Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Downloadable computer antivirus software; recorded computer antivirus software; computer networking hardware; downloadable computer operating system program; recorded computer operating system program; downloadable computer operating system software; recorded computer operating system software; downloadable computer software for encryption; recorded computer software for encryption | Telecommunication services, namely, computer communications services for the transmission of information; computer intercommunication being electronic transmission of data and documents among users of computers, providing private and secure real time electronic communication over a computer network | Computer aided scientific research services; computer engineering being computer design services, LAN/WAN design; computer hardware and software design; computer hardware development; computer programming; computer programming and maintenance of computer program; computer programming and software design; computer security services for protection against illegal network access; computer security services in the nature of administering digital certificates; computer security threat analysis for protecting data; computer software engineering; computer system design; computer systems development
Cases for smartphones; Cases for mobile phones; Cell phone cases; Headphone cases; Laptop carrying cases; Carrying cases for cell phones; Protective cases for cell phones; Protective cases for laptop computers; Protective cases for tablet computers
Plastics for use in the building and construction industry, namely, ballistic polycarbonate sheets; thermoplastic sheets and materials for use in the building and construction industry, namely, ballistic polycarbonate sheets; polycarbonate sheet glass for building; protective plastic panels for use in the building and construction industry; protective plastic panels for use in building public or commercial spaces; ballistic-grade polycarbonate sheets for building; plastics having security glazing, namely ballistic polycarbonate sheets; industrial ballistic polycarbonate sheets for building; thermoplastic sheets for building non-metal protective barriers and shields; thermoplastic sheets having safety glazing for building; non-metal building panels incorporating acoustic insulation; Plastic reinforced wall panels for use as sound and safety barriers; thermoplastic sheets for building prisons and detention centers, banks, kiosks, ticket booths and drive-up windows
Class 009: COMPUTER PERIPHERAL DEVICES, NAMELY, ACCELERATORS AND ENCRYPTOGRAPHIC ACCELERATORS FOR DATA SECURITY; COMPUTER SOFTWARE, NAMELY, ENCODED COMPUTER PROGRAMS AND FIRMWARE FOR ENCRYPTION, DECRYPTION, SIGNING, AND VERIFICATION OF DIGITAL SIGNATURES FOR USE WITH THE ABOVE-NAMED DEVICES
Back support devices, namely, back support cushions not for medical purposes, portable back supports for use with chairs and pillows for use as back rests
Technical consulting in the field of cyber security risk management training | Cyber security protection support and services, namely, computer, internet, and data security consultancy, computer security threat analysis for protecting data, network security assessment, cyber security risk management, cyber vulnerability assessment, testing of cyber security systems, and cyber security remediation, namely, repair of computer software and operating systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy in the field of assessing security risks associated with electronic storage and transmission of healthcare information; technical support services, namely, installation of, monitoring of alerts generated by, and technical support in the nature of administration and management of third party software for continually monitoring and responding to mitigate cyber threats; technical support services, namely, installation of, monitoring of alerts generated by, and technical support in the nature of administration and management of third party anti-virus software; technical support services, namely, installation of, monitoring of alerts generated by, and technical support in the nature of administration and management of third party software for computer network security, content filtering, blocking access to malicious websites, detecting and preventing network intrusions and malware, and for controlling and managing network security policies and user access; technical support services, namely, installation of, monitoring of alerts generated by, and technical support in the nature of administration and management of third party software for backup and recovery of databases and servers; technical support services, namely, installation of, monitoring of alerts generated by, and technical support in the nature of administration and management of third party software for protection of computers from malicious programs; technical support services, namely, installation of, monitoring of alerts generated by, and technical support in the nature of administration and management of third party software for authenticating user identification; technical support services, namely, installation of, monitoring of alerts generated by, and technical support in the nature of administration and management of third party software for filtering and encryption of email; technical support services, namely, installation of, monitoring of alerts generated by, and technical support in the nature of administration and management of third party software for backing up and archiving email; technical support services, namely, installation of, monitoring of alerts generated by, and technical support in the nature of administration and management of third party software for backing up and archiving data exchanges between computers; technical support services, namely, installation of, monitoring of alerts generated by, and technical support in the nature of administration and management of third party software for password and personal identity information access and management
Low frequency ultrasound device for application of acoustic energy to the human body for purposes of healing soft tissue and wounds, nerve regeneration and reducing pain
Over-the-counter antiparasitic and hygienic preparations, namely, medicated topical creams and ointments for external use in the management of pinworm-related symptoms and prevention of reinfestation.
Public relations consultancy; Consultancy regarding public relations communication strategies; Public relations; Consultancy regarding public relations communication strategies in the field of crisis management and communication; Public relations consultancy in the field of crisis management and communication; Public relations services in the field of crisis management and communication; "PR"
Providing a website featuring non-downloadable software for analyzing health insurance claims for potential fraudulent activities before claims are paid
[ FACE SHIELDS AND PROTECTIVE EYEWEAR, NAMELY, EYE GUARDS AND EYEWEAR GUARDS, ALL FOR GENERAL INDUSTRIAL AND COMMERCIAL USE AND FOR USE IN THE FIELDS OF HOME IMPROVEMENT, PAINTING AND CONSTRUCTION ]; HAND TOOLS, NAMELY, SPRAY GUARDS AND SHIELDS IN THE NATURE OF HAND HELD PORTABLE PAINT AND CONSTRUCTION MASKING DEVICE FOR A VARIETY OF COATINGS
Coating protectant in the nature of primer and finish for surfaces of playground structures, supports and other shaped sections, sports and fitness equipment, and other outdoor recreation products
Antimicrobial coating used to prevent the growth of mold, mildew, bacteria and fungus on item surfaces and textiles, but not for direct application to, or the treatment of, human beings