Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Food processing apparatus, namely, commercial cooking ovens, dough provers, non portable coolers for cooling previously baked products and refrigerators, all for use in commercial food processing applications, and parts, and fittings for all of the previously stated goods
Metal concrete hardware for disposition within a pre-cured slurry layer of wet concrete for load transfer between adjacent slabs of the concrete layer once cured, namely, cylindrical non-threaded dowels and dowel baskets with no threaded fastener parts or thread-receiving fastener parts
Playing pieces in the nature of miniature action figures and toy model vehicles for use with table top hobby battle games in the nature of battle, war and skirmish games, and fantasy games; Tabletop hobby battle games in the nature of battle, war and skirmish games, and fantasy games, and playing equipment sold as a unit therewith
Entertainment services, namely, production and distribution of a television series and digital series featuring drama, suspense, action, adventure, comedy, and romance; entertainment services, namely, production and distribution of a game show television series; providing information about a television series; entertainment services in the nature of a game show television series; entertainment services in the nature of a television series in the fields of drama, suspense, action, adventure, comedy, and romance
Pre-recorded CDs, DVDs, video tapes, cassettes, phonograph records and laser discs all featuring entertainment in the nature of a game show television series; pre-recorded CDs, DVDs, video tapes, cassettes, phonograph records and laser discs all featuring entertainment in the nature of a television series in the fields of drama, suspense, action, adventure, comedy, and romance; pre-recorded downloadable game show television series; pre-recorded downloadable television shows in the fields of drama, suspense, action, adventure, comedy, and romance
Ventilation calculation software programs | Fans for ventilating in mining and construction | Ventilating ducts (non-metallic) for use in mining and construction
Educational services, namely, providing in-person and online interactive courses, seminars, and workshops in the fields of Tantra, spirituality, pranic healing, and improvement of interpersonal relationships; Bodywork therapy; "SESSIONS"
Class 003: Perfumes; eau-de-Cologne; eau de toilette; deodorant for personal use; body moisturizing creams and lotions for cosmetic use; after-shave creams, gels and lotions for cosmetic use, shower gel; foaming bath gel; bath salts not for medical use; soap; make-up products.
Perfumes; eau-de-Cologne; eau de toilette; deodorant for personal use; body moisturizing creams and lotions for cosmetic use; after-shave creams, gels and lotions for cosmetic use, shower gel; foaming bath gel; bath salts not for medical use; non-medicated soap; make-up products, namely, make-up
Class 009: Car video recorders; Multiple purpose cameras; Multi-function electronic device for use in children's rooms comprising a sound producing function, temperature gauge and also including a clock and nightlight; Protective cases for portable media players; Photographic cameras for the instant production of pictures; Electric and electronic video surveillance installations; Photo printers; Thermal printers; Cameras; Cases adapted for cameras
Downloadable software, namely a suite of downloadable cybersecurity software and software development tools for managing, protecting, detecting and analyzing cybersecurity threats and intelligence information, endpoint security, and cyber threat protection; Downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; Downloadable computer software for computer security incident tracking; Downloadable software for Internet of Things (IOT) device and end point discovery and management; Downloadable software for connected device discovery and management; Downloadable software for computer network mapping; Downloadable software for managing the cyber security of environments combining computing devices and related networks; Downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Downloadable software to search for and index electronic data relating to cybersecurity incidents and threats; Downloadable software for ingesting, analyzing, and providing cybersecurity threat intelligence information; Downloadable software for accessing third-party computer software and associated data; Downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; Downloadable software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources; Downloadable chatbot software using artificial intelligence (AI) for detecting, responding to, investigating, and receiving and sharing summaries regarding cybersecurity threats and attacks; Downloadable software for detecting, misdirecting, and attracting cybersecurity threats; Downloadable software that uses artificial intelligence to detect cybersecurity threats to cloud-based electronic data; Downloadable software for ingestion, storage, and analysis of computer security electronic data and information technology electronic data; Downloadable software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation and certification; Downloadable computer software platforms for providing cloud security; Downloadable software for automation of security operations activities, incident response, investigation, threat and vulnerability management, event workflow response, remediation and orchestration and threat intelligence; none of the foregoing goods are for use in medical diagnosis or medical monitoring; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software platforms and cybersecurity software and software development tools for managing, protecting, detecting and analyzing cybersecurity threats and intelligence information, endpoint security, and cyber threat protection; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer network security software platforms and computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for computer security incident tracking; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for Internet of Things (IOT) device and end point discovery and management; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for connected device discovery and management; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for computer network mapping; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for managing the cyber security of environments combining computing devices and related networks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software to search for and index electronic data relating to cybersecurity incidents and threats; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for ingesting, analyzing, and providing cybersecurity threat intelligence information; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for accessing third-party computer software and associated data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources; Software development and design services in the field of cyber security and secure network operations; IT consultancy services relating to cybersecurity; IT security, protection and restoration services, namely, threat analysis, environment and configuration analysis and remediation ; computer security services, namely, managed detection and response services and digital forensics and incident response services; maintenance and updating of computer software in the field of cyber and computer security; technical consulting in the field of cybersecurity; cybersecurity services in the nature of analyzing the computer networks, hardware, software, and business practices of others for security vulnerabilities, and proposing potential solutions; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring chatbot software using artificial intelligence (AI) for detecting, responding to, investigating, and receiving and sharing summaries regarding cybersecurity threats and attacks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for detecting, misdirecting, and attracting cybersecurity threats; Platform as a Service (PaaS) services and Software as a service featuring computer software platforms and software that uses artificial intelligence to detect cybersecurity threats to cloud-based electronic data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for ingestion, storage, analysis of computer security electronic data and information technology electronic data; computer security services, namely, cybersecurity threat hunting and detection services for others; providing a website featuring an online database of known cybersecurity threats; computer cybersecurity services provided to others, namely, managed detection and response to cyberthreats; technical support services, namely, troubleshooting cybersecurity software problems; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation and certification; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Platform as a service (PAAS) featuring computer software platforms for providing cloud security; Software development in the field of cloud security; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for automation of security operations activities, incident response, investigation, threat and vulnerability management, event workflow response, remediation and orchestration and threat intelligence; none of the foregoing services are for use in medical diagnosis or medical monitoring
Educational services, namely, providing speakers in the field of cybersecurity; providing a website featuring educational training in the field of cybersecurity; Providing educational blogs and non-downloadable publications in the nature of articles, research papers, and newsletters in the fields of cybersecurity, computer security, computer network security, and computer network endpoint security via a website; Capital investment services in the field of technology companies; Venture capital advisory services in the field of technology companies; Venture capital financing in the field of technology companies; Business consulting in the field of cybersecurity; political consulting in the field of cybersecurity; marketing services, namely, providing a website promoting the goods and services of others by featuring third-party computer software solutions that are compatible with proprietary software and Software as a Service services
Educational services, namely, providing speakers in the field of cybersecurity; providing a website featuring educational training in the field of cybersecurity; Providing educational blogs and non-downloadable publications in the nature of articles, research papers, and newsletters in the fields of cybersecurity, computer security, computer network security, and computer network endpoint security via a website; Capital investment services in the field of technology companies; Venture capital advisory services in the field of technology companies; Venture capital financing in the field of technology companies; Business consulting in the field of cybersecurity; political consulting in the field of cybersecurity; marketing services, namely, providing a website promoting the goods and services of others by featuring third-party computer software solutions that are compatible with proprietary software and Software as a Service services