Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Class 005: Medicaments for protection of skin against infection, which allow breathability and moisture retention provided through use of a protective, elastic polymer film that permits oxygen to pass through to the tissue below, while protecting against infection and relieving pain, itching, burning and local irritations of any type of injury
Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in field- or column-specific data protection and masking
[ On-site refueling services for vehicles and equipment; ] on-site maintenance and repair services for vehicles and equipment, such as construction equipment; "FLEET" AND "SERVICES"
Exterior metal shutters; Metal window shutters; Shutters of metal; Metal roll shutters; Metal rolling window shutters; Exterior metal shutters for building; Rolling window shutters of metal; Metal components for metal protective and security window shutters, namely, slats, shutterboxes, side frames, end caps, crank handles, pull straps, side tracks, ball bearings and installation hardware, namely, rollers, rails, cables, carriers, pins, locks, clips, brackets and screws
Computer software, namely, software for railcar data management systems for monitoring the maintenance, usage, location, railcar tracing, compliance inspections, regulatory inspections, customer inspections and user manuals distributed therewith
Software as a service (SAAS) services featuring software for monitoring, securing, and protecting the integrity of computer hardware, computer networks, software applications, websites, and data from malicious attacks and unauthorized access; Software as a service (SAAS) services featuring software for detecting and preventing fraudulent digital and electronic financial transactions and payments
Repair and maintenance services for oil and gas well drilling equipment; rental of oil and gas well drilling equipment; rental of oil and gas well drilling tools
Computer software licensing services; [ Security services, namely, providing executive protection; Security guard services; ] Compliance services, in the nature of regulatory compliance consulting in the field of cyber security regulations and internet legal regulations; Compliance services, namely, legal compliance auditing and regulatory compliance auditing; Identity information services in the nature of verification of personal identity as part of personal background investigations; Device protection services, namely, monitoring of cloud security monitoring, cloud breach detection and computer systems monitoring both cloud and on-premises for protecting personal property; Information technology services, namely, technical support services consisting of troubleshooting in the nature of diagnosing computer hardware and software problems, IT infrastructure consulting; Design and development of computer hardware and software; Computer programming services, maintenance and updating of computer software; Computer software consulting services; Computer security consulting services; Computer programming consulting services; Cloud computing services, namely, providing temporary use of on-line nondownloadable cloud computing software for use in productivity management, use in user identity, use in Cyber Range Simulation, and use in artificial intelligence; Managed application software service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software and web sites of others in the fields of cyber security; Computer cyber security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Identity information services in the nature of electronic signature verification services using technology to authenticate user identity; Proactive computer security attack prevention services and management namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials