Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Computer technology support services, namely, help desk services; Technical support, namely, monitoring technological functions of computer network systems; Technology advice provided to Internet users by means of a support hotline; Technical support services, namely, troubleshooting of computer software problems; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems
Computer virus protection services; Computer security consultancy in the field of virus scanning software; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Providing temporary use of non-downloadable computer anti-virus software; Rental of humanoid robots with artificial intelligence; Rental of laboratory robots; Technical consulting in the field of monitoring technological functions of humanoid robots with artificial intelligence
Garments of outer clothing for men and women, namely shirts, blouses, jackets, trousers, jeans, skirts, sweaters, hats, scarves, pullovers, suits, dresses, jerseys, ties, and coats
Business marketing services, marketing advisory services, business marketing strategy development and business consulting services; brand imagery consulting services; brand concept and brand development services for corporate clients; providing marketing consulting in the field of social media, blogging, company branding, marketing content creation and website content; advertising and marketing services provided by means of indirect methods of marketing communications, namely, social media, search engine marketing, inquiry marketing, internet marketing, mobile marketing, blogging and other forms of passive, sharable or viral communications channels | Graphic design services; website design and development for others; creating and maintaining blogs for others
Class 009: Recorded computer software using artificial intelligence (AI) for cybersecurity risk management, continuous monitoring, and automated compliance with NIST Special Publication 800-53, NIST Special Publication 800-171, and FedRAMP requirements.
Class 042: Software as a service (SAAS) services, namely, hosting software for use by others for detecting and containing data breaches, monitoring computer systems to detect cybersecurity incidents, and restricting unauthorized access to computer systems, for use by Defense Industrial Base (DIB) companies
Education Services in the nature of a competency-based learning platform in the nature of classes, workshops and seminars that enables learners to gain critical training and on-the-job training experience using methodologies, technologies, processes, and approaches in the fields of live-fire, real world monitoring of critical technology assets, namely, information technology (IT) security; Simulation-based training services in the field of cyber defense testing, namely, cyberwarfare exercises and information technology (IT) security operational training using sanitized data streams and structures; Training Services, namely, a live-fire Security Operations Center (SOC) that will provide 24x7x365 workforce development opportunities in the nature of classes, workshops and seminars by leveraging Security Clinic structures in the nature of monitoring, detection, response services for clientele
Providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultation, namely, policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity computer software maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; computer security consultation, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security computer software maintenance services; data security consultation, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; computer security consultation, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer consultation, services, namely, endpoint detection and response to software and hardware threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall computer software security maintenance services; firewall security consultation, namely, security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; hardware security, namely, maintenance of computer hardware security systems; computer security consultation, namely, hardware security policy assessment; Technical support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security consultation, namely, security threat analysis for protecting data; computer security consultation, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber intrusions and threats; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network security consultation, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network security consultation, namely, policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; computer password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy; support services, namely, troubleshooting of computer software problems, troubleshooting of information technology (IT) security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing temporary use of online non-downloadable software for information technology (IT) security operations center management; software diagnostic services, namely, computer security threat analysis for protecting data; computer software maintenance services; information technology (IT) consultation for software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
Cameras; Earphones; Headphones; Alarm monitoring systems; Batteries and battery chargers; Battery chargers; Data cables; USB cables; USB cables for cellphones; Video monitors
[ Ashtrays for smokers; ] Cigarette cases; Cigarette filters; [ Cigarette holders; ] Electronic cigarettes; Flavourings, other than essential oils, for use in electronic cigarettes; Lighters for smokers [ ; Liquid nicotine solutions for use in electronic cigarettes; Matches; Tobacco pouches ]
Buckles of common metal; Metal boxes; Metal holders for signs; Metal hooks; Metal laths; Metal ropes; Metal water pipes; Portable metal buildings; Prefabricated metal buildings; Wrought iron decorative artwork; "ADU"
3D scanners; Accumulators and batteries; Apparatus for converting electronic radiation to electrical energy, namely, photovoltaic roofing members; Apparatus for converting electronic radiation to electrical energy, namely, photovoltaic solar hybrid modules; Cameras; Cell phones; Computer hardware; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Photovoltaic cells and modules; Portable computers; Semi-conductors; Semiconductor chips; Semiconductor devices; Semiconductor testing apparatus; Semiconductor wafers
Providing internet-based education and information services related to information risk management, namely, providing on-line classes in the field of information technology and information security risk management, fraud prevention, data breach prevention and response, and compliance, privacy and security technology all for information security and risk management professionals
Automobiles and structural parts therefor; Marine equipment, namely, anti-surfing/broaching drogues and parts and fittings therefor; Parts of motorcycles, namely, brake cables; Brake linings for vehicles; Aftermarket automobile accessories, namely, arm rests for vehicle seats; Antenna toppers, namely, attachments to the tips of automobile antennas; Cigarette lighters for automobiles; Electrically-powered motor scooters
Radiotherapy apparatus; isotope apparatus used for medical diagnosis and treatment, namely, gamma knife; isotope device for the treatment of hyperthyroidism, tumors and cancers by means of nuclear radiation; medical ultrasound equipment; radiological apparatus for medical purposes; lasers for medical purposes; patient x-ray radiation shields; computer displays used in direct association with medical diagnosis apparatus during the process of diagnosis of a condition in an individual; x-ray tubes for medical purposes; apparatus and installations for the production of x-rays, for medical purposes; x-ray apparatus for medical purposes; diagnostic apparatus for medical purposes, namely, nuclear medicine diagnostic imaging apparatus, x-ray diagnostic apparatus.
Earphones; Smartphones; Biometric fingerprint door locks; Digital photo frames; Electric door bells; Electric light dimmers; Electric sensors; Electric switches; TV cameras; Video cameras; Video projectors
Photovoltaic plastic film for solar cells, namely, semi-finished plastic films to be used in solar or photovoltaic modules; uv-resistant plastic film for solar power substrate, namely, uv-resistant semi-finished plastic films to be used in solar or photovoltaic modules; adhesive tapes, other than stationery and not for medical or household purposes; self-adhesive tapes, other than stationery and not for medical or household purposes; insulating film; insulating bands; plastic film, other than for wrapping, namely, heat reflective plastic film to be applied to windows, plastic films for electrical insulation; artificial resins, semi-processed; adhesive coated plastic film for solar cell, namely, adhesive coated semi-finished plastic films to be used in solar or photovoltaic modules; plastic film for solar power generation substrate, namely, semi-finished plastic films to be used in solar or photovoltaic modules
Tyres for vehicle wheels; bicycle tyres; solid tyres for vehicle wheels; automobile tyres; tubeless tyres for bicycles; electric bicycles; electric cars; self-balancing twowheeled electric scooters; electric scooters, namely, electric mobility scooters; electric vehicles, namely, electrically powered aircrafts
Computer programming and computer system analysis; Computer and computer software rental; Computer programming and maintenance of computer programs; Computer programming and rental of computer programs; Computer software design, computer programming, and maintenance of computer software; Computer code conversion for others; Computer programming; Computer programming and software design; Computer programming consultancy; Computer programming for others; Computer programming services; Computer security consultancy; Computer services, namely, creating computer network-based indexes of information, websites and resources; Computer services, namely, creating, maintaining, designing and implementing web sites for others; Computer services, namely, data recovery services; Computer services, namely, encrypted data recovery services; Computer services, namely, managing web sites for others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, on-site management of information technology (IT) systems of others; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design; Computer software design and updating; Computer software design for others; Computer software development and computer programming development for others; Computer software installation and maintenance; Computer software rental; Computer technology consultancy; Computer virus protection services; Consultancy in the field of software design; Consulting in the field of information technology; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of software as a service (SAAS); Creating and designing website based indexes of information for others using information technology; Creating and maintaining web sites for others; Creating of computer programs; Creating, designing and maintaining web sites; Creation and maintenance of web sites for others; Data security consultancy; Data conversion of electronic information; Data encryption and decoding services; Data encryption services; Design and development of computer software; Design and development of electronic data security systems; Design and maintenance of web sites for others; Design and writing of computer software; Design, creation, hosting, maintenance of websites for others; Design, development, installation and maintenance of computer software; Design, installation, updating and maintenance of computer software; Design, maintenance, development and updating of computer software; Design, updating and rental of computer software; Design, upgrading and rental of computer software; Designing and creating web sites for others; Designing website based indexes of information for others using information technology; Developing and updating computer software; Developing computer software; Duplicating computer programs; Hosting internet sites for others; Hosting of digital content on the Internet; Hosting of web sites; Hosting the web sites of others; Hosting websites on the Internet; Information technology consulting services; Installation and maintenance of computer software; Installation of computer software; Installation, repair and maintenance of computer software; Installing computer programs; Internet security consultancy; Internet-based application service provider, namely, hosting, managing, developing, analyzing, and maintaining the code, applications, and software for web sites of others; IT consulting services; Maintenance and updating of computer software; Maintenance and upgrading of computer software; Maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems by remote access to ensure proper functioning; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems to detect breakdowns; Recovery of computer data; Remote computer backup services; Remote online backup of computer data; Rental and maintenance of computer software; Rental of computer software; Rental of computer software and programs; Rental of computers and software; Rental of web servers; Renting computer software; Renting out hardware and software; Server hosting; Services for maintenance of computer software; Technical advice relating to operation of computers; Technical advisory services relating to computer programs; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting of computer software problems; Up-dating of computer software; Updating and maintenance of computer software; Updating of computer software; Updating of computer software for others; Updating of computer software relating to computer security and prevention of computer risks; Updating, design and rental of software; Web site hosting services; Website design and development for others; Website design consultancy
Body butter; Hair care creams; Lotions for face and body care; Shea butter for cosmetic purposes; Body lotion; Body lotions; Facial lotion; Hair care lotions; Shaving lotion; Sun-block lotions
Green lentils, dried vegetables and fruits, namely, lentils, beans chickpeas, split peas, mushrooms; and red fruits, namely, cranberries, blueberries, and cherries; Unprocessed quinoa
PLASTIC PACKAGING AND CONTAINERS FOR FOOD PRODUCTS; PLASTIC SERVING TRAYS; PLASTIC SERVING UTENSILS, NAMELY, SERVING FORKS, SERVING SPOONS, AND SERVING TONGS; PLASTIC EATING PLATES; AND PLASTIC SERVING BOWLS AND LIDS SOLD AS A UNIT FOR FOOD SERVICE
Soup mixes; soups; soups and preparations for making soups | Dry seasoning mixes for Hispanic style foods; flavourings and seasonings; food seasonings; seasoning mixes; seasonings