TREND MICRO KABUSHIKI KAISHA logo

TREND MICRO KABUSHIKI KAISHA

62 Marks
First Filed:Feb 28, 2005Latest Filed:Mar 24, 2026Address:4-1-6 Shinjuku, Shinjuku-ku, Tokyo, 160-0022, JP

Portfolio Overview

Registered
22(35%)
Pending
9(15%)
Dead
31(50%)
Previous
15

Top Classes

Class 9
Electronics, Software & Scientific Equipment
49(79%)
Class 42
Software, IT Services & Scientific Research
24(39%)
Class 41
Education and Entertainment
5(8%)

TTAB Proceedings

Total Proceedings
84
As Plaintiff
81(96%)
As Defendant
3(4%)

Top Firms

Carr & Ferrell LLP(Jan 2026)
65
Muncy, Geissler, Olds & Lowe...(Mar 2021)
9

Trademark Activity Timeline(2005 – 2026)

Trademark Portfolio

77 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
TRENDLIFE
TRENDLIFE
Trademark
Word
ITU
PENDING
Owner:
Serial:99721368
Filed:Mar 24, 2026
Classes:9, 42
MAGNA AI
MAGNA AI
Trademark
Word
ITU
PENDING
Owner:
Serial:99698803
Filed:Mar 12, 2026
Classes:9, 42
TRENDAI
TRENDAI
Trademark
Combined
ITU
PENDING
Owner:
Serial:99594014
Filed:Jan 14, 2026
Classes:9, 35, 41, +1
Goods & Services
Class 009: Downloadable and recorded computer security software; downloadable computer software for securing computers, mobile devices, computer servers, computer networks, computer data and computer software; downloadable and recorded computer software for protecting computer hardware, computer software and computer data against viruses, malware, other security threats, and unauthorized access; downloadable computer software for protecting and securing public, private, and hybrid cloud deployments; downloadable computer software for network intrusion detection and prevention; downloadable computer software for email security and identity security; downloadable computer software for preventing leakage of confidential information; downloadable computer software to monitor, report and enforce regulatory compliance; downloadable firewall computer software; downloadable computer software for data backup and recovery; downloadable computer software for securing computer data and other computer software; downloadable computer utility software; downloadable application software for smartphones; downloadable computer software for protecting artificial intelligence (AI) stack, including AI systems, software andworkloads from security threats, security vulnerabilities, and unauthorized access; downloadable computer software using artificial intelligence (AI) for computer, software, and network security; downloadable computer software using large language models (LLMs) for computer, software, and network security; downloadable computer softwarefor artificial generation of human speech and text; downloadable image files for restoration of systems and software; recorded computer security and operating software; computer hardware; computer peripherals; computer accessories; computer hardware that integrates and manages security functions to protect computer networks from threats such as computer viruses and unauthorized intrusions; computer hardware and software to protect and enhance data confidentiality; computer hardware and software to protect or to restore the effectiveness of data and the infrastructure of computers; computer hardware and software to protect and restore the perfect condition of data, computer, computer software, and computer network; computer software and electronic publications to inform and educate computer users about computer and network security; downloadable electronic publications in the fields of computer software and computer security; computer hardware in the nature of network appliances; downloadable mobile applications using artificial intelligence (AI); computer software; recorded computer software using artificial intelligence (AI); Class 035: Providing an incentive program for computer software security investigators who are responsible for disclosing vulnerabilities in computer software used by the enterprise; online retail store services featuring computer software; online retail store services; Class 041: Providing electronic publications; educational and training services relating to computer security; educational examination and certification services in the field of computer security, data security, and network security technologies; computer education training; training services in the field of computer software development; training in the use and operation of computers; educational and instruction services in the field of computer software, firmware, hardware, electronic devices, data and network security and cybersecurity; educational and instruction services relating to operation of computer hardware; educational and instruction services relating to operation of computer software; educational and instruction services relating to computer viruses; providing a website featuring non-downloadable videos from the internet; organizing, arranging and conducting competitions; organizing, arranging and conducting incentive award programs; providing a website featuring blogs and non-downloadable publications in the nature of articles, news, alerts, advisories, reports and bulletins; publishing of educational articles, news, alerts, advisories, reports and bulletins; Class 042: Software as a Service (SAAS) services featuring computer security software; Software as a Service (SAAS) services featuring software for securing computers, mobile devices, computer servers, computer networks, computer data and computer software; Software as a Service (SAAS) services featuring software for protecting computer hardware, computer software and computer data against viruses, malware, other security threats, and unauthorized access; Software as a Service (SAAS) services featuring software for protecting and securing public, private, and hybrid cloud deployments; Software as a Service (SAAS) services featuring software for network intrusion detection and prevention; Software as a Service (SAAS) services featuring software for email security and identity security; Software as a Service (SAAS) services featuring software for preventing leakage of confidential information; Software as a Service (SAAS) services featuring software to monitor, report and enforce regulatory compliance; providing online non-downloadable software for backup and restoration of data; Software as a Service (SAAS) services featuring software for protecting the artificial intelligence (AI) stack, including AI systems, software and workloads from security threats, security vulnerabilities, and unauthorized access; providing an AI-powered enterprise cybersecurity platform featuring online software and professional services for proactive security, cyber risk exposure management, security operations, and robust layered protection; provision of threat intelligence information, including active attacks, threat actors, and proactive defense strategies; provision of Platform as a Service (PAAS) services for securing computers, data, and computer networks; providing temporary use of online non-downloadable software using artificial intelligence (AI) for computer, software, and network security; providing temporary use of online non-downloadable software using large language models (LLMs) for computer, software, and network security; providing on-line non-downloadable software for generating human sound and text artificially; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus computer software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs, data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for securing data of computers and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing online non-downloadable computer programs with a function of filtering emails; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing online non-downloadable software for use of email, instant message, website and other network communications; providing on-line non-downloadable software for limiting access to protect data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; provision of computer program and information relating to computer viruses, their varieties, characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of vaccine software for computer virus; restoration of computer data destroyed or partially destroyed by computer virus and other restoration of computer data; provision of information in relation to restoration of computer data destroyed or partially destroyed by computer virus; research and analysis of computer virus; provision of information relating to research and analysis of computer virus; advice for restoration of computer program’s operation and problems; advice relating to research and analysis of computer virus; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; installation of computer programs and advice and consultancy for installation of computer programs; installation of computer program; updating of computer software for others via computer and communication networks; updating of pattern file for computer virus; monitoring of server for extermination of computer virus and computer virus countermeasures including removal of computer virus and provision of information thereof; design, creation, and maintenance of computer program; consultancy relating to design, creation, and maintenance of computer program; provision of information relating to design, creation, and maintenance of computer program; design, creation, and maintenance of information processing system for use with computer; consultancy rela
TRENDAI
TRENDAI
Trademark
Word
ITU
PENDING
Owner:
Serial:99587551
Filed:Jan 10, 2026
Classes:9, 35, 41, +1
Goods & Services
Class 009: Downloadable and recorded computer security software; downloadable computer software for securing computers, mobile devices, computer servers, computer networks, computer data and computer software; Downloadable and recorded computer software for protecting computer hardware, computer software and computer data against viruses, malware, other security threats, and unauthorized access; downloadable computer software for protecting and securing public, private, and hybrid cloud deployments; downloadable computer software for network intrusion detection and prevention; downloadable computer software for email security and identity security; downloadable computer software for preventing leakage of confidential information; downloadable computer software to monitor, report and enforce regulatory compliance; downloadable firewall computer software; downloadable computer software for data backup and recovery; downloadable computer software for securing computer data and other computer software; downloadable computer utility software; downloadable application software for smartphones; downloadable computer software for protecting artificial intelligence (AI) stack, including AI systems, software and workloads from security threats, security vulnerabilities, and unauthorized access; downloadable computer software using artificial intelligence (AI) for computer, software, and network security; downloadable computer software using large language models (LLMs) for computer, software, and network security; downloadable computer software for artificial generation of human speech and text; downloadable image files for restoration of systems and software; recorded computer security and operating software; computer hardware; computer peripherals; computer accessories; computer hardware that integrates and manages security functions to protect computer networks from threats such as computer viruses and unauthorized intrusions; computer hardware and software to protect and enhance data confidentiality; computer hardware and software to protect or to restore the effectiveness of data and the infrastructure of computers; computer hardware and software to protect and restore the perfect condition of data, computer, computer software, and computer network; computer software and electronic publications to inform and educate computer users about computer and network security; downloadable electronic publications in the fields of computer software and computer security; computer hardware in the nature of network appliances; downloadable mobile applications using artificial intelligence (AI); computer software; recorded computer software using artificial intelligence (AI); Class 035: Providing an incentive program for computer software security investigators who are responsible for disclosing vulnerabilities in computer software used by the enterprise; online retail store services featuring computer software; online retail store services; Class 041: Providing electronic publications; educational and training services relating to computer security; educational examination and certification services in the field of computer security, data security, and network security technologies; computer education training; training services in the field of computer software development; training in the use and operation of computers; educational and instruction services in the field of computer software, firmware, hardware, electronic devices, data and network security and cybersecurity; educational and instruction services relating to operation of computer hardware; educational and instruction services relating to operation of computer software; educational and instruction services relating to computer viruses; providing a website featuring non-downloadable videos from the internet; organizing, arranging and conducting competitions; organizing, arranging and conducting incentive award programs; providing a website featuring blogs and non-downloadable publications in the nature of articles, news, alerts, advisories, reports and bulletins; publishing of educational articles, news, alerts, advisories, reports and bulletins; Class 042: Software as a Service (SAAS) services featuring computer security software; Software as a Service (SAAS) services featuring software for securing computers, mobile devices, computer servers, computer networks, computer data and computer software; Software as a Service (SAAS) services featuring software for protecting computer hardware, computer software and computer data against viruses, malware, other security threats, and unauthorized access; Software as a Service (SAAS) services featuring software for protecting and securing public, private, and hybrid cloud deployments; Software as a Service (SAAS) services featuring software for network intrusion detection and prevention; Software as a Service (SAAS) services featuring software for email security and identity security; Software as a Service (SAAS) services featuring software for preventing leakage of confidential information; Software as a Service (SAAS) services featuring software to monitor, report and enforce regulatory compliance; providing on-line non-downloadable software for backup and restoration of data; Software as a Service (SAAS) services featuring software for protecting the artificial intelligence (AI) stack, including AI systems, software and workloads from security threats, security vulnerabilities, and unauthorized access; providing an AI-powered enterprise cybersecurity platform featuring online software and professional services for proactive security, cyber risk exposure management, security operations, and robust layered protection; provision of threat intelligence information, including active attacks, threat actors, and proactive defense strategies; provision of Platform as a Service (PAAS) services for securing computers, data, and computer networks; providing temporary use of online non-downloadable software using artificial intelligence (AI) for computer, software, and network security; providing temporary use of online non-downloadable software using large language models (LLMs) for computer, software, and network security; providing on-line non-downloadable software for generating human sound and text artificially; Providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus computer software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs, data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for securing data of computers and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing online non-downloadable computer programs with a function of filtering e-mails; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for use of email, instant message, website and other network communications; providing on-line non-downloadable software for limiting access to protect data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; provision of computer program and information relating to computer viruses, their varieties, characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of vaccine software for computer virus; restoration of computer data destroyed or partially destroyed by computer virus and other restoration of computer data; provision of information in relation to restoration of computer data destroyed or partially destroyed by computer virus; research and analysis of computer virus; provision of information relating to research and analysis of computer virus; advice for restoration of computer program’s operation and problems; advice relating to research and analysis of computer virus; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; installation of computer programs and advice and consultancy for installation of computer programs; installation of computer program; updating of computer software for others via computer and communication networks; updating of pattern file for computer virus; monitoring of server for extermination of computer virus and computer virus countermeasures including removal of computer virus and provision of information thereof; design, creation, and maintenance of computer program; consultancy relating to design, creation, and maintenance of computer program; provision of information relating to design, creation, and maintenance of computer program; design, creation, and maintenance of information processing system for use with computer; consultancy r
TREND CYBERTRON
TREND CYBERTRON
Trademark
Word
ITU
PENDING
Owner:
Serial:99347131
Filed:Aug 20, 2025
Classes:9, 41, 42
Goods & Services
Class 009: Downloadable computer programs and downloadable computer software for artificial generation of human speech and text; application software for smartphones; application software; computer hardware; computer hardware that integrates and manages security functions to protect computer networks from threats such as computer viruses and unauthorized intrusions; computers; computer utility software; firewall computer software; computer software for computer data security and other computer software; computer accessories; computer software for preventing leakage of confidential information; computer software and electronic publications to inform and educate computer users about computer and network security; computer software to monitor, report and enforce regulatory compliance; software for data backup and recovery; computer hardware and software to protect and enhance data confidentiality; computer hardware and software to protect or to restore the perfect condition of data, computer, computer software, computer network; computer hardware and software to protect or to restore the effectiveness of data and the infrastructure of computers; electronic publications recorded on electronic circuits, magnetic disks, magnetic tapes, optical disks, and magneto-optical disks; other electronic publications; electronic circuits, magnetic disks, magnetic tapes, optical disks, magnetic-optical disks and other recording media recorded with computer programs; computer program; other electronic machines and apparatus and their parts; exposed cinematographic films; exposed slide films; slide film mounts; computer software, recorded; computer software for computer games; personal digital assistants; computer peripheral devices; USB flash drives; portable computer hardware; Class 041: Providing electronic publications; services of reference libraries for literature and documentary records; rental of records or sound-recorded magnetic tapes; rental of image-recorded magnetic tapes; educational services relating to computer security; examination and certification for security technology of computer system; educational training relating to computers; training in the field of computer software development; training in the use and operation of computers; educational and instruction services relating to arts, crafts, sports or general knowledge; educational services relating to operation of computer hardware; educational services relating to operation of computer software; educational services relating to computer virus; examination, certification and grant qualification related to computer security; arranging, conducting and organization of lecture, workshops [training] or seminars relating to computer virus or computer security; arranging and conducting of lecture, workshops [training] or seminars; providing videos from the internet; educational and training services relating to cyber security and information technology; organization of competitions; organization of ceremony to award incentives; provision of blogs, online journals and non-downloadable publications via websites; publication of articles, newsletters, warning letters, instructions, reports and summarized articles relating education; Class 042: Providing on-line non-downloadable software for generating human sound and text artificially; provision of software in relation to computer, data, network security by SaaS provider; provision of computer program for platform construction for provision of SaaS application; design or maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus computer software; providing on-line non-downloadable software for monitoring, filtering and reporting of message/files/programs/data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing computer programs with a function of filtering e-mails; provision of Internet search engines; update of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; installation of computer programs and advices and consultancy for installation of computer programs; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for use of email, instant message, website and other network communications; providing on-line non-downloadable software for limitation of access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of computer program and information relating to computer viruses, their varieties, characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of vaccine software for computer virus; provision and rental of other computer program; restoration of computer data destroyed or partially destroyed by computer virus and other restoration of computer data (included what is performed by dispatch); provision of information in relation of restoration of computer data destroyed or partially destroyed by computer virus; advices for restoration of computer program’s operation and problems; research and analysis of computer virus (included what is performed by dispatch); provision of information relating to research and analysis of computer virus; advices relating to research and analysis of computer virus; installation of computer program; update of pattern file for computer virus; update of other computer software; monitoring of server for extermination of computer virus and computer virus countermeasures including removal of computer virus (included what is performed by dispatch) and provision of information thereof; design, creation, maintenance of computer program; consultancy relating to design, creation, maintenance of computer program; provision of information relating to design, creation, maintenance of computer program; design, creation, maintenance of information processing system used computer; consultancy relating to design, creation, maintenance of information processing system used computer; provision of information relating to design, creation, maintenance of information processing system used computer; provision of information relating to computer bug or updating; rental of access time to computer database; information processing by computer; design of machines, apparatus, instruments (including their parts) or systems and facility composed of such machines, apparatus and instruments; technological advices and introduction about performance and operation procedures of computers, automobiles and industrial machines which need to have an advanced and technical knowledge/technology/experience to operate appropriately (technological advice relating to computers, automobiles and industrial machines); testing or research on computer programs; testing or research on machine and apparatus; rental of computer (including CPU and electronic circuits, magnetic disks, magnetic tapes recorded with computer programs and other peripheral apparatus); provision of information about computer technology via website; provision of technological information about computer; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer r
CYBERTRON
CYBERTRON
Trademark
Word
REGISTERED
Owner:
Serial:99102293
Filed:Mar 25, 2025
Classes:9, 41, 42
Registration:8173728
Registered:Mar 17, 2026
Goods & Services
Providing electronic publications; reference libraries of literature and documentary records; rental of records or sound-recorded magnetic tapes; rental of image-recorded magnetic tapes; educational services relating to computer security; examination and certification for security technology of computer system; educational training relating to computers; training in the field of development of computer software; training relating to use and operation of computers; educational and instruction services relating to arts, crafts, sports or general knowledge; educational services relating to operation of computer hardware; educational services relating to operation of computer software; educational services relating to computer virus; examination, certification and grant qualification related to computer security; organization, arranging and conducting of lecture, workshops [training] or seminars relating to computer virus or computer security; arranging and conducting of lecture, workshops [training] or seminars; providing videos from the internet; educational and training services relating to cyber security and information technology; organization of competitions; organization of ceremony to award incentives; providing blog, online journal and electronic publications, not downloadable, via website; publication of articles, newsletters, warning letters, instructions, reports and summarized articles relating education;; Downloadable computer program and downloadable computer software for generating human sound and text artificially; application software for smartphones; computer hardware; computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; computer software; computer utility software; computer software for firewall; computer software for data security of computers and other computer software; fittings for computer; computer software to prevent confidential information from leaking; computer software and electronic publications to provide information to users and to educate users in relation to computer and network security; computer software to monitor, report and perform the regulated compliance; computer software to backup and to restore data; computer hardware and software to protect and to enhance confidentiality of data; computer hardware and software to protect or to restore the perfect condition of data, computer, computer software, computer network; computer hardware and software to protect or to restore the effectiveness of data and the infrastructure of computers; electronic publications recorded in electronic circuits, magnetic disks, magnetic tapes, optical disks, magnetic-optical disks; other electronic publications; electrical communication machines and instruments; electronic circuits, magnetic disks, magnetic tapes, optical disks, magnetic-optical disks and other recording media recorded with computer programs; computer programs; other electronic machines, apparatus and their parts; consumer video game programs; electronic circuits and CD-ROMs recorded with programs for hand-held games with liquid crystal displays; exposed cinematographic films; exposed slide films; slide film mounts; recorded video discs and video tapes; downloadable image files via Internet; computer software, recorded; electronic circuits, magnetic disks, magnetic tapes, optical disks, magneto-optical disk and other data carriers recorded with game information, town information, musical information, theater information, movie information, music, photos and others; computer software for playing computer games; personal digital assistants; computer peripherals; USB flash drives; portable computer hardware;; Providing on-line non-downloadable software for generating human sound and text artificially; provision of software in relation to computer, data, network security by SaaS provider; provision of computer program for platform construction for provision of SaaS application; design and maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message/files/programs/data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing computer programs with a function of filtering e-mails; provision of Internet search engines; update of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; installation of computer programs and advices and consultancy for installation of computer programs; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for use of email, instant message, website and other network communications; providing on-line non-downloadable software for limitation of access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of computer program and information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of vaccine software for computer virus; provision and rental of other computer program; restoration of computer data destroyed or partially destroyed by computer virus and other restoration of computer data (included what is performed by dispatch); provision of information in relation of restoration of computer data destroyed or partially destroyed by computer virus; advices for restoration of computer program’s load and problems; research and analysis of computer virus (included what is performed by dispatch); provision of information relating to research and analysis of computer virus; advices relating to research and analysis of computer virus; installation of computer program; update of pattern file for computer virus; update of other computer software; monitoring of server for extermination of computer virus and computer virus countermeasures including removal of computer virus (included what is performed by dispatch) and provision of information thereof; design, creation, maintenance of computer program; consultancy relating to design, creation, maintenance of computer program; provision of information relating to design, creation, maintenance of computer program; design, creation, maintenance of information processing system used computer; consultancy relating to design, creation, maintenance of information processing system used computer; provision of information relating to design, creation, maintenance of information processing system used computer; provision of information relating to computer bug or updating; rental of access time to computer database; information processing by computer; design of machines, apparatus, instruments (including their parts) or systems and facility composed of such machines, apparatus and instruments; technological advices and introduction about performance and operation procedures of computers, automobiles and industrial machines which need to have an advanced and technical knowledge/technology/experience to operate appropriately (technological advice relating to computers, automobiles and industrial machines); testing and research on computer programs; testing and research on machine and apparatus; rental of computer (including CPU and electronic circuits, magnetic disks, magnetic tapes recorded with computer programs and other peripheral apparatus); provision of information about computer technology via website; provision of technological information about computer; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; software as a service (SaaS) services; providing online non-downloadable software; Platform as a Service (PaaS); providing online non-downloadable cloud computing software; cloud computing services; consulting services in the field of cloud computing; consulting services in the field of computer security software and computer network design; troubleshooting remediation of computer software problems; technical support services relating to computer software; configuration of computer software and computer networks; remote administration and management of computer software applications;
TREND COMPANION
TREND COMPANION
Trademark
Word
PENDING
Owner:
Serial:98762108
Filed:Sep 20, 2024
Classes:9, 42
Goods & Services
Providing on-line non-downloadable software for generating human sound and text artificially; provision of software as a service (SAAS) services for securing computers, data, and computer networks; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs, and data that were retrieved and received from computer and computer network; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; provision of Internet search engines; technical advice and consultancy relating to design of computer hardware, computer systems, computer software, computers and communication networks; installation of computer programs and advice and consultancy for installation of computer programs; provision of online non-downloadable computer programs for providing information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; providing advice regarding restoration and recovery of computer programs; research and analysis of computer viruses; provision of information relating to research and analysis of computer viruses; advice relating to research and analysis of computer virus; monitoring of computer servers for detection, isolation and removal of computer viruses and provision of information thereof; provision of information relating to design, creation, maintenance of computer programs; provision of information relating to computer bug detection and removal, and computer network updating; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; updating of computer software relating to computer security and prevention of computer risks; providing temporary use of on-line non-downloadable chatbot software for use in cybersecurity; troubleshooting remediation of computer software problems; technical support services, namely, troubleshooting of computer software problems;
TREND MICRO CHAINSAFER
ABANDONED
Owner:
Serial:98313237
Filed:Dec 13, 2023
Classes:9
T TREND MICRO
T TREND MICRO
Trademark
Combined
ITU
PENDING
Owner:
Serial:98257329
Filed:Nov 6, 2023
Classes:9, 35, 37, +2
Goods & Services
Providing online non-downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; educational and training services, namely, computer education training services relating to computer security; educational examination services provided in the field of security technologies for computer system and provision of qualification thereof; computer education training; training services in the field of computer software development; training in the use and operation of computers; educational and instruction services in the field of computer software, firmware, hardware, electronic devices, data and network security and cybersecurity; educational and instruction services namely, conducting classes, training courses and programs in the field of computer hardware; educational and instruction services relating to operation of computer software namely, conducting classes, training courses and programs in the field of computer software; educational and instruction services namely, conducting classes, training courses and programs in the field of computer viruses; educational examination services in the field of computer security and provision of authorization and qualification thereof; arranging, conducting and organization of lecture, workshop, seminars for computer education training in the field of computer viruses and computer security; arranging, conducting and organization of lectures, workshops, and seminars for computer security software, hardware and network training; providing a website featuring non-downloadable videos in the field of computer and computer software education training; educational and training services, namely, computer and computer software education training in the field of cybersecurity and information technology; organizing, arranging and conducting competitions in the fields of computer software, firmware, hardware, electronic devices, data and network security; organizing, arranging and conducting incentive award programs in the fields of computer software, firmware, hardware, electronic devices, data and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles, news, alerts, advisories, reports and bulletins in the field of computer software, firmware, hardware, electronic devices, data and network security; publishing of educational articles, news, alerts, advisories, reports and bulletins in the fields of computer software, firmware, hardware, electronic devices, data and network security;; Downloadable application software for smartphones for preventing and identifying unauthorized access, and for use in securing, monitoring and protecting data, passwords, personal identities, computers, computer networks and mobile devices; downloadable application software for smartphones for network security, web security, email security and endpoint security software; downloadable application software for smartphones, namely anti-malware, antivirus, anti-spam, anti-fraud, anti-ransomware and adblocking software, intrusion detection and prevention software, advanced threat detection and prevention software; downloadable application software for smartphones, namely software for identifying and eliminating duplicate photos, images and contact information; downloadable application software for smartphones, namely software for monitoring and updating other computer software; computer hardware; portable computer hardware; computer peripherals; pre-recorded USB flash drives containing software for securing computers, data, computer networks and computer network endpoints; computer hardware for integrated control of security functions to protect computer networks against threat by computer virus, illegal access and others; downloadable and recorded computer security software; downloadable computer utility programs for performing computer maintenance; downloadable computer utility software for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; downloadable computer utility software for scanning, detecting and identifying files or data for removal to optimize performance, increase efficiency, and secure computers, computer networks and mobile devices; downloadable computer utility software for scanning, detecting and identifying malicious, fraudulent or fake websites; downloadable computer utility software for scanning, detecting and identifying viruses, worms, spyware, malicious threats and other security risks on computers, computer networks and mobile devices; downloadable computer utility software for data conversion and decompression; downloadable and recorded computer software for the creation of firewalls; downloadable and recorded computer software for securing data in computers and other computer software; downloadable and recorded computer software to prevent confidential information from leaking; downloadable computer software providing access to information in the field of computer and network security and downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software for monitoring, reporting and performing regulatory compliance; downloadable computer software to backup and restore data; computer hardware and downloadable and recorded software to protect and to enhance confidentiality of data; computer hardware and downloadable and recorded software to protect or restore the perfect condition of data, computers, computer software, and computer networks; computer hardware and downloadable and recorded software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; recorded computer software for processing data;; Installation, maintenance and repair of computer hardware; installation, maintenance and repair of computer hardware being repair and recovery of computers and their accessories destroyed or partially destroyed by computer virus; providing information relating to repairs being the repair and recovery of computers and their accessories destroyed or partially destroyed by computer virus; repair or maintenance of telecommunication machines and apparatus; repair or maintenance of computers; providing information relating to repairs being the repair or maintenance of computers; installation, maintenance and repair of computer network and information technology equipment; providing information relating to installation, maintenance and repair of computers, computer hardware, and computer network hardware; consulting in the field of installation, maintenance and repair of computers, computer hardware, and computer network hardware;; Retail store services featuring computer software; online retail store services featuring computer software; retail store services featuring computer hardware; online retail store services featuring computer hardware;; Provision of software as a service (SAAS) services for securing computers, data, and computer networks; provision of Platform as a Service (PAAS) services for securing computers, data, and computer networks; providing on-line non-downloadable security software for use in securing computers, computer networks and computer network endpoints, and data; providing on-line non-downloadable computer antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of messages, files, programs, and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for securing data of computers and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing online non-downloadable computer software for filtering e-mails; provision of Internet search engines; updating of computer software for others via computer and communication networks; technical advice and consultancy relating to design of computer hardware, computer systems, computer software, computers and communication networks; installing computer programs and advice and consultancy for installing computer programs; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for use in securing email, instant message, website and other network communications; providing on-line non-downloadable software for limiting access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of information via a website relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of online non-downloadable computer programs for providing information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of vaccine software for computer virus in the nature of providing temporary use of non-downloadable computer anti-virus software; restoration and recovery of computer data destroyed or partially destroyed by computer viruses; provision of information in relation to restoration of computer data destroyed or partially destroyed by computer viruses; providing advice regarding restoration and recovery of computer programs; research and analysis of computer viruses; provision of information relating to research and analysis of computer viruses; advice relating to research and analysis of computer viruses; computer technology consultancy being installation of computer program; updating of computer software, namely, pattern files for detecting computer viruses; updating of other computer software; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, and maintenance of computer programs; consultancy relating to design, creation, and maintenance of computer programs; provision of information relating to design, creation, and maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; computer technology consultancy being information processing by computer; technological advice and consultancy regarding performance and operation of computers, and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; computer technology consultancy being testing and research on computer programs; computer services, namely computer hardware and computer endpoint testing and research; provision of information about computer technology via website; provision of technological information about computers; computer technology consultancy being consultancy and information services relating to information technology; provision of information about computer technology via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) services featuring software for processing data; providing online non-downloadable software for processing data; providing online non-downloadable software; platform as a service (PaaS) featuring computer security software; providing online non-downloadable cloud computing software for securing computers, data, and computer networks; computer technology consultancy being cloud computing services; computer technology consultancy provided in the field of cloud computing and cloud-based security software; computer technology consultancy provided in the field of computer security software, computer network design, operation and management; technical support services, namely, computer technology consultancy troubleshooting and remediation of computer software problems; technical support services, namely, computer technology consultancy; computer technology consultancy being custom configuration of computer software and computer networks; computer technology consultancy being remote administration and management of computer software applications; providing online non-downloadable software for securing computers, data, and computer networks;
XELGATE
XELGATE
Trademark
Word
ITU
PENDING
Owner:
Serial:98080347
Filed:Jul 11, 2023
Classes:9, 42
Goods & Services
Computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; downloadable computer software for creating firewalls; downloadable computer software for protecting data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable computer software to monitor, report and perform the actions required for regulatory compliance; computer hardware and downloadable computer anti-virus software to protect and to enhance confidentiality of data; Provision of computer programs relating to computer viruses and preventive steps, namely, updating of computer software being in the nature of virtual patches to prevent threats targeted at security vulnerabilities; provision of information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps in the nature of intrusion prevention, methods for dealing with viruses; providing information relating to computer technology via a website in the field of computer bug detection and removal, and field of prevention of threats created by computer bugs
XELPOINT
XELPOINT
Trademark
Word
ABANDONED
Owner:
Serial:98080351
Filed:Jul 11, 2023
Classes:9
Goods & Services
Downloadable application software for smartphones, for device identification, network traffic steering, securing connections, and network and radio quality monitoring and reporting; computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; computer hardware and downloadable computer anti-virus software to protect and to enhance confidentiality of data
XELSECURE
XELSECURE
Trademark
Word
ITU
PENDING
Owner:
Serial:98080328
Filed:Jul 11, 2023
Classes:9, 42
Goods & Services
Downloadable application software for smartphones, for device identification, network traffic steering, securing connections, and network and radio quality monitoring and reporting; computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; downloadable computer software for creating firewalls; downloadable computer software for protecting data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable computer software to monitor, report and perform the actions required for regulatory compliance​​​​​​​; computer hardware and downloadable computer anti-virus software to protect and to enhance confidentiality of data; Provision of computer programs relating to computer viruses and preventive steps, namely, updating of computer software being in the nature of virtual patches to prevent threats targeted at security vulnerabilities; provision of information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps in the nature of intrusion prevention, methods for dealing with viruses; providing information relating to computer technology via a website in the field of computer bug detection and removal, and field of prevention of threats created by computer bugs
TREND SERVICE ONE
TREND SERVICE ONE
Trademark
Word
REGISTERED
Owner:
Serial:98069872
Filed:Jul 3, 2023
Classes:42
Registration:8064500
Registered:Dec 16, 2025
Goods & Services
"SERVICE"; Software as a service (SAAS) services featuring software for securing computers, securing data, and securing computer networks; provision of software as a service (SAAS) services featuring software for securing computers, securing data, and securing network security; provision of software as a service (SAAS) for managed detection, response and support for computer, data, network, and network security threats, incidents, and vulnerabilities; providing on-line non-downloadable security software for use in securing computers, securing computer networks, securing data, and securing devices connected to a network; providing on-line non-downloadable computer antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of messages, files, programs, and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for securing data of computers and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing online non-downloadable computer software for filtering e-mails; provision of Internet search engines; updating of computer software for others via computer and communication networks; technical advice relating to design of computer hardware, computer systems, computer software, computers and communication networks; installing computer programs and advice and consultancy for installing computer programs; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for use in securing email, securing instant messages, and securing website and other network communications; providing on-line non-downloadable software for limiting access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; providing information relating to computer technology via a website in the field of computer viruses and their varieties, in the field of special characteristics of computer viruses, in the field of tendencies of computer viruses, in the field of examples of invasion and infections of computer viruses, in the field of computer virus removal methods, in the field of computer virus preventative steps, and in the field of methods for dealing with computer viruses; providing online non-downloadable computer programs for retrieving and displaying data relating to computer viruses and their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of vaccine software for computer virus in the nature of providing temporary use of non-downloadable computer anti-virus software; recovery of computer data destroyed or partially destroyed by computer viruses; provision of information via a website relating to restoration of computer data destroyed or partially destroyed by computer viruses; providing advice in the field of recovery of computer programs; research and analysis in the field of computer viruses; providing information relating to research and analysis of computer viruses via a website; providing advice in the field of research and analysis of computer viruses; updating of computer software, namely, pattern files for detecting computer viruses; updating of computer software; monitoring of computer servers for detection, isolation and removal of computer viruses and providing information relating thereto; design, development, and maintenance of computer software; computer technology consultancy provided in the field of design, creation, maintenance of computer program; providing information in the field of computer software design, computer software development, and maintenance of computer software programs; computer technology consultancy being design, creation, and maintenance of information processing systems for use with computers; computer technology consultancy provided in the field of design, creation, and maintenance of information processing systems for use with computers; providing information in the field of computer software design, creation, and maintenance of information processing systems for use with computers; providing information in the field of computer technology consultancy relating to computer bug detection and removal, and computer network updating; computer technology consultancy being information processing by computer; computer technology consultancy being testing and research on computer programs; computer services, namely, testing of computer hardware; computer services, namely, technological research in the field of computer hardware; providing information in the field of computer technology via website; providing information relating to computer technology via a website; computer technology consultancy being consultancy and information services; providing information in the field of computer technology about computer software via website; providing information in the field of computer technology about computer software; computer security consultancy; updating of computer software in the fields of computer security and prevention of computer risks; cybersecurity services in the nature of restricting unauthorized access to computer systems for securing computers, data, and computer networks; technology consultation in the field of cybersecurity services for securing computer, data and computer networks; computer security services in the nature of computer security consultancy for securing computers, data, and computer networks; computer security services in the nature of computer network security consultancy for securing computers, data, and computer networks; computer security services in the nature of internet security consultancy for securing computers, data, and computer networks; computer security services in the nature of data security consultancy for securing computers, data, and computer networks; computer security services in the nature of testing of security systems for securing computers, data, and computer networks; technology consultation in the field of cybersecurity being detection and response services for cybersecurity incidents; computer technology consulting services in the field of cybersecurity Incident Response services; computer technology consulting services in the field of cybersecurity Incident Response services being identifying, responding to, managing and mitigating cybersecurity incidents, threats or attacks; consulting services in the field of cloud-based security software; computer technology consultancy in the fields of computer security software and computer network design, operation and management; technical support services, namely, troubleshooting of computer software problems; technical support services, namely, remediation of computer software problems in the field of cybersecurity incidents, threats or attacks; technical support services, namely, troubleshooting of computer software problems; computer technology consultancy in the fields of custom configuration of computer software and computer networks; computer technology consultancy in the fields of remote administration and management of computer software applications and networks; computer services, computer software services and computer network services, namely, computer technology consultancy in the fields of monitoring, identifying, detecting, investigating, analyzing and reporting threats, breaches, and problems in computer software, computer hardware, computer networks, and computer network hardware that connects to and exchanges information with a computer network; computer services, computer software services and computer network services, namely, computer technology consultancy in the fields of preventing, containing, isolating, responding to, remediating and repairing damage from threats, breaches and problems in computer software and computer networks;
SECURERAN
SECURERAN
Trademark
Word
ABANDONED
Owner:
Serial:97909365
Filed:Apr 26, 2023
Classes:9, 42
Goods & Services
Downloadable computer software for securing communication software; downloadable computer software for securing software running on communication servers or platforms; downloadable computer software for protecting communication software from vulnerability attacks, malware infection, and service disruption; downloadable computer software for protecting software running on communication servers or platforms from vulnerability attacks, malware infection, and service disruption; downloadable computer software for data security of computers and other computer software in the field of communication platforms, servers, software, and services; Software as a service (SAAS) services in relation to computer, data, and network security featuring software for securing communication software; software as a service (SAAS) services in relation to computer, data, and network security featuring software for securing software running on communication servers or platforms; software as a service (SAAS) services in relation to computer, data, and network security featuring software for protecting communication software from vulnerability attacks, malware infection, and service disruption; software as a service (SAAS) services in relation to computer, data, and network security featuring software for protecting software running on communication servers or platforms from vulnerability attacks, malware infection, and service disruption; provision of on-line non-downloadable computer programs for platform construction for provision of SaaS application in the nature of O-RAN platforms as a service, namely, computer software platforms for securely executing software running on communication servers or platforms; providing on-line non-downloadable software for use in computer security, data security, and network security, namely, software for securing communication software; providing on-line non-downloadable software for use in computer security, data security, and network security, namely, software for securing software running on communication servers or platforms; providing on-line non-downloadable software for use in computer security, data security, and network security, namely, software for protecting communication software from vulnerability attacks, malware infection, and service disruption; providing on-line non-downloadable software for use in computer security, data security, and network security, namely, software for protecting software running on communication servers or platforms from vulnerability attacks, malware infection, and service disruption
C
C
Trademark
Combined
REGISTERED
Owner:
Serial:97767154
Filed:Jan 25, 2023
Classes:9, 42
Registration:7718256
Registered:Mar 11, 2025
Goods & Services
Downloadable application software for smartphones, for network security software, web security software, email security software and endpoint security software; computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; downloadable computer utility software for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; downloadable computer software for creating firewalls; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in the field of computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer software to backup and to restore data; recorded computer antivirus software to protect and to enhance confidentiality of data; computer hardware and downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable cybersecurity software for computer network security; downloadable computer security software for computer network security; downloadable intrusion detection software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software;downloadable computer security software for protection of mobile networks, computers, computer networks, computer data, and mobile network endpoints; Provision of Internet search engines; updating of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; installation of computer programs and advices and consultancy for installation of computer programs; computer programming for others; provision of information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; restoration and recovery of computer data destroyed or partially destroyed by computer viruses; provision of information about restoration of computer data destroyed or partially destroyed by computer virus; advices for restoration of computer program's load and problems; research and analysis of computer viruses; provision of information relating to research and analysis of computer virus; advices relating to research and analysis of computer virus; installation of computer programs; updating of computer software, namely, pattern files for detecting computer viruses; updating of computer software for others; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, and maintenance of computer programs; consultancy relating to design, creation, and maintenance of computer programs; provision of information relating to design, creation, and maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security and computer network security; technological advice and consultancy regarding performance and operation of computers and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; testing and research on computer programs; product testing and product research on machine and apparatus; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks
CTONE
CTONE
Trademark
Word
REGISTERED
Owner:
Serial:97767143
Filed:Jan 25, 2023
Classes:9, 42
Registration:7718255
Registered:Mar 11, 2025
Goods & Services
Downloadable application software for smartphones, for network security software, web security software, email security software and endpoint security software; computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; downloadable computer utility software for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; downloadable computer software for creating firewalls; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in the field of computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer software to backup and to restore data; computer hardware to protect and to enhance confidentiality of data; recorded computer antivirus software to protect and to enhance confidentiality of data; computer hardware and downloadable computer anti-virus software to protect or to restore the perfect condition of data, computer, computer software, computer network; computer hardware and downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable cybersecurity software for computer network security; downloadable computer security software for computer network security; downloadable intrusion detection software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of mobile networks, computers, computer networks, computer data, and mobile network endpoints; Provision of Internet search engines; updating of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; installation of computer programs and advices and consultancy for installation of computer programs; computer programming for others; provision of information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; restoration and recovery of computer data destroyed or partially destroyed by computer viruses; provision of information about restoration of computer data destroyed or partially destroyed by computer virus; advices for restoration of computer program's load and problems; research and analysis of computer viruses; provision of information relating to research and analysis of computer virus; advices relating to research and analysis of computer virus; installation of computer programs; updating of computer software, namely, pattern files for detecting computer viruses; updating of computer software for others; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, and maintenance of computer programs; consultancy relating to design, creation, and maintenance of computer programs; provision of information relating to design, creation, and maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security and computer network security; technological advice and consultancy regarding performance and operation of computers and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; testing and research on computer programs; product testing and product research on machine and apparatus; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks
TRENDCONNECT
TRENDCONNECT
Trademark
Word
REGISTERED
Owner:
Serial:97761332
Filed:Jan 19, 2023
Classes:9
Registration:7436693
Registered:Jul 9, 2024
Goods & Services
Downloadable application software for smartphones, for receiving software updates, accessing custom reports, receiving threat alerts, accessing research and insights from security experts, technical support and troubleshooting services and providing user authentication services in the field of computer and network security, web security, email security and endpoint security; downloadable application software for smartphones, for accessing, viewing and managing network security software, web security software, email security software and endpoint security software; downloadable computer software for receiving software updates, accessing custom reports, receiving threat alerts, accessing research and insights from security experts, technical support and troubleshooting services and providing user authentication services in the field of computer and network security, web security, email security and endpoint security; downloadable computer security software; downloadable computer utility software for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable computer software for downloading and reading electronic publications on portable electronic devices to provide information to users and to educate users in relation to computer and network security; downloadable computer security software to protect data, computers, computer software, and computer networks | Provision of temporary use of on-line non-downloadable computer programs for platform construction for provision of SaaS application; design and maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; provision of Internet search engines; technical advice and consultancy relating to design of computers, computer system, computer software, computers and communication networks; advice and consultancy for installation of computer programs; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for limitation of access to protect data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; provision of online, non-downloadable information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of information relating to research and analysis of computer virus; advice relating to research and analysis of computer virus; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; provision of technology information relating to computer bug or updating; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software; updating of computer software relating to computer security and prevention of computer risks
WORKFORCE ONE
WORKFORCE ONE
Trademark
Word
ABANDONED
Owner:
Serial:97469203
Filed:Jun 21, 2022
Classes:9
VEHICLE ONE
VEHICLE ONE
Trademark
Word
ABANDONED
Owner:
Serial:97333336
Filed:Mar 28, 2022
Classes:9
TREND MICRO SERVICE ONE
TREND MICRO SERVICE ONE
Service Mark
Word
REGISTERED
Owner:
Serial:97192852
Filed:Dec 28, 2021
Classes:42
Registration:7821597
Registered:Jun 10, 2025
Goods & Services
"SERVICE"; Computer services, computer software services and computer network services for others, namely, monitoring, identifying, and detecting threats, breaches, and problems in computer software, computer hardware, computer networks, and computer network endpoints; computer services, computer software services and computer network services for others, namely, investigating, analyzing and reporting threats, breaches, and problems in computer software, computer hardware, computer networks, and computer network endpoints; computer services, computer software services and computer network services for others, namely, containing, isolating, responding to, remediating and repairing damage from threats, breaches and problems in computer software and computer network software; computer services, computer software services and computer network services for others, namely, preventing threats, breaches and problems in computer software and computer networks; computer services, computer software services and computer network services for others, namely, remote management of information technology (IT) systems of others; technical support services, namely, detection, analysis, reporting and remediation of computer software and software as a service (SAAS), technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, computer network security incident detection response and remediation services; technical support services, namely, administration, monitoring and updating of computers, computer hardware, computer software and computer networks; technical support services, namely, reviewing existing computer network environment, and consulting on computer network security and assisting with installation, monitoring and maintaining, computer software, and monitoring of computer networks, and network components; technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Computer technology support services, namely, help desk services; technical support services, namely, remote infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; technical support services, namely, Managed XDR (Extended Detection and Response) services being, monitoring, identifying, detecting and managing threats, breaches, and problems in computer software, computer hardware, computer networks, and computer network endpoints in the field of computer security software, computer network security and computer network endpoint security; technical support, namely, installation, administration, diagnosing problems with and monitoring of technological functions of computer software in the fields of computer software and network security; information technology consulting services regarding professional and managed security services for securing and protecting computers, computer networks, endpoints and data; computer security consultancy; computer software consulting services; computer network software consulting services; computer hardware consulting services, namely, consulting services in the fields of selection, implementation and use of computer hardware; computer hardware consulting services, namely, consulting services in the field of cybersecurity; information technology consulting services; consulting services in the field of cloud computing, cloud computing networks and applications; technology consulting services in the fields of computers, computer hardware selection, computer networks and network security and computer software as a service (SAAS); consultation in deploying and managing computer security hardware, software, networks and network components; custom configuration of computer software, computer hardware, computer systems and computer networks; developing and deploying customized computer software in the fields of computer software, data and network security; computer programming and computer system analysis; updating of computer software for others relating to computer security and prevention of computer and network risks; providing notification and delivery of software updates through online updates, enhancements and patches
APEX ONE
APEX ONE
Trademark
Word
REGISTERED
Owner:
Serial:90786596
Filed:Jun 21, 2021
Classes:9
Registration:6836948
Registered:Sep 6, 2022
Goods & Services
downloadable computer security software; downloadable computer antivirus software; downloadable anti-spyware, anti-spam, and anti-fraud computer software; downloadable anti-malware and anti-ransomware software; downloadable firewall software; downloadable malicious code and malicious content screening software; downloadable data loss prevention (DLP) software; downloadable data encryption software; downloadable computer utility software; downloadable computer software for detecting and reporting malware, trojans, worms, spyware, and ransomware; downloadable computer software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; downloadable computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; downloadable computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers | software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring computer antivirus software; providing on-line non-downloadable computer antivirus software; software as a service (SAAS) services featuring anti-spyware, anti-spam, and anti-fraud computer software; providing on-line non-downloadable anti-spyware, anti-spam, and anti-fraud software; software as a service (SAAS) services featuring anti-malware and anti-ransomware software; providing on-line non-downloadable anti-malware and anti-ransomware software; software as a service (SAAS) services featuring firewall software; providing on-line non-downloadable firewall software; software as a service (SAAS) services featuring malicious code and malicious content screening software; providing on-line non-downloadable malicious code and malicious content screening software; software as a service (SAAS) services featuring data loss prevention (DLP) software; providing on-line non-downloadable data loss prevention (DLP) software; software as a service (SAAS) services featuring data encryption software; providing on-line non-downloadable data encryption software; software as a service (SAAS) services featuring computer utility software; providing on-line non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for detecting and reporting malware, trojans, worms, spyware, and ransomware; providing on-line non-downloadable software for detecting and reporting malware, trojans, worms, spyware, and ransomware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; providing on-line non-downloadable software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; providing on-line non-downloadable software for detecting, analyzing, reporting and sharing computer, data and network security threats; software as a service (SAAS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; providing on-line non-downloadable software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers
NETWORK ONE
NETWORK ONE
Trademark
Word
ABANDONED
Owner:
Serial:90786293
Filed:Jun 21, 2021
Classes:9
Goods & Services
"NETWORK"
TREND MICRO NETWORK ONE
REGISTERED
Owner:
Serial:90786304
Filed:Jun 21, 2021
Classes:9, 42
Registration:6862557
Registered:Oct 4, 2022
Goods & Services
Class 009: downloadable computer security software; downloadable anti-malware software; downloadable intrusion detection and prevention software; downloadable advanced threat protection software; downloadable computer software and computer hardware for use in securing, monitoring and protecting data, computers, and mobile devices; downloadable computer software for detecting and responding to advanced persistent threats and targeted security attacks; downloadable computer software and computer hardware for scanning for, identifying, patching and repairing security breaches in data, computers and mobile devices; downloadable computer software for use in scanning for, identifying, reporting and removing malware and viruses; downloadable computer software and hardware for monitoring, segmenting and locking down data and computers; downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; downloadable IOT security software; downloadable security software for Industrial Control Systems (ICS); downloadable computer software for application whitelisting and blacklisting; downloadable computer software for providing virus and malware pattern updates; Class 042: software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring anti-malware software; providing on-line non-downloadable anti-malware software; software as a service (SAAS) services featuring intrusion detection and prevention software; providing on-line non-downloadable intrusion detection and prevention software; software as a service (SAAS) services featuring advanced threat protection software; providing on-line non-downloadable advanced threat protection software; software as a service (SAAS) services featuring computer software for use in securing, monitoring and protecting data, computers, and mobile devices; providing on-line non-downloadable computer software for use in securing, monitoring and protecting data, computers, and mobile devices; software as a service (SAAS) services featuring computer software for detecting and responding to advanced persistent threats and targeted security attacks; providing on-line non-downloadable computer software for detecting and responding to advanced persistent threats and targeted security attacks; software as a service (SAAS) services featuring computer software for scanning for, identifying, patching and repairing security breaches in data, computers and mobile devices; providing on-line non-downloadable computer software for scanning for, identifying, patching and repairing security breaches in data, computers and mobile devices; software as a service (SAAS) services featuring computer software for use in scanning for, identifying, reporting and removing malware and viruses; providing on-line non-downloadable containing computer software for use in scanning for, identifying, reporting and removing malware, viruses; software as a service (SAAS) services featuring computer software for monitoring, segmenting and locking down data and computers; providing on-line non-downloadable computer software for monitoring, segmenting and locking down data and computers; software as a service (SAAS) services featuring computer software for securing industrial machinery, industrial control systems and manufacturing; providing on-line non-downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; software as a service (SAAS) services featuring IOT security software; providing on-line non-downloadable IOT security software; software as a service (SAAS) services featuring security software for Industrial Control Systems (ICS); providing on-line non-downloadable security software for Industrial Control Systems (ICS); software as a service (SAAS) services featuring computer software for application whitelisting and blacklisting; providing on-line non-downloadable computer software for application whitelisting and blacklisting; software as a service (SAAS) services featuring computer software for providing virus and malware pattern updates; providing on-line non-downloadable computer software for providing virus and malware pattern updates
90652300
90652300
Trademark
Design
ABANDONED
Owner:
Serial:90652300
Filed:Apr 16, 2021
Classes:9
SKYCRAFTERS
SKYCRAFTERS
Service Mark
Word
ABANDONED
Owner:
Serial:90480732
Filed:Jan 21, 2021
Classes:38
T TREND MICRO
T TREND MICRO
Trademark
Combined
REGISTERED
Owner:
Serial:90416151
Filed:Dec 27, 2020
Classes:9
Registration:6903781
Registered:Nov 22, 2022
Goods & Services
Computer hardware; computer hardware for integrated control of security functions to protect computer networks against threat by computer virus, illegal access and others; downloadable and recorded computer security software; downloadable computer network security software, web security software, email security software and endpoint security software, all for preventing unauthorized access, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; downloadable anti-malware, antivirus, anti-spam, anti-fraud, and anti-ransomware software; downloadable intrusion detection and prevention software; downloadable advanced threat detection and prevention software; downloadable industrial network security software; downloadable threat detection and response (XDR) software; downloadable computer software for updating other computer software; downloadable computer utility software for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; downloadable computer software for the creation of firewalls; downloadable computer software for securing data in computers and other computer software; downloadable computer software for securing confidential information and preventing confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software for monitoring, reporting and performing regulatory compliance; downloadable computer software to backup and to restore data; computer hardware and downloadable computer software to protect and to enhance confidentiality of data; computer hardware and downloadable computer software to protect or to restore data, computers, computer software, and computer networks; computer hardware and downloadable computer software to protect or to restore data and computer networks; downloadable electronic publications in the nature of brochures, data sheets, and whitepapers in the field of computer software security, data and network security and network endpoint security | Software as a service (SAAS) services featuring computer security software; Software as a service (SAAS) services featuring software for providing computer network security, container security, file storage security, cloud workload security, API security, and application security, all for preventing unauthorized access, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; Software as a service (SAAS) services featuring cloud security posture management (CSPM) software; Software as a service (SAAS) services featuring cloud security services platforms for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; Software as a service (SAAS) services featuring computer network security software, web security software, email security software and endpoint security software, all for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; Software as a service (SAAS) services featuring anti-malware, antivirus, anti-spam, anti-fraud, and anti-ransomware software; Software as a service (SAAS) services featuring intrusion detection and prevention software; Software as a service (SAAS) services featuring advanced threat protection software; Software as a service (SAAS) services featuring industrial network security software; Software as a service (SAAS) services featuring threat detection and response (XDR) software; Software as a service (SAAS) services featuring computer software for updating other computer software; technical support services, namely, troubleshooting of computer software problems; computer security consultancy; provision of software as a service (SAAS) services for securing computers, data, and computer networks; providing online non-downloadable security software for use in computer security, data security, network security; providing online non-downloadable antivirus software; providing online non-downloadable software for monitoring, filtering and reporting of messages, files, programs, and data that were retrieved and received from computers and computer networks; providing temporary use of online non-downloadable security software for monitoring and protecting data, computers and electronic devices; providing online non-downloadable software for searching and reporting vulnerability of security of websites; providing online non-downloadable computer programs with a function of filtering e-mails; updating of computer software via computer and communication networks; technical advice and consultancy relating to design of computer hardware, computer systems, computer software, computers and communication networks; installation of computer programs and advice and consultancy for installation of computer programs; providing online non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer viruses; providing online non-downloadable software for computer security; providing online non-downloadable software for use in securing email, instant message, website and other network communications; providing online non-downloadable software for limitation of access to protect data; providing online non-downloadable software for backup and restoration of data; providing online non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of information via a website relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of online non-downloadable antivirus software; restoration and recovery of computer data destroyed or partially destroyed by computer viruses; provision of information in relation to restoration of computer data destroyed or partially destroyed by computer viruses; providing advice regarding restoration and recovery of computer programs; research and analysis of computer viruses; provision of information relating to research and analysis of computer viruses; advice relating to research and analysis of computer viruses; installation of computer programs; updating of computer software, namely, pattern files for detecting computer viruses; updating of other computer software; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, and maintenance of computer programs; consultancy relating to design, creation, and maintenance of computer programs; provision of information relating to design, creation, and maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security and computer network security; technological advice and consultancy regarding performance and operation of computers, computer systems in automobiles and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; computer services, namely, computer program testing and research; computer services, namely, computer hardware testing and research
TREND MICRO CLOUD ONE
TREND MICRO CLOUD ONE
Service Mark
Word
REGISTERED
Owner:
Serial:88697077
Filed:Nov 18, 2019
Classes:42
Registration:6373837
Registered:Jun 1, 2021
Goods & Services
Class 042: Software as a service (SAAS) services featuring computer security software; online non-downloadable computer security software; providing temporary use of non-downloadable cloud-based security software; Software as a service (SAAS) services featuring software for providing computer network security, container security, file storage security, cloud workload security, API security, and application security; online non-downloadable software for use in providing computer network security, container security, file storage security, cloud workload security, API security, and application security; providing temporary use of non-downloadable cloud-based software for providing computer network security, container security, file storage security, cloud workload security, API security, and application security; Software as a service (SAAS) services featuring cloud security posture management (CSPM) software; online non-downloadable cloud security posture management (CSPM) software; providing temporary use of non-downloadable cloud-based software for cloud security posture management (CSPM); Platform as a service (PAAS) featuring computer security software; online non-downloadable computer security software platform; providing temporary use of non-downloadable cloud-based computer security software platform; cloud security services platform; consulting services in the field of security software as a service (SAAS); consulting services in the field of cloud computing and cloud-based security software; consulting services in the field of computer security software, computer network design, operation and management; technical support services, namely, troubleshooting of computer security software problems; computer services, namely, cloud hosting provider services
DEEP SECURITY
DEEP SECURITY
Service Mark
Word
REGISTERED
Owner:
Serial:88631482
Filed:Sep 25, 2019
Classes:42
Registration:6145510
Registered:Sep 8, 2020
Goods & Services
Class 042: software as a service (SAAS) services featuring computer security software; providing online non-downloadable computer security software; software as a service (SAAS) services featuring computer antivirus, anti-spyware, anti-spam, anti-fraud, anti-malware and anti-ransomware software; providing online non-downloadable computer antivirus, anti-spyware, anti-spam, anti-fraud, anti-malware and anti-ransomware software; software as a service (SAAS) services featuring firewall software; providing online non-downloadable firewall software; software as a service (SAAS) services featuring malicious code and malicious content screening software; providing online non-downloadable malicious code and malicious content screening software; software as a service (SAAS) services featuring computer software for detecting, blocking and reporting malware, Trojans, worms, spyware, and ransomware; providing online non-downloadable software for detecting, blocking and reporting malware, Trojans, worms, spyware, and ransomware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; providing online non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; software as a service (SAAS) services featuring computer software for detecting and blocking exploit activities against vulnerable software; providing online non-downloadable software for detecting and blocking exploit activities against vulnerable software; software as a service (SAAS) services featuring computer software for inspecting and blocking unwanted computer network traffic; providing online non-downloadable software for inspecting and blocking unwanted computer network traffic; software as a service (SAAS) services featuring computer software for application whitelisting, monitoring of sensitive data files, directories and processes, and inspection of computer system logs; providing online non-downloadable software for application whitelisting, monitoring of sensitive data files, directories and processes, and inspection of computer system logs; software as a service (SAAS) services featuring computer software for use in computer and network security policy management and enforcement; providing online non-downloadable software for use in computer and network security policy management and enforcement; software as a service (SAAS) services featuring web consoles; providing online non-downloadable software, namely, hosting web consoles; software as a service (SAAS) services featuring computer software for use in coordinating, managing and tracking responses to computer network and data security breaches; providing online non-downloadable software for use in coordinating, managing and tracking responses to computer network and data security breaches; software as a service (SAAS) services featuring computer software for use in coordinating, managing, monitoring, tracking and reporting computer and network security issues; providing online non-downloadable software for use in coordinating, managing, monitoring, tracking and reporting computer and network security issues; software as a service (SAAS) services featuring computer software for monitoring of and reporting on computer security software and hardware; providing online non-downloadable software for monitoring of and reporting on computer security software and hardware; software as a service (SAAS) services featuring computer software for monitoring the operation, activity, and status of other computer software and software agents; providing online non-downloadable software for monitoring the operation, activity, and status of other computer software and software agents; software as a service (SAAS) services featuring computer software for managing and updating other computer security software, software agents and hardware; providing online non- downloadable software for managing and updating other computer security software, software agents and hardware; software as a service (SAAS) services featuring computer software for notification and delivery of software updates; providing online non-downloadable software featuring computer software for notification and delivery of software updates; consulting services in the fields of computer software and software as a service; consulting services in the fields of computer, data, server and computer network security; consultation in the field of deploying and managing computer security software; consulting services in the fields of server, computer, data and network security; custom configuration of computer software and computer networks; computer programming services; developing and deploying customized software in the field of computer software, data and network security; technical support services, namely, troubleshooting and remediation of computer software prob
CLOSE THE GAP
CLOSE THE GAP
Service Mark
Word
REGISTERED
Owner:
Serial:88475480
Filed:Jun 16, 2019
Classes:36
Registration:6267461
Registered:Feb 9, 2021
Goods & Services
Financial sponsorship of individuals' participation in conferences; providing scholarships for individuals to participate in conferences; charitable foundation services, namely, providing fund raising activities, scholarships and financial assistance for individuals to participate in cybersecurity and information technology conferences
DEEP SECURITY APP PROTECT
ABANDONED
Owner:
Serial:88209722
Filed:Nov 28, 2018
Classes:9
Goods & Services
"SECURITY APP PROTECT"
CLOSE THE GAP. SECURE THE FUTURE.
ABANDONED
Owner:
Serial:88194466
Filed:Nov 14, 2018
Classes:36
TREND MICRO APEX CENTRAL
REGISTERED
Owner:
Serial:88116660
Filed:Sep 13, 2018
Classes:9, 42
Registration:6075682
Registered:Jun 9, 2020
Goods & Services
Computer security software; computer network security policy management software; web consoles; data encryption software; computer software for managing and updating other computer security software and hardware; computer software for use in computer and network security policy management and enforcement; computer software for use in coordinating, managing and tracking responses to computer network and data security breaches; computer software for monitoring of and reporting on computer security software and hardware; computer software for securing, monitoring and protecting data, computers, computer and communication networks, network endpoints, and mobile devices; Software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring computer software for use in computer network security policy management; providing on-line non-downloadable computer software for use in computer network security policy management; software as a service (SAAS) services featuring web consoles; providing on-line non-downloadable computer software, namely, hosting web consoles; software as a service (SAAS) services featuring computer software for managing and updating other computer security software and hardware; providing on-line non-downloadable computer software for managing and updating other computer security software and hardware; software as a service (SAAS) services featuring computer software for use in computer and network security policy management and enforcement; providing on-line non-downloadable computer software for use in computer and network security policy management and enforcement; software as a service (SAAS) services featuring computer software for use in coordinating, managing and tracking responses to computer network and data security breaches; providing on-line non-downloadable computer software for use in coordinating, managing and tracking responses to computer network and data security breaches; software as a service (SAAS) services featuring computer software for monitoring of and reporting on computer security software and hardware; providing on-line non-downloadable computer software for monitoring of and reporting on computer security software and hardware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing on-line non-downloadable computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints
TREND MICRO APEX ONE
REGISTERED
Owner:
Serial:88116654
Filed:Sep 13, 2018
Classes:9
Registration:6342027
Registered:May 4, 2021
Goods & Services
computer security software; computer antivirus software; anti-spyware, anti-spam, and anti-fraud computer software; anti-malware and anti-ransomware software; firewall software; malicious code and malicious content screening software; data loss prevention (DLP) software; data encryption software; computer utility software; computer software for detecting and reporting malware, Trojans, worms, spyware, and ransomware; computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers | software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring computer antivirus software; providing on-line non-downloadable computer antivirus software; software as a service (SAAS) services featuring anti-spyware, anti-spam, and anti-fraud computer software; providing on-line non-downloadable anti-spyware, anti-spam, and anti-fraud software; software as a service (SAAS) services featuring anti-malware and anti-ransomware software; providing on-line non-downloadable anti-malware and anti-ransomware software; software as a service (SAAS) services featuring firewall software; providing on-line non-downloadable firewall software; software as a service (SAAS) services featuring malicious code and malicious content screening software; providing on-line non-downloadable malicious code and malicious content screening software; software as a service (SAAS) services featuring data loss prevention (DLP) software; providing on-line non-downloadable data loss prevention (DLP) software; software as a service (SAAS) services featuring data encryption software; providing on-line non-downloadable data encryption software; software as a service (SAAS) services featuring computer utility software; providing on-line non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for detecting and reporting malware, Trojans, worms, spyware, and ransomware; providing on-line non-downloadable software for detecting and reporting malware, Trojans, worms, spyware, and ransomware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing on-line non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; providing on-line non-downloadable software for detecting, analyzing, reporting and sharing computer, data and network security threats; software as a service (SAAS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; providing on-line non-downloadable software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers
DR. ANTIVIRUS
DR. ANTIVIRUS
Trademark
Word
CANCELLED
Owner:
Serial:87879320
Filed:Apr 16, 2018
Classes:9
Registration:5621852
Registered:Dec 4, 2018
Goods & Services
computer security software; computer anti-virus software; anti-spyware and anti-fraud software; malicious code and content screening and scanning software; computer software for use in detecting and removing adware, malware, spyware, malicious content and unauthorized software; computer software for securing and protecting data, computers, tablet computers, and mobile devices
HOUSECALL
HOUSECALL
Trademark
Word
REGISTERED
Owner:
Serial:87737517
Filed:Dec 29, 2017
Classes:9
Registration:5865176
Registered:Sep 24, 2019
Goods & Services
anti-virus software; computer software for scanning for, detecting, reporting on and eliminating viruses, worms, trojans, adware, spyware, malware, security exploits, bots, and malicious software on computers, laptops and tablet computers and computer networks; computer software for reviewing, comparing, recovering and restoring data files
PHISH INSIGHT
PHISH INSIGHT
Service Mark
Word
REGISTERED
Owner:
Serial:87418304
Filed:Apr 20, 2017
Classes:42
Registration:5551737
Registered:Aug 28, 2018
Goods & Services
Class 042: Software as a service (SAAS) services featuring software and applications for computer, data and network security; providing temporary use of online non-downloadable computer software and applications for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; providing temporary use of online non-downloadable computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; software as a service (SAAS) services featuring computer software and applications for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for educating, training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for educating training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; software as a service (SAAS) services featuring computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; providing temporary use of online non-downloadable computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; software as a service (SAAS) services featuring computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities
PHISHINSIGHT
PHISHINSIGHT
Service Mark
Combined
REGISTERED
Owner:
Serial:87418315
Filed:Apr 20, 2017
Classes:42
Registration:5318847
Registered:Oct 24, 2017
Goods & Services
Software as a service (SAAS) services featuring software and applications for computer, data and network security; providing temporary use of online non-downloadable computer software and applications for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; providing temporary use of online non-downloadable computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; software as a service (SAAS) services featuring computer software and applications for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for educating, training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for educating training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; software as a service (SAAS) services featuring computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; providing temporary use of online non-downloadable computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; software as a service (SAAS) services featuring computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities
XGEN
XGEN
Service Mark
Word
CANCELLED
Owner:
Serial:87332464
Filed:Feb 11, 2017
Classes:42
Registration:5734376
Registered:Apr 23, 2019
Goods & Services
Software as a service (SAAS) services featuring software for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, anti-malware software and anti-ransomware software; software as a service (SAAS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; software as a service (SAAS) services featuring computer security software for data extraction and analysis used to identify and report malicious files; software as a service (SAAS) services featuring computer software for the protection, monitoring, authenticating, and securing of data, computers, computer networks, endpoints; software as a service (SAAS) services featuring computer security software for use in scanning for, preventing, identifying, assessing and reporting on threats to, and security vulnerabilities in, computers, computer networks, endpoints; software as a service (SAAS) services featuring computer software for preventing unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; providing online databases and websites featuring information in the fields of computer security software and services, computer network and endpoint security, data security and security for computers, computer servers, computer users; providing videos, whitepapers, articles, briefs and electronic information in the fields of computer security software and services, computer network and endpoint security, data security and security for computers, computer servers, computer users
XGEN
XGEN
Trademark
Word
CANCELLED
Owner:
Serial:87980043
Filed:Feb 11, 2017
Classes:9
Registration:5712777
Registered:Apr 2, 2019
Goods & Services
Computer security software; computer antivirus software, anti-malware software and anti-ransomware software; computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; computer security software for data extraction and analysis used to identify and report malicious files; computer hardware and computer software for the protection, monitoring, authenticating, and securing of data, computers, computer networks, endpoints and mobile devices; computer security software and hardware, namely, intrusion prevention systems; computer security software for use in scanning for, preventing, identifying, assessing and reporting on threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; computer software for preventing unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets
87128015
87128015
Trademark
Design
REGISTERED
Owner:
Serial:87128015
Filed:Aug 4, 2016
Classes:9
Registration:5415408
Registered:Mar 6, 2018
Goods & Services
Computer hardware; computer security software; computer utility software; computer software for data security of computer hardware, computer networks and other computer software; computer software for preventing unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; computer hardware and computer software for the protection and securing of data; computer hardware and computer software for protecting electronic data, computer hardware, computer software, and computer networks; computer security appliances, namely, computer hardware; electronic software updates, namely, downloadable computer software and associated downloadable electronic data files for updating computer software in the fields of computer and data security
DR. CLEANER
DR. CLEANER
Trademark
Word
CANCELLED
Owner:
Serial:86850789
Filed:Dec 16, 2015
Classes:9
Registration:4960419
Registered:May 17, 2016
86814867
86814867
Trademark
Design
CANCELLED
Owner:
Serial:86814867
Filed:Nov 10, 2015
Classes:9
Registration:5065770
Registered:Oct 18, 2016
DR. BOOSTER
DR. BOOSTER
Trademark
Word
CANCELLED
Owner:
Serial:86774410
Filed:Sep 30, 2015
Classes:9
Registration:4960207
Registered:May 17, 2016
DR. MOBILE
DR. MOBILE
Trademark
Word
ABANDONED
Owner:
Serial:86774420
Filed:Sep 30, 2015
Classes:9
DR. SAFETY
DR. SAFETY
Trademark
Word
REGISTERED
Owner:
Serial:86774426
Filed:Sep 30, 2015
Classes:9
Registration:4960209
Registered:May 17, 2016
Goods & Services
computer security software; computer anti-virus software; anti-spyware and anti-fraud software; malicious code and content screening software; computer software for use in detecting, blocking and removing malware, spyware, malicious content and unauthorized software; computer software for securing and protecting data, computers, tablet computers, and mobile devices; computer software for identifying and blocking unwanted communications and messages; computer software for identifying and blocking websites containing malicious, untrustworthy and unwanted content and programs; computer software for use in tracking, detecting and reporting locations of tablet computers and mobile devices; computer software to lock a mobile device or erase the memory of a mobile device upon receipt of a remote command; data privacy control software; computer software for detecting, monitoring and controlling data privacy settings for other software and services
DEEP DISCOVERY
DEEP DISCOVERY
Trademark
Word
REGISTERED
Owner:
Serial:86004774
Filed:Jul 8, 2013
Classes:9
Registration:4595484
Registered:Sep 2, 2014
Goods & Services
computer security software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; computer network and data security software for use in protecting computers, computer networks, and mobile devices; computer software for use in monitoring, inspecting, analyzing and reporting on data traffic on computer networks; computer software for identifying, tracking, simulating and analyzing potential security threats to computers, computer data and computer systems; computer software for identifying malicious content, communications and computer and network behavior threatening computers and computer networks; computer software for detecting and responding to advanced persistent threats and targeted security attacks; computer hardware; computer security appliances, network security appliances, and unified threat management (UTM) appliances, namely, computer hardware and software for detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer data, computer networks, and mobile devices; virtual computer security appliances and virtual network security appliances, namely, virtual machine images emulating computer hardware and software for detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer data, computer networks, and mobile devices
NAVISHARE
NAVISHARE
Trademark
Word
ABANDONED
Owner:
Serial:85959405
Filed:Jun 13, 2013
Classes:9
TREND MICRO LONGEVITY
CANCELLED
Owner:
Serial:85558086
Filed:Mar 1, 2012
Classes:9
Registration:4505917
Registered:Apr 1, 2014
Goods & Services
"LONGEVITY"
LIVEALL
LIVEALL
Service Mark
Word
ABANDONED
Owner:
Serial:85494547
Filed:Dec 13, 2011
Classes:39
SAFESYNC
SAFESYNC
Service Mark
Word
CANCELLED
Owner:
Serial:85416924
Filed:Sep 7, 2011
Classes:39
Registration:4380663
Registered:Aug 6, 2013
TREND MICRO NAS SECURITY
REGISTERED
Owner:
Serial:85078634
Filed:Jul 6, 2010
Classes:9
Registration:4183775
Registered:Jul 31, 2012
Goods & Services
"NAS SECURITY"
TITANIUM
TITANIUM
Trademark
Word
CANCELLED
Owner:
Serial:77906437
Filed:Jan 6, 2010
Classes:9
Registration:4561715
Registered:Jul 8, 2014
Goods & Services
Class 009: computer, data, and network security software; computer antivirus and content security software; computer utility software; malicious code and content screening software; anti-spam, anti-fraud, and anti-phishing computer software; computer software for monitoring, filtering, and reporting messages, files, programs and data retrieved or received from computer and communication networks; computer software for use in scanning, detecting, quarantining, eliminating, blocking and reporting on viruses, worms, trojans, spyware, adware, malware, security exploits, bots and unauthorized data and programs on computers, electronic devices, and handheld and mobile computing and communication devices; computer software for use in detecting viruses, worms, trojans, spyware, adware, malware, security exploits, bots and unauthorized data and programs on computers and electronic devices; web browser security add-on software, namely, computer software for protecting web browser users from malicious, untrustworthy and unwanted content and programs; computer software for ensuring the security of wireless communications; computer software for the authentication of wireless internet access points; computer software for remotely securing data and files in the event of theft; electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of computer and network security; computer software to protect the confidentiality of data and passwords; computer software for protecting the integrity of data, computers, computer software, and mobile computing and communication devices from viruses, worms, trojans, spyware, adware, malware and unauthorized access
VIZOR
VIZOR
Trademark
Word
ABANDONED
Owner:
Serial:77659988
Filed:Jan 30, 2009
Classes:9
VIPS
VIPS
Trademark
Word
ABANDONED
Owner:
Serial:77327375
Filed:Nov 12, 2007
Classes:9
SECURECLOUD
SECURECLOUD
Trademark
Word
CANCELLED
Owner:
Serial:77238820
Filed:Jul 25, 2007
Classes:9
Registration:4115127
Registered:Mar 20, 2012
INTERCLOUD
INTERCLOUD
Trademark
Word
ABANDONED
Owner:
Serial:77018125
Filed:Oct 10, 2006
Classes:9
TREND
TREND
Trademark
Word
ABANDONED
Owner:
Serial:77013017
Filed:Oct 3, 2006
Classes:9
TRENDSECURE
TRENDSECURE
Trademark
Word
ABANDONED
Owner:
Serial:78942699
Filed:Aug 1, 2006
Classes:9, 42, 45
Goods & Services
Class 009: computer software for use in masking data entry and keystrokes; computer software for use in identity and password protection; computer anti-virus software; malicious code and malicious content screening software; computer security software; computer software for use in scanning, detecting, quarantining and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer utility software; computer software for use in repairing damage from viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Class 042: computer services, namely, online scanning, detecting, quarantining and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; providing temporary use of non-downloadable software for scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer virus protection services; providing online computer databases in the fields of computer software, computer and data security and computer system management; providing information relating to computer software, computer and data security and computer system management via the Internet and other computer and communications networks; provision of information relating to viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices via the Internet and other computer and communications networks; technical consultation in the field of computers, computer systems, computer software, and computer and communication networks; technical support services, namely, troubleshooting of computer hardware and software problems via telephone and electronic mail; services in the nature of detecting and removing computer viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs and threats; Class 045: scanning and monitoring of computer systems and data for security purposes; providing information in the fields of computer viruses, computer hardware and software applications in security; providing enterprise security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computers, computer data, computer software products and computer networks; computer network security services, namely, intrusion detection services
DEEP SECURITY
DEEP SECURITY
Trademark
Word
REGISTERED
Owner:
Serial:78624597
Filed:May 6, 2005
Classes:9
Registration:3388819
Registered:Feb 26, 2008
Goods & Services
Computer software for protecting computers, computer servers, computer applications, computer data, and databases | Training in the field of computer security | Monitoring of computer systems for protection purposes; consulting in the field of computer systems security
B
B
Trademark
Stylized
CANCELLED
Owner:
Serial:78622708
Filed:May 4, 2005
Classes:9
Registration:3212311
Registered:Feb 27, 2007
THIRD BRIGADE
THIRD BRIGADE
Trademark
Word
CANCELLED
Owner:
Serial:78622614
Filed:May 4, 2005
Classes:9
Registration:3223962
Registered:Apr 3, 2007
HOUSECALL
HOUSECALL
Service Mark
Word
CANCELLED
Owner:
Serial:78576970
Filed:Feb 28, 2005
Classes:42
Registration:3274247
Registered:Aug 7, 2007
XCARBON
XCARBON
Trademark
Word
Previous
REGISTERED
Owner:
Serial:97679601
Filed:Nov 16, 2022
Classes:9, 42
Registration:7657154
Registered:Jan 21, 2025
Goods & Services
Downloadable cybersecurity application software for smartphones for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs), and analyzing, detecting and responding to automotive threats; downloadable cybersecurity software; downloadable computer software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable computer software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit security software; downloadable computer utility software, namely, computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer utility programs for performing computer maintenance; downloadable computer software for creating firewalls; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer anti-virus software to protect and to enhance confidentiality of data; downloadable computer anti-virus software to protect or to restore the perfect condition of data, computers, computer software, and computer network; downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable cybersecurity software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable cybersecurity software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable cybersecurity software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit cybersecurity software; downloadable intrusion detection software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); Updating of computer security software via computer and communication networks; computer programming for others in the field of cybersecurity; updating of computer software, namely, pattern files for detecting computer viruses; update of computer security software for others; design, creation, and maintenance of information processing systems for use with computers in the field of cybersecurity; provision of information relating to design, creation, and maintenance of information processing systems for use with computers in the field of cybersecurity; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security, computer network security and vehicle and automobile security; provision of information about computer security technology via website; provision of technological information about computers in the field of cybersecurity; provision of technological information about computer security software via website; provision of technological information about computer security software; updating of computer software relating to computer security and prevention of computer risks; platform as a service (PaaS) featuring computer security software
XNEXUS
XNEXUS
Trademark
Word
Previous
REGISTERED
Owner:
Serial:97679559
Filed:Nov 16, 2022
Classes:9
Registration:7575285
Registered:Nov 26, 2024
Goods & Services
Downloadable cybersecurity application software for smartphones for protection of vehicles, computers, in-vehicle computer network security, computer data, and vehicle security operations centers (VSOCs), and analyzing, detecting and responding to automotive threats; downloadable cybersecurity software; downloadable computer software for protection of vehicles, computers, in-vehicle computer network security, computer data, and vehicle security operations centers (VSOCs); downloadable computer software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable computer software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit security software; downloadable computer utility software, namely, computer security software for protection of vehicles, computers, computer data, and vehicle security operations centers (VSOCs); downloadable computer utility programs for performing computer maintenance; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer software to backup and to restore data; downloadable computer anti-virus software to protect and to enhance confidentiality of data; downloadable computer anti-virus software to protect or to restore the perfect condition of data, computers, computer software, and in-vehicle computer networks for securing vehicles; downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computers, computer security, data security, and vehicle security; downloadable cybersecurity software for protection of vehicles, computers, in-vehicle computer network security, computer data, and vehicle security operations centers (VSOCs); downloadable cybersecurity software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable cybersecurity software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit cybersecurity software; downloadable intrusion detection software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of vehicles, computers, in-vehicle computer network security, computer data, and vehicle security operations centers (VSOCs); none of the aforementioned goods being in relation to computer networking switches, data center switches, unified fabric switches, and computer networking software | Provision of software as a service (SAAS) services for securing computers, data, and in-vehicle computer network security; provision of temporary use of on-line non-downloadable computer programs for platform construction for provision of SaaS application; design and maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, in-vehicle network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs and data that were retrieved and received from computers and in-vehicle computer network security; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; updating of computer software via computer and communication networks; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line nondownloadable software for limitation of access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of online, non downloadable anti-virus computer programs and information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of online non-downloadable computer antivirus software; research and analysis of computer viruses; provision of information relating to research and analysis of computer virus; advice relating to research and analysis of computer virus; updating of computer software, namely, pattern files for detecting computer viruses; update of computer software for others; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, maintenance of computer programs; provision of information relating to design, creation, maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and in-vehicle computer network updating for securing vehicles; information processing by computers in the field of data security, and vehicle and automobile security; testing and research on computer programs; product testing and product research on machine and apparatus; provision of information about computer technology via website; provision of technological information about computers; information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; software as a service (SAAS)services featuring computer security software; platform as a service (PaaS) featuring computer security software; none of the aforementioned services being in relation to computer networking switches, data center switches, unified fabric switches, and computer networking software
XSCOPE
XSCOPE
Trademark
Word
Previous
REGISTERED
Owner:
Serial:97679584
Filed:Nov 16, 2022
Classes:42
Registration:7436427
Registered:Jul 9, 2024
Goods & Services
Downloadable cybersecurity application software for smartphones for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs), and analyzing, detecting and responding to automotive threats; downloadable cybersecurity software; downloadable computer software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable computer software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit security software; downloadable computer utility software, namely, computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer utility programs for performing computer maintenance; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer anti-virus software to protect and to enhance confidentiality of data; downloadable computer anti-virus software to protect or to restore the perfect condition of data, computer, computer software, computer network; downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable cybersecurity software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable cybersecurity software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable cybersecurity software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit cybersecurity software; downloadable intrusion detection software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs) | Provision of software as a service (SAAS) services for securing computers, data, and computer networks; provision of temporary use of on-line non-downloadable computer programs for platform construction for provision of SaaS application; design and maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; updating of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for limitation of access to protect data; on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of online, non-downloadable anti-virus computer programs and information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of online non-downloadable computer antivirus software; research and analysis of computer viruses; provision of information relating to research and analysis of computer virus; advice relating to research and analysis of computer virus; updating of computer software, namely, pattern files for detecting computer viruses ; update of computer software for others; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, maintenance of computer programs; consultancy relating to design, creation, maintenance of computer programs; provision of information relating to design, creation, maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security, computer network security and vehicle and automobile security; technological advice and consultancy regarding performance and operation of computers, computer systems and software in automobiles and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; testing and research on computer programs; product testing and product research on machine and apparatus; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; platform as a service (PaaS) featuring computer security software
XZETA
XZETA
Trademark
Word
Previous
REGISTERED
Owner:
Serial:97679611
Filed:Nov 16, 2022
Classes:42
Registration:7436428
Registered:Jul 9, 2024
Goods & Services
Downloadable cybersecurity application software for smartphones for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs), and analyzing, detecting and responding to automotive threats; downloadable cybersecurity software; downloadable computer software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable computer software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit security software; downloadable computer utility software, namely, computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer utility programs for performing computer maintenance; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer software to backup and to restore data; downloadable computer anti-virus software to protect and to enhance confidentiality of data; downloadable computer anti-virus software to protect or to restore the perfect condition of data, computer, computer software, computer network; downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable cybersecurity software for computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable cybersecurity software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable cybersecurity software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit cybersecurity software; downloadable intrusion detection software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs) | Provision of software as a service (SAAS) services for securing computers, data, and computer networks; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; updating of computer software via computer and communication networks; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus ; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for limitation of access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of online, non-downloadable anti-virus computer programs and information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of online non-downloadable computer antivirus software; updating of computer software, namely, pattern files for detecting computer viruses; update of computer software for others; design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security, computer network security and vehicle and automobile security; testing and research on computer programs; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) services featuring computer security software; platform as a service (PaaS) featuring computer security software
V
V
Trademark
Combined
Previous
REGISTERED
Owner:
Serial:97650357
Filed:Oct 27, 2022
Classes:42
Registration:7575264
Registered:Nov 26, 2024
Goods & Services
Downloadable cybersecurity application software for smartphones for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs), and analyzing, detecting and responding to automotive threats; downloadable cybersecurity software; downloadable computer software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable computer software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit security software; downloadable computer utility software, namely, computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer utility programs for performing computer maintenance; downloadable computer software for creating firewalls; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer software to backup and to restore data; downloadable computer anti-virus software to protect and to enhance confidentiality of data; downloadable computer anti-virus software to protect or to restore the perfect condition of data, computers, computer software, and computer networks; downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable cybersecurity software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable cybersecurity software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable cybersecurity software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit cybersecurity software; downloadable intrusion detection software; downloadable firewall software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs) | Provision of software as a service (SAAS) services for securing computers, data, and computer networks; provision of temporary use of on-line non-downloadable computer programs for platform construction for provision of SaaS application; design and maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; updating of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for limitation of access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of online, non-downloadable anti-virus computer programs and information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of online non-downloadable computer antivirus software; research and analysis of computer viruses; provision of information relating to research and analysis of computer virus; advice relating to research and analysis of computer virus; installation of computer programs; updating of computer software, namely, pattern files for detecting computer viruses; update of computer software for others; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, maintenance of computer programs; consultancy relating to design, creation, maintenance of computer programs; provision of information relating to design, creation, maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security, computer network security and vehicle and automobile security; technological advice and consultancy regarding performance and operation of computers, computer systems and software in automobiles and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; testing and research on computer programs; product testing and product research on machine and apparatus; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) services featuring computer security software; platform as a service (PaaS) featuring computer security software
VICONE
VICONE
Trademark
Word
Previous
REGISTERED
Owner:
Serial:97600590
Filed:Sep 21, 2022
Classes:42
Registration:7575235
Registered:Nov 26, 2024
Goods & Services
Downloadable cybersecurity application software for smartphones for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs), and analyzing, detecting and responding to automotive threats; downloadable cybersecurity software; downloadable computer software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable computer software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit security software; downloadable computer utility software, namely, computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer utility programs for performing computer maintenance; downloadable computer software for creating firewalls; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer software to backup and to restore data; downloadable computer anti-virus software to protect and to enhance confidentiality of data; downloadable computer anti-virus software to protect or to restore the perfect condition of data, computers, computer software, and computer networks; downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable cybersecurity software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable cybersecurity software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable cybersecurity software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit cybersecurity software; downloadable intrusion detection software; downloadable firewall software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs) | Provision of software as a service (SAAS) services for securing computers, data, and computer networks; provision of temporary use of on-line non-downloadable computer programs for platform construction for provision of SaaS application; design and maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; updating of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for limitation of access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of online, non-downloadable anti-virus computer programs and information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of online non-downloadable computer antivirus software; research and analysis of computer viruses; provision of information relating to research and analysis of computer virus; advice relating to research and analysis of computer virus; installation of computer programs; updating of computer software, namely, pattern files for detecting computer viruses; update of computer software for others; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, maintenance of computer programs; consultancy relating to design, creation, maintenance of computer programs; provision of information relating to design, creation, maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security, computer network security and vehicle and automobile security; technological advice and consultancy regarding performance and operation of computers, computer systems and software in automobiles and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; testing and research on computer programs; product testing and product research on machine and apparatus; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) services featuring computer security software; platform as a service (PaaS) featuring computer security software
STELLARENFORCE
STELLARENFORCE
Trademark
Word
Previous
REGISTERED
Owner:
Serial:90601560
Filed:Mar 24, 2021
Classes:9
Registration:6842218
Registered:Sep 13, 2022
Goods & Services
Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things ("IOT") security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable computer software for whitelisting, approving and trusting other software, hardware and peripherals; downloadable computer software for blocking and blacklisting other software, hardware and peripherals; downloadable computer software for scanning, monitoring, verifying and permitting or blocking other computer software, hardware and peripherals; downloadable computer software for monitoring, segmenting and locking down data, computers, computer hardware, and network endpoints
STELLARPROTECT
STELLARPROTECT
Trademark
Word
Previous
REGISTERED
Owner:
Serial:90601548
Filed:Mar 24, 2021
Classes:9
Registration:6842217
Registered:Sep 13, 2022
Goods & Services
Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things ("IOT") security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable anti-virus software; downloadable anti-malware software; downloadable computer software for Industrial Control Systems (ICS) application inventory monitoring and management; downloadable computer software for scanning for, detecting, identifying, and blocking malware, security threats and security breaches; downloadable computer software for patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software for providing virus and malware pattern updates
STELLARONE
STELLARONE
Trademark
Word
Previous
REGISTERED
Owner:
Serial:90597977
Filed:Mar 23, 2021
Classes:9
Registration:6836474
Registered:Sep 6, 2022
Goods & Services
Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things ("IOT") security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable anti-virus software; downloadable anti-malware software; downloadable computer software for Industrial Control Systems (ICS) application inventory monitoring and management; downloadable computer software for scanning for, detecting, identifying, and blocking malware, security threats and security breaches; downloadable computer software for patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software for providing virus and malware pattern updates; downloadable computer software for whitelisting, approving and trusting other software, hardware and peripherals; downloadable computer software for blocking and blacklisting other software, hardware and peripherals; downloadable computer software for scanning, monitoring, verifying and permitting or blocking other computer software, hardware and peripherals; downloadable computer software for monitoring, segmenting and locking down data, computers, computer hardware, and network endpoints
EDGEIPS
EDGEIPS
Trademark
Word
Previous
REGISTERED
Owner:
Serial:88699784
Filed:Nov 20, 2019
Classes:9
Registration:6278773
Registered:Feb 23, 2021
Goods & Services
computer hardware; downloadable computer security software; computer hardware, namely, firewalls; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, reporting on, patching and repairing security breaches in data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for monitoring data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for segmenting and protecting data, computers, computer and communication networks and network endpoints
TXONE
TXONE
Service Mark
Word
Previous
REGISTERED
Owner:
Serial:88696189
Filed:Nov 18, 2019
Classes:42
Registration:7191693
Registered:Oct 17, 2023
Goods & Services
Software as a service (SAAS) services featuring computer security software; providing online non-downloadable computer security software; software as a service (SAAS) services featuring computer firewall software; providing online non-downloadable computer firewall software; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer and network security policy management and enforcement; providing online non-downloadable software for computer and network security policy management and enforcement; software as a service (SAAS) services featuring computer software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for monitoring, segmenting and locking down data and computers; providing online non-downloadable software for monitoring, segmenting and locking down data and computers; software as a service (SAAS) services featuring computer software for securing industrial machinery, industrial control systems and manufacturing; providing online non-downloadable software for securing industrial machinery, industrial control systems and manufacturing; software as a service (SAAS) services featuring IOT security software; providing online non-downloadable IOT security software; software as a service (SAAS) services featuring security software for Industrial Control Systems (ICS); providing online non-downloadable security software for Industrial Control Systems (ICS); software as a service (SAAS) services featuring computer software for network and device security; providing online non-downloadable software for network and device security; software as a service (SAAS) services featuring virtual server software; providing online non-downloadable virtual server software; software as a service (SAAS) services featuring computer utility software; providing online non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for application whitelisting and blacklisting; providing online non-downloadable software for application whitelisting and blacklisting; software as a service (SAAS) services featuring computer software for providing virus and malware pattern updates; providing online non-downloadable software for providing virus and malware pattern updates; software as a service (SAAS) services featuring computer software for computer network management and configuration; providing online non-downloadable software for computer network management and configuration; software as a service (SAAS) services featuring computer software for managing computer hardware, switches and routers; providing online non-downloadable software for managing computer hardware, switches and routers; software as a service (SAAS) services featuring web consoles; providing online non-downloadable software, namely, web consoles; design and development of computer hardware and software; computer software consulting services; computer network consulting services; computer hardware consulting services; information technology consulting services; consulting services in the field of cloud computing; consulting in the field of cloud computing networks and applications; consulting services in the fields of computer software and software as a service; consulting services in the fields of computers, computer hardware, computer networks and network security; consulting services in the fields of industrial control systems and manufacturing computer hardware and software security, IOT security hardware and software; consultation in deploying and managing computer security hardware, software and network components; computer network and software consultation services for securing industrial machinery; custom configuration of computer software, computer hardware and computer networks; developing and deploying customized computer hardware and software in the fields of computer software, data and network security; technical support services, namely, troubleshooting and remediation of computer software, SAAS, computer hardware and network problems; technical support services, namely, computer network security incident response and remediation services; technical support services in the fields of computers, computer hardware, computer networks, network security and network architecture; technical support services in the fields of industrial control systems and manufacturing security, IOT security hardware and software; technical support services, namely, administration, management and updating of computers, computer hardware, computer software and computer networks; technical support services, namely, conducting onsite visits and review existing network environment, and consulting on computer network security and assisting with installation of computer hardware and software and network components; providing virtual computer systems and virtual computer environments through cloud computing; providing virtual security appliances, namely, virtual hardware and software for securing and protecting computers, computer hardware, industrial machinery and computer networks
TXONE
TXONE
Trademark
Word
Previous
REGISTERED
Owner:
Serial:88982467
Filed:Nov 18, 2019
Classes:9
Registration:6480137
Registered:Sep 7, 2021
Goods & Services
Computer hardware; computer networking hardware; computer hardware, namely, firewalls; downloadable computer security software; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software and hardware for monitoring, segmenting and locking down data and computers; downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; IOT security software; downloadable security software for Industrial Control Systems (ICS); web consoles; downloadable computer software for network and device security; downloadable virtual server software; downloadable computer utility software; downloadable computer software for application whitelisting and blacklisting; downloadable computer software for providing virus and malware pattern updates; downloadable computer software for computer network management and configuration; downloadable computer software for managing computer hardware, switches and routers; USB flash drives; portable computer security hardware; portable computer hardware, peripherals and USB drives containing computer security software, computer antivirus, anti-spam, anti-malware and anti-ransomware software; portable computer hardware, peripherals and USB drives containing computer software for use in scanning for, identifying, reporting and removing malware, viruses; computer peripherals; computer peripheral devices; computer network switches
TXONE NETWORKS
TXONE NETWORKS
Trademark
Combined
Previous
REGISTERED
Owner:
Serial:88982401
Filed:Nov 18, 2019
Classes:9
Registration:6472294
Registered:Aug 31, 2021
Goods & Services
Class 009: Computer hardware; computer networking hardware; computer hardware, namely, firewalls; downloadable computer security software; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software and hardware for monitoring, segmenting and locking down data and computers; downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; IOT security software; downloadable security software for Industrial Control Systems (ICS); web consoles; downloadable computer software for network and device security; downloadable virtual server software; downloadable computer utility software; downloadable computer software for application whitelisting and blacklisting; downloadable computer software for providing virus and malware pattern updates; downloadable computer software for computer network management and configuration; downloadable computer software for managing computer hardware, switches and routers; USB flash drives; portable computer security hardware; portable computer hardware, peripherals and USB drives containing computer security software, computer antivirus, anti-spam, anti-malware and anti-ransomware software; portable computer hardware, peripherals and USB drives containing computer software for use in scanning for, identifying, reporting and removing malware, viruses; computer peripherals; computer peripheral devices; computer network switches
TXONE NETWORKS
TXONE NETWORKS
Service Mark
Combined
Previous
REGISTERED
Owner:
Serial:88696402
Filed:Nov 18, 2019
Classes:42
Registration:7115642
Registered:Jul 18, 2023
Goods & Services
Class 042: software as a service (SAAS) services featuring computer security software; providing online non-downloadable computer security software; software as a service (SAAS) services featuring computer firewall software; providing online non-downloadable computer firewall software; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer and network security policy management and enforcement; providing online non-downloadable software for computer and network security policy management and enforcement; software as a service (SAAS) services featuring computer software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for monitoring, segmenting and locking down data and computers; software as a service (SAAS) services featuring computer software for securing industrial machinery, industrial control systems and manufacturing; providing online non-downloadable software for securing industrial machinery, industrial control systems and manufacturing; software as a service (SAAS) services featuring IOT security software; providing online non-downloadable IOT security software; software as a service (SAAS) services featuring security software for Industrial Control Systems (ICS); providing online non-downloadable security software for Industrial Control Systems (ICS); software as a service (SAAS) services featuring computer software for network and device security; providing online non-downloadable software for network and device security; software as a service (SAAS) services featuring computer utility software; providing online non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for application whitelisting and blacklisting; providing online non-downloadable software for application whitelisting and blacklisting; software as a service (SAAS) services featuring computer software for providing virus and malware pattern updates; providing online non-downloadable software for providing virus and malware pattern updates; software as a service (SAAS) services featuring computer software for computer network management and configuration; providing online non-downloadable software for computer network management and configuration; software as a service (SAAS) services featuring computer software for managing computer hardware, switches and routers; providing online non-downloadable software for managing computer hardware, switches and routers; software as a service (SAAS) services featuring web consoles; providing online non-downloadable software, namely, web consoles; design and development of computer hardware and software; custom configuration of computer software, computer hardware and computer networks; developing and deploying customized computer hardware and software in the fields of computer software, data and network security; technical support services, namely, troubleshooting and remediation of computer software, SAAS, computer hardware and network problems; technical support services, namely, computer network security incident response and remediation services; technical support services in the fields of computers, computer hardware, computer networks, network security and network architecture; technical support services in the fields of industrial control systems and manufacturing security, IOT security hardware and software
EDGEFIRE
EDGEFIRE
Trademark
Word
Previous
REGISTERED
Owner:
Serial:88615166
Filed:Sep 12, 2019
Classes:9
Registration:6323285
Registered:Apr 13, 2021
Goods & Services
computer hardware; downloadable computer security software; computer hardware, namely, firewalls; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, reporting on, patching and repairing security breaches in data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for monitoring data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for segmenting and protecting data, computers, computer and communication networks and network endpoints

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.