Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
152 resultsfor "OPTEAVA"
Refine results
Filed
Registered
Last Activity
Clickto monitor
Filters
Match Type
1
151
Status
133
19
0
0
134
18
TTAB
0
0
152
13
1
6
1
13
7
4
3
3
2
2
2
2
2
2
Goods & Services
Pharmaceutical preparations for human use for the treatment and prevention of [ obesity, diabetes, incontinence, cardiovascular diseases, central nervous system diseases and disorders, metabolic disorders, stroke, ] cancer [, inflammation and inflammatory diseases, respiratory and infectious diseases, auto-immune diseases, solid organ transplant rejection; pharmaceutical preparations for human use, namely, antibiotics, anti-fungals, anti-virals, immunosuppressants and pharmaceutical antibodies ]
Goods & Services
Pharmaceutical preparations for human use for the treatment and prevention of [ obesity, diabetes, incontinence, cardiovascular diseases, central nervous system diseases and disorders, metabolic disorders, stroke, ] cancer [ inflammation and inflammatory diseases, respiratory and infectious diseases, auto-immune diseases, solid organ transplant rejection; pharmaceutical preparations for human use, namely, antibiotics, anti-fungals, anti-virals, immunosuppressants and pharmaceutical antibodies ]
Goods & Services
Software as a service (SAAS) services featuring software for securely deploying, migrating, hosting and updating software applications in the cloud; Software as a service (SAAS) services featuring software for software application and computing systems integration; Software as a service (SAAS) services featuring software for IT and cloud security; Providing temporary use of non-downloadable cloud-based software for securely deploying, migrating, hosting and updating software applications in the cloud; Providing temporary use of non-downloadable cloud-based software for software application and computing systems integration; Providing temporary use of non-downloadable cloud-based software for IT and cloud security; Cloud migration services in the nature of data migration services and migration of computer software to the cloud for others; IT integration services and consulting services in the field of cloud computing and integration; Design and development of computer software; Technical support services, namely, troubleshooting of computer software problems
Owner:
Serial:79406479
Filed:Aug 25, 2024
Classes:9, 35, 41, +1
Registration:8081594
Registered:Dec 30, 2025
Goods & Services
Computer-based simulation training services in the field of business management; conducting seminars, webinars and training in the field of business management; education and training in the fields of employment and professional development; educational services, namely, development and provision of educational courses in the fields of computer software training; training support services for others, namely, assisting customers with the production and delivery of online training courses.; Computer chatbot software for simulating conversations; computer programming software for the integration of artificial intelligence and machine learning in the field of big data for business data analytics and user behavior analytics; computer programs for language translations and training; computer software for use in customer relationship management (CRM).; Business management of outsourcing; customer relationship management; customer service in the field of airline reservations; customer service in the field of computer servicing; customer service management; outsourcing services in the field of business operations; outsourcing services in the field of customer relationship management; providing an online marketplace for buyers and sellers of goods and services.; Providing non-downloadable computer software development tools in the field of artificial intelligence; providing temporary use of on-line non-downloadable software for the development of machine learning in the field of computer technology; providing temporary use of online non-downloadable chatbot software for replying to questions from online customers related to consumer goods; providing temporary use of online non-downloadable computer chatbot software for simulating conversations; software as a service (SAAS) featuring non-downloadable computer software for the integration of artificial intelligence and machine learning in the field of Big Data for business data analytics and user behavior analytics; software as a service (SAAS) featuring non-downloadable computer software to train computers to predict user behaviour in the field of machine learning models and artificial intelligence; software as a service (SaaS) provider in the field of customer relationship management; software as a service (SaaS) provider in the field of providing customer relations management; software as a service (saas) services featuring software for applications for the management and provision of customer relationship management; software as a Service (SAAS) services featuring software for customer relationship management; software as a service (saas) services featuring software for enabling users to communicate, collaborate, and share computer screens among each other via the internet; software as a service (SAAS) services featuring software for use in connection with buying, selling, downloading, customizing, integrating and reviewing computer applications and computer software; technical support in the nature of troubleshooting to diagnose computer software problems.
Goods & Services
Downloadable mobile applications for weight reduction diet planning services, weight management services, namely, providing weight loss and/or weight maintenance programs
Goods & Services
Reusable plastic water bottles sold empty | Frozen, prepared or packaged meals consisting primarily of meat, fish, poultry or vegetables; dietary foods, namely, fruit-based and nut-based meal replacement bars; soy-based food bars; soy-based food bars also containing dried fruits, chocolate or nuts; shakes; milk shakes; soy based shakes; dairy-based powdered mixes for making dairy-based shakes; food and beverages, namely, stews, soups, soup mixes, chili, soy based snack foods | Frozen, prepared or packaged entrees consisting primarily of pasta or rice; macaroni and cheese; dietary foods, namely, chocolate-based and cereal-based meal replacement bars; puddings; oatmeal; breakfast cereals; pancakes; pancake mixes; pancake syrup; ready to eat, cereal derived food bars; muffins and muffin mixes; breads and bread mixes; brownies and brownie mixes; cookies and cookie mixes; cakes and cake mixes; crackers; beverages made of tea; beverages with a coffee, tea or cocoa base; iced teas; cocoa drinks, cappuccino drinks, chai latte drinks | Whey beverages; smoothies; low calorie, non-dairy powdered mixes for making shakes and smoothies; low calorie powdered mix used in the preparation of soft drinks and fruit-flavored, tea-flavored, and coffee-flavored beverages; fruit-flavored beverages | Weight reduction diet planning services, weight management services, namely, providing weight loss and/or weight maintenance programs; supervision services in the fields of weight reduction, diet planning, and weight management; consultation services in the fields of weight reduction, diet planning, and weight management; counseling services in the fields of weight reduction, diet planning, and weight management; health care services, namely, wellness programs comprising diet regimes; providing a website featuring information about weight management
Goods & Services
Reusable plastic water bottles sold empty | Frozen, prepared or packaged meals consisting primarily of meat, fish, poultry or vegetables; dietary foods, namely, fruit-based and nut-based meal replacement bars; soy-based food bars; soy-based food bars also containing dried fruits, chocolate or nuts; shakes; milk shakes; soy based shakes; dairy-based powdered mixes for making dairy-based shakes; food and beverages, namely, stews, soups, soup mixes, chili, soy based snack foods | Frozen, prepared or packaged entrees consisting primarily of pasta or rice; macaroni and cheese; dietary foods, namely, chocolate-based and cereal-based meal replacement bars; puddings; oatmeal; breakfast cereals; pancakes; pancake mixes; pancake syrup; ready to eat, cereal derived food bars; muffins and muffin mixes; breads and bread mixes; brownies and brownie mixes; cookies and cookie mixes; cakes and cake mixes; crackers; beverages made of tea; beverages with a coffee, tea or cocoa base; iced teas; cocoa drinks, cappuccino drinks, chai latte drinks | Whey beverages; smoothies; low calorie, non-dairy powdered mixes for making shakes and smoothies; low calorie powdered mix used in the preparation of soft drinks and fruit-flavored, tea-flavored, and coffee-flavored beverages; fruit-flavored beverages | Weight reduction diet planning services, weight management services; supervision services in the fields of weight reduction, diet planning, and weight management; consultation services in the fields of weight reduction, diet planning, and weight management; counseling services in the fields of weight reduction, diet planning, and weight management; health care services, namely, wellness programs comprising diet regimes; providing information via a web site, namely, information and electronic publications on weight management
Goods & Services
Chemicals for use in the industry; Additives or admixtures for cement and cementitious compositions or their manufacture; chemical additives or admixtures used in the production of cement or mineral compositions, including for improving the quality of the cement or mineral compositions; chemical additives or admixtures for grinding of cement, cementitious materials, limestone, or other inorganic materials; chemical additives for modifying one or more properties of cement, cementitious materials, limestone, or other inorganic materials; liquid chemical compositions which function as a grinding aid, quality improver, or pack set inhibitor for cement, or combination thereof, such as for Portland cement or Portland cement precursor materials; chemical agents used for facilitating ball mill, vertical mill, or roller-based grinding operations
Goods & Services
parts for motor vehicles, namely, brake rotors, brake drums, disc brake pads and hardware therefor, brake shoes [, wheel bearings, wiper blades, master cylinders, power brake boosters, axles and remanufactured calipers, repair kits and clutch repair kits comprised of caliper dust boot, caliper seal, brake pad clips and bushings ]
Goods & Services
Class 042: Remote monitoring service which tracks hardware performance and processes and sends out historical reports and alerts related to automated teller machines
Goods & Services
Providing temporary use of online non-downloadable software and applications for task and project management, task and project tracking, resource management, human resources management, document management, customer relationship management, business management, time, costs and financial tracking, employee performance tracking and rating, for transmission and receipt of data, images, and messages used in sharing information, collaboration and interactive discussions, namely, sharing information, collaboration and interactive discussions for social networking purposes, for customizing computer application user interfaces, for sending and receiving electronic messages, and uploading and transferring files
Goods & Services
[ Burglar alarm installation and repair; Maintenance and repair of telecommunications and computer networking hardware, apparatuses, and instruments ] | [ Telecommunication services, namely, wireless telephone services consisting of transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the internet; ] Providing access to telecommunication networks [ and infrastructure ] ; Data transmission and reception services on optical telecommunication networks; Internet service provider services; Providing voice communication services via the internet; Telecommunication services, namely, providing internet access via broadband optical or wireless networks; [ Television broadcasting consisting of cable and satellite transmission services; ] Digital network telecommunications services; Wireless broadband communication services; Telecommunications services, namely, [
wireless telephony and ] wireless broadband communications services for the transmission of voice and data; wireless broadcasting
Goods & Services
Apparatus for recording, transmission or reproduction of sound and images; [ blank magnetic data carriers; televisions; television screens; ] display screens, namely, flat panel display screens and [ fluorescent screens, ] LCD large screen displays [, touch screens, video screens; projectors, namely, LCD projectors, media projectors, multimedia projectors, photographic projectors, movie feature projectors, slide projectors, sound projectors, video projectors, and projector screens ] | [ Apparatus for heating, namely, electric radiators for heating buildings, electric space heaters, electric radiant heaters for household purposes, portable electric heaters, electric storage heaters for commercial use, electric space heaters; electric heating fans; ventilation, namely, air-conditioning, air cooling and ventilation apparatus and instruments ]
Goods & Services
Software for connecting, operating, collecting data and managing data for networked loading dock management systems comprised of air duct systems, fans, loading dock warning systems and safety equipment, loading dock levelers and lifts, loading dock seals, barriers, locks, vehicle restraints, loading dock shelters, industrial doors and controls in the internet of things (IoT); microcontrollers for internet of things (IoT) enabled devices; Providing temporary use of non-downloadable cloud-based software for connecting, operating, collecting data and managing data for networked loading dock management systems comprised of air duct systems, fans, loading dock warning systems and safety equipment, high speed doors, loading dock levelers and lifts, loading dock seals, barriers, locks, vehicle restraints and loading dock shelters; providing on-line non-downloadable software for connecting, operating, collecting data and managing data for networked loading dock management systems comprised of air duct systems, fans, loading dock warning systems and safety equipment, loading dock levelers and lifts, loading dock seals, barriers, locks, vehicle restraints, loading dock shelters, industrial doors and controls in the internet of things (IoT)
Goods & Services
medical devices for use in the field of gastroenterology, namely, barrels for holding ligating bands at the operational end of an endoscopic device for use in ligating lesions within the gastrointestinal tract
Goods & Services
Class 009: Fiber optic connectors; Fiber optic patch cables; Optical fiber distribution frames; Optical fiber splice enclosures; Optical connectors; Cable management systems for use in telecommunications and data center equipment, namely, fiber optic cable organizers, frames, and trays; Computer hardware for telecommunications, data center, and networking applications, namely, high-density fiber optic cross-connect devices; Signal identification devices for use with fiber optic networks, namely, visual fault locator-compatible tracer fiber systems; Closures specially adapted for splicing and terminating fiber optic cables; fiber optic splice closure kits comprised of trays specially adapted for splicing fiber optics, and also including enclosure domes and bases, clamps, o-rings, gel sealing blocks, cable port plugs, tray towers, and cable retention hardware; fiber optic splicing accessories, namely, splice trays, multi-cable sealers, mounting hardware, slack storage baskets, splitters and multiplexers; Components for fiber optic connector assemblies, namely, plug connectors, plug inserts in the nature of a device to retain and secure fiber optic termini in plug connectors, receptacle connectors, receptacle insert in the nature of a device to retain and secure fiber optic termini in receptacle connectors, alignment inserts in the nature of a device to align mating fiber optic connectors, fiber optic termini in the nature of a device used to terminate, position and hold an optical fiber within a connector, alignment sleeves in the nature of a device used to secure, align and position fiber optic termini, cable strength member captivation components in the nature of a device to retain and secure fiber optic cables; fiber optic cable; fiber optic cable assemblies, namely, fiber optic connectors and fiber optic cable; Telecommunications equipment, namely, fiber-optic transceivers, fiber optic repeaters, converters and optimizers, wave division multiplexers, free-space opt; Telecommunications multiplexers; Multiplexers

Goods & Services
Business and education training services, namely, providing leadership development, team building, and personal, professional, group, and executive coaching services in the field of business; Developing printed educational materials for others in the fields of leadership development, team building and coaching; Business education and training services, namely, developing customized leadership development programs

Goods & Services
Financial planning and investment advisory services; Financial planning consultation; Financial planning for retirement; Financial planning, namely, creating personalized investment strategies for achieving specific financial goals; Financial portfolio management; Financial services, namely, assisting others with the completion of financial transactions for stocks, bonds, securities and equities; Financial services, namely, wealth management services; Insurance brokerage; Insurance information and consultancy; Investment management of and distribution of annuities; Investment of funds; Management of securities portfolios

Goods & Services
Software as a service (SAAS) services featuring software for users to access leadership development, team building, and coaching services; Software as a service (SAAS) services featuring software for users to access educational materials in the fields of leadership development, team building and coaching services; Software as a service (SAAS) services featuring software for users to set, track, and manage goals and progress in the fields of leadership development, team building and coaching services

Goods & Services
Class 009: Downloadable software for monitoring and managing industrial machinery; downloadable software for industrial machinery maintenance monitoring; Class 042: Platform as a service (PAAS) featuring computer software platforms for monitoring and managing industrial machinery; Platform as a service (PAAS) featuring computer software platforms for industrial machinery maintenance monitoring

Goods & Services
Business and education training services, namely, providing leadership development and personal, professional, group, and executive coaching services in the field of business; developing printed educational materials for others in the field of leadership development and coaching; business education and training services, namely, developing customized leadership development programs

Goods & Services
Software as a service (SAAS) services featuring software for users to access leadership development and coaching services; software as a service (SAAS) services featuring software for users to access educational materials in the field of leadership development; software as a service (SAAS) services featuring software for users to set, track, and manage goals and progress in the field of leadership development

Goods & Services
N
Managed digital, online, computer and electronic device service provider services, namely remote monitoring and management of
servers, computers, electronic devices, workstation devices and electronic infrastructure for asset discovery, endpoint
management, patching, monitoring, automation and ensuring optimal performance and security; Anti-virus and cloud anti-virus
services, namely, firewall services in the nature of computer virus, malware and hacker protection services, content filtering,
mobile web browsing and providing real-time anti-virus and malware updates and monitoring of servers, computers, electronic
devices, workstation devices and electronic infrastructure for virus, malware and hacker threats and confirming of the integrity of
websites and social networking websites with respect to computer viruses, malwares, hacker and other digital threats; identity
protection services, namely, computer security services for protecting data, images and information from unauthorized access;
sharing of digital files and folders solution services, namely, providing temporary use of on-line, non-downloadable software that
enables users to upload, share and download electronic files; Providing temporary use of on-line, non-downloadable software that
allows users to create, edit, transmit, exchange, share, upload, download, post, store, organize, display, tag, manage, collaborate
on, print and set permissions for or otherwise provide folders, files, images, graphics, sound, text, documents, messages, videos,
audio and other digital information; Remote system monitoring, management and support services for computer systems and
devices; troubleshooting of software problems; remote monitoring of computer systems by remote access to ensure proper
functioning; monitoring of computer system operation by remote access; Consulting services in the design and implementation of
computer systems; maintenance and updating of computing software for others; Cloud architecture and design, namely, design
and management services, namely, developing and managing cloud architecture; computer system design; computer software
version upgrade; remote online data backup; cloud off-site data backup; electronic daily remote data backup; computer data
recovery; computer software maintenance; computer program installation; advice on designing network infrastructure and systems
and computer systems; computer security guidance and advice; computer system monitoring to detect failures; data security
advice; Monitoring of unauthorized access to computer systems by remote access; remote monitoring of computer systems to
detect data leaks; electronic monitoring of personal identification information to detect theft of personal information via the
Internet; Design/creation/maintenance of computer virus intrusion prevention program; Software as a service (SAAS) services
featuring software for supervision, monitoring and filtering services of corporate emails; filtering of unwanted e-mails; Software as
a service (SAAS) application providing content monitoring of electronic mail and content filtering of electronic mail services; Mobile
web browsing, namely, web filtering to prevent access to undesirable content; Design, development, and maintenance of
database systems and cloud architecture; Computer technology support services, namely, help desk services; Computer technical
support services, namely, service or help desk services for IT infrastructure, operating systems, database systems, and web
applications; Technical support services, namely, remote and on-site infrastructure management services for monitoring,
maintaining, installing, administration and management of computer systems, servers, public and private cloud computing IT and
application systems, electronic messaging apparatuses and software applications; Computer services, namely, remote
management of information technology (IT) systems and infrastructure of others comprised of computer systems, servers,
electronic messaging apparatuses, and software applications; Consulting in the field of IT project management; IT consulting
services relating to installations, management, monitoring, maintenance and repair of computer software; Consulting in the field of
IT project management; IT consulting services relating to installations, management, monitoring, maintenance and repair of
computer hardware; Computer disaster recovery planning; Disaster recovery services, namely, business planning and business
continuity consulting; Remote computer backup services; remote online backup of computer data; Electronic storage of digital
data and images; Electronic storage of electronic media, namely, images, video, text and audio data; Installation, maintenance,
management, monitoring and repair of computer software, Internet access software, cloud computing software, server software,
network system software and mobile phone software; Repair of software; Repair of damaged computer programs; Technology
consulting services and design in the fields of computer architecture, cloud architecture, public and private cloud computer
solutions, and evaluation and implementation of internet technology and services; Outsource service provider in the field of
information technology relating to installation, maintenance, repair, selection and purchasing of computer software; Outsource
service provider in the field of information technology relating to installation, maintenance, repair, selection and purchasing of
computer hardware; Outsource service provider in the field of information technology consulting computer network design,
software threats, data backup and remote monitoring and management of servers, computer workstations, computers and other
electronic devices; Outsource service provider in the field of information technology relating to off-site management of computers
and servers of others, support in the nature of monitoring and consultations, design, engineering, security in the nature of
cybersecurity, virus, malware, hacks and other software threat protection and maintenance of network infrastructures and systems
including routers, network segmentation, switches, servers and wireless technology implementation; Outsource service provider in
the field of information technology relating to off-site management of computers and servers of others, support in the nature of
monitoring and consultations, design, engineering, security in the nature of virus, malware, hack and other software threat
protection and maintenance of office and cloud based network infrastructures and systems including routers, network
segmentation, switches, servers and wireless technology implementation; Outsourced chief information offer services, namely,
outsourced management services in the field of information technology, computer hardware and software operations and
maintenance, data backup, software threats and cybersecurity to others; Outsourced Information Technology Director services,
namely, outsourced management services in the field of information technology, computer hardware and software operations and
maintenance, data backup, software threats and cybersecurity to others; Information technology services, namely, outsourced
Chief Information Officer services in the nature of IT consulting services relating to installation, maintenance, monitoring, and
repair of computer software, data backup and software and computer threat protection; IT assessments in the nature of computer
system analysis, managed services in the nature of remote management of the IT systems of others; electronic data backup
services; disaster recovery services in the nature of computer disaster recovery planning and recovery of computer data; cloud
hosting provider services; cybersecurity services in the nature of computer security consultancy; data analytics services in the
nature of data mining; hardware and software support in the nature of diagnosing computer hardware and software problems;
Information technology and cybersecurity management, namely, On-site and remote management of information technology (IT)
systems and infrastructure of others, On-site and remote cybersecurity management of other's information technology (IT)
systems and infrastructure, Monitoring technological functions of computer network systems, Computer consultation in the field of
computer security, Consulting services in the field of design, selection, implementation and use of computer hardware and
software systems for others, none of the aforementioned services related to music, podcasts or entertainment.

Goods & Services
Food and beverage flavorings prepared from essential oils; food and beverage flavorings, being essential oils; food and beverage flavorings, being encapsulated essential oils | Glass encapsulated flavor enhancers for use in food and beverage products; flavorings for use in foods and beverages, other than essential oils; food and beverage flavorings, being non-essential oils

Goods & Services
Exfoliants for skin; Facial masks; Gels for skin, namely, age retardant gel and beauty gels; Non-medicated serums for use on skin; Non-medicated skin care preparations; Non-medicated skin creams; Non-medicated sun care preparations; Skin cleansers; Skin lotions

Owner:
Serial:86633787
Filed:May 18, 2015
Classes:9, 35, 37, +4
Registration:5161762
Registered:Mar 14, 2017
Goods & Services
computer software, namely, cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes [ ; computer hardware ] | value-added re-seller services, namely, distributorship services in the field of cyber security, computer security, network security, application security, data security and information technology software, hardware, and peripherals; employment staffing, namely, providing on-site and remote staffing to manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits in the field of computer security, computer network security, information security, data security and firewall security; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments | installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security | Providing an on-line forum for transmission of messages among information security personnel and experts concerning best practices for secure information technology infrastructures | security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security software and hardware, computer security software and hardware, network security software and hardware, and information technology software and hardware; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security | technology research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; computer services, namely, binary analysis services for computer security purposes and cyber security purposes; computer consulting services, namely, planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing software solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; computer consulting services, namely, implementation and integration of information technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, computer consultation services regarding desired performance levels and reasons for optimization, evaluating the health of computer systems, providing upgrades to computer systems, updating software, applying patches, and changing configurations; computer technical support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, electronic collection and analysis of real-time network information to manage and respond to security vulnerabilities and external threats; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; computer cloud security advisory services, namely, software consultation regarding cloud storage, cloud collaboration software platforms, and cloud hosted enterprise software applications; information technology vulnerability assessment services, namely, computer testing for assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; computer consultation, namely, information technology system security breach investigation and remediation services in the nature of providing assistance to isolate and remediate security threats and security breaches in computer systems and networks, in information technology applications, and in computer software and hardware; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technology consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud computing security; testing of computer software and computer networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; computer services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; providing an online, interactive website for information security personnel and experts to establish best practices for secure information technology infrastructures featuring technology that allows users to upload and share updates, news, white papers, and information regarding events in the field of secure information technology | compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing corporate and security policies, procedures and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security services, namely, providing information security risk assessments; security services, namely, providing security assessments for businesses and governmental agencies; security consultancy services; cyber security consultancy services; computer security threat analysis for mitigating and resolving cyber incidents and security breach incidents; computer security threat analysis services in the nature of analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; security threat analysis for protection of internet security

Owner:
Serial:86579559
Filed:Mar 27, 2015
Classes:9, 35, 37, +4
Registration:5161694
Registered:Mar 14, 2017
Goods & Services
Computer software, namely, cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes [ ; computer hardware ] | Value-added re-seller services, namely, distributorship services in the field of cyber security, computer security, network security, application security, data security and information technology software, hardware, and peripherals; employment staffing, namely, providing on-site and remote staffing to manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits in the field of computer security, computer network security, information security, data security and firewall security; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments | Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security | Providing an on-line forum for transmission of messages among information security personnel and experts concerning best practices for secure information technology infrastructures | Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security software and hardware, computer security software and hardware, network security software and hardware, and information technology software and hardware; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security | Technology research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; computer services, namely, binary analysis services for computer security purposes and cyber security purposes; computer consulting services, namely, planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing software solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; computer consulting services, namely, implementation and integration of information technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, computer consultation services regarding desired performance levels and reasons for optimization, evaluating the health of computer systems, providing upgrades to computer systems, updating software, applying patches, and changing configurations; computer technical support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, electronic collection and analysis of real-time network information to manage and respond to security vulnerabilities and external threats; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and Internet security breaches; computer cloud security advisory services, namely, software consultation regarding cloud storage, cloud collaboration software platforms, and cloud hosted enterprise software applications; information technology vulnerability assessment services, namely, computer testing for assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; computer consultation, namely, information technology system security breach investigation and remediation services in the nature of providing assistance to isolate and remediate security threats and security breaches in computer systems and networks, in information technology applications, and in computer software and hardware; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technology consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud computing security; testing of computer software and computer networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; computer services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; providing an online, interactive website for information security personnel and experts to establish best practices for secure information technology infrastructures featuring technology that allows users to upload and share updates, news, white papers, and information regarding events in the field of secure information technology | Compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing corporate and security policies, procedures and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security services, namely, providing information security risk assessments; security services, namely, providing security assessments for businesses and governmental agencies; security consultancy services; cyber security consultancy services; computer security threat analysis for mitigating and resolving cyber incidents and security breach incidents; computer security threat analysis services in the nature of analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; security threat analysis for protection of Internet security

Owner:
Serial:90203912
Filed:Sep 23, 2020
Classes:9, 35, 37, +4
Registration:6586181
Registered:Dec 14, 2021
Goods & Services
Downloadable and recorded computer software, namely, cyber security software; Downloadable and recorded computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware | value-added re-seller services, namely, distributorship services in the field of cyber security, computer security, network security, application security, data security and information technology software, hardware, and peripherals; employment staffing, namely, providing on-site and remote staffing to manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits in the field of computer security, computer network security, information security, data security and firewall security; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments | installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security | Providing an on-line forum for transmission of messages among information security personnel and experts concerning best practices for secure information technology infrastructures | security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security software and hardware, computer security software and hardware, network security software and hardware, and information technology software and hardware; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security | Technology research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; computer services, namely, binary analysis services for computer security purposes and cyber security purposes; computer consulting services, namely, planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing software solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; computer consulting services, namely, implementation and integration of information technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, computer consultation services regarding desired performance levels and reasons for optimization, evaluating the health of computer systems, providing upgrades to computer systems, updating software, applying patches, and changing configurations; computer technical support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, electronic collection and analysis of real-time network information to manage and respond to security vulnerabilities and external threats; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and Internet security breaches; computer cloud security advisory services, namely, software consultation regarding cloud storage, cloud collaboration software platforms, and cloud hosted enterprise software applications; information technology vulnerability assessment services, namely, computer testing for assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; computer consultation, namely, information technology system security breach investigation and remediation services in the nature of providing assistance to isolate and remediate security threats and security breaches in computer systems and networks, in information technology applications, and in computer software and hardware; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; providing technology consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud computing security; testing of computer software and computer networks relating to computer security and prevention of computer risks; design and development of electronic data security systems and contingency planning for information systems and computer network security; computer services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer security consultancy services, namely, remote and onsite management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer security consultancy services, namely, online scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security consultancy, namely, security audits of information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; providing an online, interactive website for information security personnel and experts to establish best practices for secure information technology infrastructures featuring technology that allows users to upload and share updates, news, white papers, and information regarding events in the field of secure information technology; computer security consultancy, namely, cyber security consultancy services; computer security consultancy, namely, computer security threat analysis for mitigating and resolving cyber incidents and security breach incidents; computer security consultancy, namely, computer security threat analysis services in the nature of analyzing and resolving cyber incidents and security breach incidents; computer security consultancy, namely, intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes; computer security consultancy, namely, user identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; computer security consultancy, namely, security threat analysis for protection of Internet security | compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing corporate and security policies, procedures and standards, to assure compliance with information security laws and regulations; physical security consultancy services, namely, providing security assessments and security risk assessments of physical locations; physical security consultancy services, namely, providing information security risk assessments for physical locations; physical security consultancy services, namely, providing security assessments for businesses and governmental agencies; physical security consultancy services; Physical security consultancy, namely, security audits of physical locations

Goods & Services
Computer software and hardware for processing billing information, customer service management, order fulfillment management, real-time rating and balance management of telecommunications, internet and cable and satellite transactions; computer software for operating billing payment systems in the field of telecommunications; computer software for making financial payment transaction via mobile devices; computer software for use in making online electronic financial payment transactions; computer hardware and software for making financial payment transaction via mobile devices; computer hardware and software for use in making online electronic financial payment transactions; downloadable cloud based or premises based software applications for operating billing systems of telecommunications companies; downloadable cloud based or premises based software applications for use by telecommunications and digital service providers for demonetization of digital services, namely, managing billing and settlement transactions, real time balance management, customer care management, order fulfillment orchestration, network policy management, analytics and real time revenue management | Provision of business management and administration assistance to telecommunications and digital service providers in the form of cloud based and/or premises based systems comprising computer software and hardware used for management of accounts receivable billing services, customer service management, customer care management, order fulfillment management, wholesale transactions between telecommunications carriers, namely the wholesale provision of mobile telecommunications airtime, real-time rating and balance management of telecommunications, internet and cable and satellite transactions | Providing electronic processing of bill payment data for telecommunications and digital service providers using cloud based and/or premises based systems comprising computer software and hardware; telecommunications reseller services, namely, wholesale telecommunication airtime brokerage services | Maintenance of computer hardware for others; consulting services provided to telecommunications services providers for computer hardware deployment and maintenance; consultation regarding the installation of computer hardware for application service providers, telecommunication product suppliers and telecommunication network operators | Provision of telecommunications information about billing, customer service management, order fulfillment management, real time rating and balance management. Telecommunications consultation on billing, customer service management, order fulfillment management, real time rating and balance management; on-line and on-site provision of information relating to telecommunications, namely, billing, customer service management, order fulfillment management, real time rating and balance management; information, consultation and advisory services in the field of telecommunications, namely, for billing, customer service management, order fulfillment management, real time rating and balance management; Electronic message collection and transmission for voice, video and data communications applications; Providing collection services for electronic voice, video and data communications applications; data communications services, namely, data mediation | Computer software design for others; computer software and hardware design for others; maintenance of computer software for others; computer software consulting and technical support in the nature of design, development, software installation, analysis or monitoring of technological functioning of computer network systems for application service providers, telecommunication product suppliers and telecommunication network operators; design and implementation for others of computer software for use in operating payment transaction systems for mobile or electronic payments; support, namely, monitoring technological functioning of software systems, and consultancy services provided to telecommunications service providers for software deployment and maintenance; consultation in the field of computer software and computer hardware design, development, software installation, analysis, configuration and providing technical support in the nature of troubleshooting and diagnosing computer software and hardware problems for application service providers, telecommunication product suppliers and telecommunication network operators; computer software diagnostic consulting services; computer software and computer hardware problem diagnostic consulting services; cloud based support and monitoring of computer systems to ensure proper technological functioning for data communication, satellite communication and telecommunications service providers; premises based support and monitoring of computer systems to ensure proper technological functioning for data communication, satellite communication and telecommunications service providers; technological services, namely, the provision of expert, professional and scientific consultancy, research, development, design and inspection services, all relating to telecommunications networks, infrastructure and systems, computer software and data mediation, computer hardware and software, data automation and collection services using proprietary software to evaluate, analyze and collect service data; application service provider (ASP) featuring software in the field of telecommunications for use in enabling the aggregation and distribution of customer usage data in the telecommunications, financial services and utilities fields; development of software applications for application service providers and mobile network operators to facilitate the delivery of services to end-users; consulting and maintenance of computer software for application service providers and mobile network operators to facilitate the delivery of services to end-users | Licensing of computer software
Save this search and get alerts for OPTEAVA
Free: 3 monitored marks, 1 watched owner, basic alerts
No credit card required





