Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultation, namely, policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity computer software maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; computer security consultation, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security computer software maintenance services; data security consultation, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; computer security consultation, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer consultation, services, namely, endpoint detection and response to software and hardware threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall computer software security maintenance services; firewall security consultation, namely, security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; hardware security, namely, maintenance of computer hardware security systems; computer security consultation, namely, hardware security policy assessment; Technical support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security consultation, namely, security threat analysis for protecting data; computer security consultation, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber intrusions and threats; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network security consultation, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network security consultation, namely, policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; computer password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy; support services, namely, troubleshooting of computer software problems, troubleshooting of information technology (IT) security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing temporary use of online non-downloadable software for information technology (IT) security operations center management; software diagnostic services, namely, computer security threat analysis for protecting data; computer software maintenance services; information technology (IT) consultation for software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
Education Services in the nature of a competency-based learning platform in the nature of classes, workshops and seminars that enables learners to gain critical training and on-the-job training experience using methodologies, technologies, processes, and approaches in the fields of live-fire, real world monitoring of critical technology assets, namely, information technology (IT) security; Simulation-based training services in the field of cyber defense testing, namely, cyberwarfare exercises and information technology (IT) security operational training using sanitized data streams and structures; Training Services, namely, a live-fire Security Operations Center (SOC) that will provide 24x7x365 workforce development opportunities in the nature of classes, workshops and seminars by leveraging Security Clinic structures in the nature of monitoring, detection, response services for clientele
Class 009: Recorded computer software using artificial intelligence (AI) for cybersecurity risk management, continuous monitoring, and automated compliance with NIST Special Publication 800-53, NIST Special Publication 800-171, and FedRAMP requirements.
Class 042: Software as a service (SAAS) services, namely, hosting software for use by others for detecting and containing data breaches, monitoring computer systems to detect cybersecurity incidents, and restricting unauthorized access to computer systems, for use by Defense Industrial Base (DIB) companies
business consulting services, namely, providing assistance in promoting greater minority inclusion in the workforce and sourcing pipeline from minority business enterprises to support the needs of corporations and government entities; business services, namely, matching consumers, namely, minority business enterprises with computer security professionals offering corporate and governmental opportunities in the nature of computer security service contracts | educational services, namely, conducting workshops in the field of minority inclusion in the workforce and training to identify gaps on readiness for cyber security opportunities with corporations and governmental entities
Computer network security consultancy; Computer security threat analysis for protecting data; Computer services, namely, remote management of information technology (IT) systems of others comprised of Help Desk support, engineering projects, cyber security; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Engineering and system analysis in the field of home security systems; IT consulting services; IT integration services; Maintenance of computer software relating to computer security and prevention of computer risks; Testing of security systems
Computer network security consultancy; Computer security threat analysis for protecting data; Computer services, namely, remote management of information technology (IT) systems of others comprised of Help Desk support, engineering projects, cyber security; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Engineering and system analysis in the field of home security systems; IT consulting services; IT integration services; Maintenance of computer software relating to computer security and prevention of computer risks; Testing of security systems
Cybersecurity services in the nature of restricting unauthorized access to computer systems; IT integration services; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Computer network security consultancy; Computer services, namely, creating computer network-based indexes of information, websites and resources; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting in the field of IT project management; Creating and designing website based indexes of information for others using information technology; Creating website based indexes of information for others using information technology; Designing website based indexes of information for others using information technology; Development of security systems and contingency planning for information systems; Providing planning and engineering services in the field of information and communications networks; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technology consultation in the field of cybersecurity
Downloadable computer application software for phones, computers, tablets, namely, software for healthcare services, exchanging information in the field of employment opportunities and career placement; recruitment, careers, and job listings; providing an on-line searchable database featuring classified ad listings and employment opportunities; career networking services; Online computer services, namely, providing a website that offers the exchange of information in the field of employment, careers, personal issues related to careers and work life, and job resources; Providing a website featuring on-line classified advertisements in the field of healthcare;Online computer services, namely, providing a website that offers the exchange of information in the field of employment opportunities and career placement; recruitment, careers, and job listings; providing an on-line searchable database featuring classified ad listings and employment opportunities; career networking services; Online computer services, namely, providing a website that offers the exchange of information in the field of employment, careers, personal issues related to careers and work life, and job resources
Dishware; Jugs; Automated pet appliances, namely, litter boxes; Automatic soap dispensers; Bathroom fittings, namely, dispensing units for household purposes for dispensing hygienic wipes and lotions, not for medical purposes; Bottle openers, electric and non-electric; Cake servers; Cleaning brushes for household use; Coffee servers; Coffee services in the nature of tableware; Dinnerware, namely, plates, cups and saucers; Fruit presses, non-electric, for household purposes; Gloves for household purposes; Grooming tools for pets, namely, combs and brushes; Ice cube molds; Kitchen containers; Kitchen mitts; Oven mitts; Syringes for watering flowers and plants; Window cleaners in the nature of a combination squeegee and scrubber; Wine glasses; Bath accessories, namely, cup holders
Class 042: Software as a service (SAAS) services, namely, hosting software for use by others for Software as a service (SAAS) services, namely, hosting software for use by others for detecting and containing data breaches, monitoring computer systems to detect cybersecurity incidents, and restricting unauthorized access to computer systems, for use by DIB (Defense Industrial Base) companies
Computer technology support services, namely, help desk services; Technical support, namely, monitoring technological functions of computer network systems; Technology advice provided to Internet users by means of a support hotline; Technical support services, namely, troubleshooting of computer software problems; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems
Garments of outer clothing for men and women, namely shirts, blouses, jackets, trousers, jeans, skirts, sweaters, hats, scarves, pullovers, suits, dresses, jerseys, ties, and coats
Computer virus protection services; Computer security consultancy in the field of virus scanning software; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Providing temporary use of non-downloadable computer anti-virus software; Rental of humanoid robots with artificial intelligence; Rental of laboratory robots; Technical consulting in the field of monitoring technological functions of humanoid robots with artificial intelligence
Business marketing services, marketing advisory services, business marketing strategy development and business consulting services; brand imagery consulting services; brand concept and brand development services for corporate clients; providing marketing consulting in the field of social media, blogging, company branding, marketing content creation and website content; advertising and marketing services provided by means of indirect methods of marketing communications, namely, social media, search engine marketing, inquiry marketing, internet marketing, mobile marketing, blogging and other forms of passive, sharable or viral communications channels | Graphic design services; website design and development for others; creating and maintaining blogs for others
Cameras; Earphones; Headphones; Alarm monitoring systems; Batteries and battery chargers; Battery chargers; Data cables; USB cables; USB cables for cellphones; Video monitors
Class 009: Robotic exoskeleton suits worn by humans and controlled through intentional and autonomous control mechanisms for the purpose of enhancing the strength and endurance of the person wearing the suit and amplifying human bodily functions of the wearer; Class 010: Physical rehabilitation equipment designed for ambulation exercise; physical rehabilitation equipment designed for lower limb motion exercise; exercise machines worn by humans and controlled through intentional and autonomous control mechanisms for the purpose of enhancing and amplifying human bodily functions of the wearer for medical and rehabilitation purposes; Class 028: Sports equipment worn by humans and controlled through intentional and autonomous control mechanisms for the purpose of enhancing and amplifying human bodily functions of the wearer
Computer education training for employees, namely, cybersecurity training for employees through gamified training exercises for use in validating a business organization's incident response plan; "CYBER"
Computer security consultancy; Computer security threat analysis for protecting data; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity
Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Cybersecurity services in the nature of restricting unauthorized access to computer systems; IT consulting services; Computer programming consultancy in the field of cybersecurity services, penetration testing, red teaming, and offensive research; Maintenance of computer software relating to computer security and prevention of computer risks; Technology consultation in the field of cybersecurity
Mechanical and electrical interconnect systems comprised of computer hardware and electronic cables for electronic signal transmission to be used with keyboards and displays
On-line retail store services featuring apparel and edible mushrooms; Retail store services featuring apparel and edible mushrooms; Wholesale store services featuring apparel and edible mushrooms
Class 009: Downloadable software development kits (SDK); Downloadable workflow management software; Downloadable computer software using artificial intelligence (AI) for developing automation AI agents using a chatbot to automatically develop the code for the requested AI agent that will handle automated desktop tasks.; Class 042: Design and development of artificial intelligence (AI) software; Design and development of intelligence (AI) software for AI-assisted development of automation AI agents for desktop tasks, using a chatbot to automatically develop the code for the requested AI agent; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for creating AI agents for automation of desktop tasks using a chatbot.
Class 009: Downloadable software development kits (SDK); Downloadable workflow management software; Downloadable software development tools for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Downloadable computer software platforms for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Downloadable computer software using artificial intelligence (AI) for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Downloadable computer programs using artificial intelligence (AI) for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Class 042: Design and development of artificial intelligence (AI) software; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Design and development of computer software for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data; Design and development of intelligence (AI) software for development of artificial intelligence-driven agents based on user prompts; development of artificial intelligence-driven agents to perform automated tasks; development of artificial intelligence-driven agents to perform automated desktop tasks; development of artificial intelligence-driven agents to perform automated desktop tasks for processing of legacy data
Electronic blasting systems comprised of remote controlled wireless electronic transmitter and receiver devices and programmable electronic detonators used to detonate explosives; Electronic programmable blasting control devices and electronic blasting devices, namely, electronic controllers for detonators; downloadable computer software, namely, software for the use and operation of detonators or other instruments and tools used to ignite explosives or initiate explosive blasts and explosions | Electronic explosive blasting systems comprised of remote controlled wireless electronic delay detonators; devices initiating explosives, namely, detonators; Blasting systems for use in the blast hole comprised of blasting equipment in the nature of electronic delay detonators, detonator receiver antenna and booster unit, near field communication (NFC) programming tagger, transmitter antenna for transmitting electronic signals and blast control unit
3D scanners; Accumulators and batteries; Apparatus for converting electronic radiation to electrical energy, namely, photovoltaic roofing members; Apparatus for converting electronic radiation to electrical energy, namely, photovoltaic solar hybrid modules; Cameras; Cell phones; Computer hardware; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Photovoltaic cells and modules; Portable computers; Semi-conductors; Semiconductor chips; Semiconductor devices; Semiconductor testing apparatus; Semiconductor wafers
Incident response services, namely, consultancy for mitigating damage, in the nature of maintenance and repair of computer networks, from computer security breaches; Computer network security monitoring services, namely, monitoring computer systems and computer network systems for security purposes; Cybersecurity services, namely, restricting access to and by computer software and networks to and of undesired websites, media, software, individuals, facilities and malicious attackers; Incident response services, namely, technical support and consulting in the nature of diagnosing and investigating damage from computer security breaches; Malware analysis services, namely, technical support in the nature of remote and on-site troubleshooting for diagnosing intrusion incidents for computer hosts and computer network devices; software as a service (SaaS) for gathering threat intelligence designed to detect and defend against network security intrusions and investigate existing network security intrusions