Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Computer network security consultancy; Computer security threat analysis for protecting data; Computer services, namely, remote management of information technology (IT) systems of others comprised of Help Desk support, engineering projects, cyber security; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Engineering and system analysis in the field of home security systems; IT consulting services; IT integration services; Maintenance of computer software relating to computer security and prevention of computer risks; Testing of security systems
Computer network security consultancy; Computer security threat analysis for protecting data; Computer services, namely, remote management of information technology (IT) systems of others comprised of Help Desk support, engineering projects, cyber security; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Engineering and system analysis in the field of home security systems; IT consulting services; IT integration services; Maintenance of computer software relating to computer security and prevention of computer risks; Testing of security systems
Class 009: Recorded computer software using artificial intelligence (AI) for cybersecurity risk management, continuous monitoring, and automated compliance with NIST Special Publication 800-53, NIST Special Publication 800-171, and FedRAMP requirements.
Class 042: Software as a service (SAAS) services, namely, hosting software for use by others for detecting and containing data breaches, monitoring computer systems to detect cybersecurity incidents, and restricting unauthorized access to computer systems, for use by Defense Industrial Base (DIB) companies
Providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultation, namely, policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity computer software maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; computer security consultation, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security computer software maintenance services; data security consultation, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; computer security consultation, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer consultation, services, namely, endpoint detection and response to software and hardware threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall computer software security maintenance services; firewall security consultation, namely, security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; hardware security, namely, maintenance of computer hardware security systems; computer security consultation, namely, hardware security policy assessment; Technical support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security consultation, namely, security threat analysis for protecting data; computer security consultation, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber intrusions and threats; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network security consultation, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network security consultation, namely, policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; computer password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy; support services, namely, troubleshooting of computer software problems, troubleshooting of information technology (IT) security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing temporary use of online non-downloadable software for information technology (IT) security operations center management; software diagnostic services, namely, computer security threat analysis for protecting data; computer software maintenance services; information technology (IT) consultation for software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
Education Services in the nature of a competency-based learning platform in the nature of classes, workshops and seminars that enables learners to gain critical training and on-the-job training experience using methodologies, technologies, processes, and approaches in the fields of live-fire, real world monitoring of critical technology assets, namely, information technology (IT) security; Simulation-based training services in the field of cyber defense testing, namely, cyberwarfare exercises and information technology (IT) security operational training using sanitized data streams and structures; Training Services, namely, a live-fire Security Operations Center (SOC) that will provide 24x7x365 workforce development opportunities in the nature of classes, workshops and seminars by leveraging Security Clinic structures in the nature of monitoring, detection, response services for clientele
business consulting services, namely, providing assistance in promoting greater minority inclusion in the workforce and sourcing pipeline from minority business enterprises to support the needs of corporations and government entities; business services, namely, matching consumers, namely, minority business enterprises with computer security professionals offering corporate and governmental opportunities in the nature of computer security service contracts | educational services, namely, conducting workshops in the field of minority inclusion in the workforce and training to identify gaps on readiness for cyber security opportunities with corporations and governmental entities
Cybersecurity services in the nature of restricting unauthorized access to computer systems; IT integration services; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Computer network security consultancy; Computer services, namely, creating computer network-based indexes of information, websites and resources; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting in the field of IT project management; Creating and designing website based indexes of information for others using information technology; Creating website based indexes of information for others using information technology; Designing website based indexes of information for others using information technology; Development of security systems and contingency planning for information systems; Providing planning and engineering services in the field of information and communications networks; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technology consultation in the field of cybersecurity
Downloadable computer application software for phones, computers, tablets, namely, software for healthcare services, exchanging information in the field of employment opportunities and career placement; recruitment, careers, and job listings; providing an on-line searchable database featuring classified ad listings and employment opportunities; career networking services; Online computer services, namely, providing a website that offers the exchange of information in the field of employment, careers, personal issues related to careers and work life, and job resources; Providing a website featuring on-line classified advertisements in the field of healthcare;Online computer services, namely, providing a website that offers the exchange of information in the field of employment opportunities and career placement; recruitment, careers, and job listings; providing an on-line searchable database featuring classified ad listings and employment opportunities; career networking services; Online computer services, namely, providing a website that offers the exchange of information in the field of employment, careers, personal issues related to careers and work life, and job resources
Dishware; Jugs; Automated pet appliances, namely, litter boxes; Automatic soap dispensers; Bathroom fittings, namely, dispensing units for household purposes for dispensing hygienic wipes and lotions, not for medical purposes; Bottle openers, electric and non-electric; Cake servers; Cleaning brushes for household use; Coffee servers; Coffee services in the nature of tableware; Dinnerware, namely, plates, cups and saucers; Fruit presses, non-electric, for household purposes; Gloves for household purposes; Grooming tools for pets, namely, combs and brushes; Ice cube molds; Kitchen containers; Kitchen mitts; Oven mitts; Syringes for watering flowers and plants; Window cleaners in the nature of a combination squeegee and scrubber; Wine glasses; Bath accessories, namely, cup holders
Aquarium lights; Bicycle lights; Electric bulbs; Electric torches for lighting; Flashlights; Germicidal lamps for purifying air; Headlights for automobiles; Lamp casings; Lamp mantles; Light bulbs; Lighting apparatus for vehicles; Lighting apparatus, namely, lighting installations; Lighting installations for vehicles; Lights for vehicles; Luminous house numbers; Pocket searchlights; Rear lights for vehicles; Searchlights; Ultraviolet ray lamps, not for medical purposes; Vehicle headlights
Computer software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Computer anti-virus software; Computer hardware, namely, firewalls; Computer programs for network management; Computer software for the creation of firewalls
Entertainment services, namely, an ongoing television program in the field of professional wrestling; Entertainment services, namely, the production of professional wrestling events and organizing exhibitions of professional wrestling events for entertainment purposes, all rendered through broadcast media, namely, television and distributed via various platforms across multiple forms of transmission media; Providing wrestling news and information through broadcast media, namely, television and distributed via various platforms across multiple forms of transmission media; Providing sports and entertainment information through broadcast media, namely, television and distributed via various platforms across multiple forms of transmission media; Providing a website featuring entertainment information in the field of sports
Educational services, namely, providing training, classes, workshops, seminars, and internships in the fields of information technology, computer science, computer programming, cybersecurity, information security, big data, data analytics, software development, computer coding, web design, web development, application development, mobile application and data mining
Computer services, namely, filtering of unwanted email; online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; development of security systems and contingency planning for information systems; computer technology support services, namely, help desk services; computer technical support services, namely, service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technical support services, namely, selection, installation, maintenance, and operation anti-virus software for others
Computer programs and software and downloadable computer programs and software, in particular security software for detecting illegal attacks from the Internet and protecting against illegal attacks from the Internet; sound storage media, namely, blank digital storage media; data processing devices, namely, data processing apparatus and computers; Design and development of computer software; Information technology [IT] consultancy; IT security, protection and restoration; vulnerability analysis of networks and software applications for third parties; technical support and consulting services related to security and vulnerability of networks and software applications for third parties, and creation of computer programs for protection against illegal access to networks and software applications; scientific and technological services, namely, analysis, testing, and scientific research in the field of computer hardware and software security; industrial analysis and research services in the field of computer hardware and software security; technical support in the field of software, namely, troubleshooting of computer software problems
TRANSPORTATION OF GOODS, CARGO HANDLING AND FREIGHT SERVICES ALL VIA TRUCK, TRAIN, BOAT AND AIR, ADVISORY AND INFORMATION SERVICES RELATING TO THE AFORESAID SERVICES, NAMELY, TRANSPORTATION INFORMATION SERVICES IN THE FIELD OF PICKUP, TRACKING AND DELIVERY OF GOODS, FREIGHT AND CARGO PROVIDED ON-LINE VIA GLOBAL COMPUTER NETWORKS FROM A COMPUTER OR THE INTERNET
Providing online music, not downloadable; Providing online non-downloadable videos in the field of music; Entertainment services, namely, providing non-downloadable playback of music via global communications networks; Entertainment services in the nature of live musical performances; Audio recordings featuring music; Downloadable music files; Digital music downloadable from the Internet; Audio and video recordings featuring music and artistic performances
Class 041: Entertainment in the nature of e-sports competitions; Entertainment services, namely, contest and incentive award programs designed to reward program participants who participate in cyber games, cybersecurity competitions, and cybersecurity games, cybersecurity tournaments, and cybersecurity competitions; Organization of sports competitions; Organizing, conducting and operating cyber games, cybersecurity competitions, and cybersecurity tournaments and competitions; Providing training in the field of cybersecurity, cyber games, cybersecurity games, and cybersecurity tournaments, and cybersecurity competitions
Radiotherapy apparatus; isotope apparatus used for medical diagnosis and treatment, namely, gamma knife; isotope device for the treatment of hyperthyroidism, tumors and cancers by means of nuclear radiation; medical ultrasound equipment; radiological apparatus for medical purposes; lasers for medical purposes; patient x-ray radiation shields; computer displays used in direct association with medical diagnosis apparatus during the process of diagnosis of a condition in an individual; x-ray tubes for medical purposes; apparatus and installations for the production of x-rays, for medical purposes; x-ray apparatus for medical purposes; diagnostic apparatus for medical purposes, namely, nuclear medicine diagnostic imaging apparatus, x-ray diagnostic apparatus.
Class 007: Electrically-powered steam cleaning device comprising a hose and nozzle and a vapor-producing chamber that is attached to a water source; Portable rotary steam presses for fabrics; Steam cleaning machine parts, namely, suction nozzles, brushes, and hoses; Multi-purpose steam cleaners; Cleaning appliances utilizing steam; Steam cleaners for household purposes; Steam cleaning machines in the nature of steam mops
"CYBER"; Cybersecurity and IT consulting services, namely, remote electronic monitoring services for securing and protecting data and information from unauthorized access; computer security consultancy; computer security consultancy in the field of assessing information security vulnerability; computer security threat analysis for protecting data
Technical evaluations concerning design (engineers' services); scientific research; technical research; design of computers for third parties; computer development; software design; software development; research and development of new products for third parties; conducting of technical project studies; architecture; software development (design); software installation; maintenance of software; updating of software; software rental; programming for computers; computer system analysis; computer system design; services provided by consultants relating to computer hardware design and development; digitization of documents; software as a service (SAAS); cloud computing; information technology (IT) consultancy; hosting of servers; motor vehicle roadworthiness testing; graphic arts design services; electronic data storage.
Software for medical decision support systems; software enabling cancer diagnosis; software in the medical field.; Indicators for medical diagnosis; diagnostic preparations for medical use; diagnostic preparations for medical use; diagnostic agents for medical use.; Medical diagnosis services; medical analysis services for cancer diagnosis; medical testing for the diagnosis and treatment of persons; medical analysis services for cancer diagnosis and prognosis; medical services.; Testing instruments for use in medical diagnosis; diagnostic apparatus for medical use; apparatus for conducting diagnostic tests for medical use.
Class 007: Weeding machines; Electronically and power-operated tools, namely, pullers and components therefor, nut splitters, extractors, separators, spanners and coil spring compressors; Electric ice crushers; Automatic electrostatic-paint sprayers; Electric pumps; Drycleaning machines; Electric juicers; Power-operated coffee grinders; Electric vacuum cleaners; Electric food blenders; Dish washing machines; Solar-powered electricity generators; Can openers, electric; Dishwashers; Electric washing machines for household purposes
Humidifiers; Air conditioners; Air purifiers; Ice cube making machines; Portable air conditioners; Portable electric fans; Portable refrigerators; Portable utility lights; Radiators, electric; Water purifying apparatus
Inverters; Batteries, electric; Chargers for electric batteries; Charging appliances for rechargeable equipment; Charging stations for electric vehicles; Electric cables, wires, conductors and connection fittings therefor; Mobile phone cases featuring rechargeable batteries; Photovoltaic cells; Renewable battery system to provide backup power; Solar panels for the production of electricity