troubleshooting of computer software problems; Updating of computer software relating to computer security and prevention of computer risks

Owner:
Serial:87737736
Filed:Dec 29, 2017
Classes:9, 16, 21, +7
Registration:5683400
Registered:Feb 26, 2019
Goods & Services
Installation, maintenance and repair of computer hardware; technical support services in the field of computer hardware; technical advice related to installation and repair of computer hardware; troubleshooting in the nature of the repair of computer hardware

Goods & Services
Computer software for encryption; Computer software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices


Goods & Services
Anti-spyware software; computer software for monitoring, protecting, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer anti-virus software

Goods & Services
"PHISH THREAT"

Goods & Services
Technical support services, namely, technical advice related to the installation of network hardware; Technical support services, namely, technical advice related to the repair of network hardware; Consulting in the field of maintenance and repair of telecommunications network hardware, apparatus, and instruments; Installation, maintenance and repair of computer hardware; Technical support services, namely, troubleshooting in the nature of the repair of computer hardware

Goods & Services
Installation, maintenance and repair of computer hardware; technical support services, namely, technical advice related to the installation, maintenance and repair of computer hardware; troubleshooting in the nature of the repair of computer hardware; Troubleshooting of computer software problems; technical advice related to computer and network security

Goods & Services
Computer hardware; wireless access points; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; downloadable computer data-security programs; computer software for use in threat-reduction scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; computer compliance software, namely, software for use in tracking and managing of compliance with security policies; computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; downloadable electronic publications, namely, manuals, technical documentation, brochures, and newsletters, and electronic data files in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; mouse pads, webcam covers, USB hardware, mobile phone battery chargers, mobile phone cases

Goods & Services
(Based on Use in Commerce) Flying discs; Skateboards; Surfboards(Based on 44(d) Priority Application) Flying discs; Skateboards; Surfboards(Based on 44(e)) Flying discs; Skateboards; Surfboards

Goods & Services
(Based on Use in Commerce) Lunch boxes; Water bottles sold empty; Cups and mugs(Based on 44(d) Priority Application) Lunch boxes; Water bottles sold empty; Cups and mugs(Based on 44(e)) Lunch boxes; Water bottles sold empty; Cups and mugs

Goods & Services
Computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer software for for enforcing data policies in the field of network security, data security, and computer security; Computer anti-virus software

Goods & Services
Computer hardware; Computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer software for for enforcing data policies in the field of network security, data security, and computer security; Computer anti-virus software; Computer software for encryption

Goods & Services
Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer virus protection services; Providing a website featuring non-downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices | Monitoring of computer systems for security purposes




Goods & Services
(Based on Use in Commerce) Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Cloud computing featuring software for use managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer consultation; Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Installation, repair and maintenance of computer software; Outsource service provider in the field of information technology consulting; Platform as a service (PAAS) featuring computer software platforms for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, remote administration and management of in-house and hosted datacenter devices, databases and software applications; Technical support services, namely, troubleshooting of computer software problems; Technical support, namely, monitoring technological functions of computer network systems; Computer virus protection services; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing a website featuring non-downloadable software for managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing temporary use of on-line non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Providing temporary use of on-line non-downloadable software for computer compliance and enforcing data policies; Providing temporary use of on-line non-downloadable software for encryption; Technical support, namely, monitoring technological functions of computer network systems (Based on 44(d) Priority Application) Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Platform as a service (PAAS) featuring computer software platforms for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, remote administration and management of in-house and hosted datacenter devices, databases and software applications; Technical support services, namely, troubleshooting of computer software problems; Technical support, namely, monitoring technological functions of computer network systems; Providing a website featuring non-downloadable software for managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing temporary use of on-line non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Providing temporary use of on-line non-downloadable software for computer compliance and enforcing data policies; Providing temporary use of on-line non-downloadable software for encryption

Goods & Services
(Based on Use in Commerce) Advertising, marketing and promotion services; Customer service management for others; Database management; Promoting the use of the security assurance best practices of others in the field of cloud computing; Value-added reseller services, namely, distributorship services featuring computer security and information technology products; Wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software; Business services, namely, administration of a program for enabling participants to receive expedited services in the field of data security, computer security, and network security (Based on 44(e)) Customer service management for others; Database management; Promoting the use of the security assurance best practices of others in the field of cloud computing; Value-added reseller services, namely, distributorship services featuring computer security and information technology products; Wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software; Business services, namely, administration of a program for enabling participants to receive expedited services in the field of data security, computer security, and network security

Goods & Services
Class 009: Computer hardware; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; downloadable computer data-security programs; computer software for use in threat-reduction scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; computer compliance software, namely, software for use in tracking and managing of compliance with security policies; computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; downloadable electronic publications, namely, articles, brochures, and downloadable electronic data files in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Class 042: Computer security consultancy; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software, namely, software for use in tracking and managing of compliance with security policies; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer services, namely, detecting unauthorized electronic messages and related computer attacks and providing notification thereof; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials

Goods & Services
Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the fields of information technology, computers, data security, computer security, and network security and distribution of training materials in connection therewith

Goods & Services
"MSP CONNECT"

Goods & Services
"MSP CONNECT"; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Cloud computing featuring software for use in managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, cloud hosting provider services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, cloud hosting provider services; Providing a website featuring non-downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Providing a website featuring non-downloadable software for managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing a website featuring non-downloadable software for managing accounts, licenses, permissions, and configuration of computer hardware and computer software for others; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems

Goods & Services
Downloadable electronic publications, namely, articles and documents in the field of data security and security of endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; downloadable electronic data files featuring documentation, operational data, alerts, and news updates in the field of data security and security of endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable computer software for managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; "CENTRAL"

Goods & Services
Class 042: Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Cloud computing featuring software for use in managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer virus protection services; Providing a website featuring non-downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Providing a website featuring non-downloadable software for managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Software as a service (SAAS) services featuring software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Class 045: Monitoring of computer systems for security purposes

Goods & Services
Class 042: Computer security consultancy; consulting services in the field of cloud computing; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, emails, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for use in enforcing network security, data security, and computer security data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable software for use in network security, data security, and computer security compliance; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, emails, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, emails, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, emails, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; technical support services, namely, monitoring of network systems, network servers and network devices and notification of related events and alerts; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials

Goods & Services
Class 009: [ Computer hardware; ] computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, emails, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing network security, data security, and computer security data policies; computer anti-virus software; computer anti-malware software; [ computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; computer software for the creation of firewalls; ] downloadable computer programs for use in data security; computer software for use in threat-reduction scanning of data, emails, electronic files, instant messages, web sites, software, computer programs, computer systems, and endpoints; computer software for the purpose of network security, data security, and computer security policy compliance; computer software for use in Internet content filtering, secure Internet content management, Internet content checking, and data content checking [; downloadable electronic publications in the nature of newsletters, user manuals, product documentation, brochures, and electronic data files in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet, emails and mobile devices ]

Goods & Services
Computer hardware; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies in the field of network security, data security, and computer security; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; downloadable computer programs for use in protecting computers and networks in the field of network security, data security, and computer security; computer software for use in scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints to reduce threats from malware and intrusion; computer compliance software in the field of network security, data security, and computer security; computer software for use in filtering Internet content, for use in managing, checking, and protecting networks, computers, and mobile devices; downloadable electronic publications in the nature of weblogs, blogs, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices | Computer security consultancy; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies in the field of network security, data security, and computer security; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable software for ensuring compliance in the field of network security, data security, and computer security; providing on-line, non-downloadable software for use in filtering Internet content; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials

Goods & Services
"SECURITY"








