GleanMark

MDR ONE RESOLUTE Trademark

MDR ONE RESOLUTE is a USPTO trademark filed by Kudelski S.A.. Status: Registered.

Trademark Facts

MarkMDR ONE RESOLUTE
Serial Number79411572
Registration Number8045300
StatusRegistered
Filing Date2024-07-16
Registration Date2025-12-02
Mark TypeWord
Nice Classes009 (Electronics & Software), 038 (Telecommunications), 042 (Software & IT)
OwnerKudelski S.A.
Attorney of RecordPam Kohli Jacobson
Prosecution Events27
Latest EventOPNR on 2026-05-04

Goods & Services

Class 009: Computer hardware and downloadable software for detecting and responding to threats to computers, computer networks, information systems and telecommunication systems as well as internet websites; data processing equipment; downloadable computer software for database management; downloadable software and computer programs for data protection in computers, computer networks, information systems and telecommunication systems as well as internet websites; downloadable security software for ensuring the security of electronic mail, protecting data, and computer virus scanning, for use with computers, computer networks, information systems and telecommunication systems as well as internet websites; downloadable software for backing up, securing, analyzing and restoring computer and network data; downloadable software for use in managing, monitoring and maintaining the security and integrity of data, files, and information; downloadable software for detecting, analyzing, signaling and restoring modifications made to data, files, applications, computer systems and networks; downloadable software combining learning, automated analysis and hierarchical report functions to detect unauthorized access or attacks on computer systems and networks; downloadable software for monitoring and analyzing computer network traffic and computer network threats; downloadable software for detecting and responding to threats to computers, computer networks, information systems and telecommunication systems as well as internet websites; downloadable software for computer risk and threat assessment and management; downloadable software for computer security and protection for ensuring the security of electronic mail, protecting data, and computer virus scanning; downloadable software for cyber intrusion detection; downloadable software for cyber intrusion protection; downloadable intrusion detection system (IDS) software; downloadable software for cyber security anomaly detection; downloadable cybersecurity computer software for ensuring the security of electronic mail, protecting data, and computer virus scanning; downloadable computer programs for detecting and preventing malware, intrusions and other cyber threats; downloadable cyber-security assessment software; downloadable software for analyzing and preventing cyber threats in the fields of computer security; downloadable software for providing protection against data theft; downloadable software for providing protection against identity theft; downloadable software for cyber security intrusion and cyber security threat detection and response; downloadable security software for ensuring the security of electronic mail, protecting data, and computer virus scanning, in the fields of mobile security, cloud security, secure unified collaboration and the Internet of Things (IoT); security computer hardware in the area of mobile security, cloud security, secure unified collaboration and the Internet of Things (IoT); computer hardware and software systems for security operations center management, namely, computer hardware and downloadable software for ensuring the security of electronic mail, protecting data, and computer virus scanning, performing computer security policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers, performing computer vulnerability assessments, performing cybersecurity diagnostics, performing cybersecurity maintenance on hardware and software, performing cybersecurity policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers with regard to cybersecurity issues, performing cybersecurity vulnerability assessments, performing data security diagnostics, performing data security maintenance of hardware and software, securing data, performing data security policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers with regard to data security issues, performing data security vulnerability assessments, endpoint detection and response, performing firewall security assessments, performing firewall security diagnostics, performing firewall security maintenance, creating firewalls, performing firewall security policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers with regard to firewall security issues, performing firewall security vulnerability assessments, performing hardware diagnostics, performing hardware maintenance, securing hardware using encryption, performing hardware security policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers with regard to computer hardware issues, performing hardware vulnerability assessments, performing information technology diagnostics, performing information technology maintenance of hardware and software, ensuring the secu; Class 038: Telecommunications services in the field of security software and security hardware, in the nature of providing access to secure telecommunications networks; Class 042: Computer programming; Design, development, programming and maintenance of computer software; design, development, computer programming and maintenance of electronic data security systems; design, development, programming and maintenance of computer software relating to computer security and prevention of computer risks; design, development, programming and maintenance of computer programs for the security of computers, computer networks, information systems and telecommunication systems as well as internet websites; software design, development, programming and maintenance services in the field of monitoring and analyzing computer network traffic to maintain the integrity of computers, computer networks, information systems and telecommunication systems as well as internet websites; design, development, programming and maintenance of computer hacking prevention programs on the Internet; design, development, programming and maintenance of programs for the removal of viruses on the Internet; computer services in the nature of computer hardware development, data security consulting, development of security systems and contingency planning for information systems, in the field of security software and security hardware; computer services for automating the real-time detection, mitigation, prioritization and prediction of cyber threats and strikes, namely, software as a service (SAAS) services featuring software for automating the real-time detection, mitigation, prioritization and prediction of cyber threats and strikes; computer services, namely, endpoint detection and response of software and hardware threats being computer security threat analysis for protecting data; computer services, namely, managed detection and response of cyber intrusions and threats being computer security threat analysis for protecting data; computer services, namely, hosting secure networking platforms in the nature of websites on the Internet; providing temporary use of on-line non-downloadable software for database management; providing temporary use of on-line non-downloadable software for data protection in computers, computer networks, information systems and telecommunication systems as well as internet websites; providing temporary use of on-line non-downloadable security software for ensuring the security of electronic mail, protecting data, and computer virus scanning, for use with computers, computer networks, information systems and telecommunication systems as well as internet websites; providing temporary use of on-line non-downloadable software for backing up, securing, analyzing and restoring computer and network data; providing temporary use of on-line non-downloadable software for use in managing, monitoring and maintaining the security and integrity of data, files, and information; providing temporary use of on-line non-downloadable software for detecting, analyzing, signaling and restoring modifications made to data, files, applications, computer systems and networks; providing temporary use of on-line non-downloadable software combining learning, automated analysis and hierarchical report functions to detect unauthorized access or attacks on computer systems and networks; providing temporary use of on-line non-downloadable software for monitoring and analyzing computer network traffic and computer network threats; providing temporary use of on-line non-downloadable software for detecting and responding to threats to computers, computer networks, information systems and telecommunication as well as internet websites; providing temporary use of on-line non-downloadable software for computer risk and threat assessment and management; providing temporary use of on-line non-downloadable software for computer security and protection for ensuring the security of electronic mail, protecting data, and computer virus scanning; providing temporary use of on-line non-downloadable software for cyber intrusion detection; providing temporary use of on-line non-downloadable software for cyber intrusion protection; providing temporary use of on-line non-downloadable intrusion detection system (IDS) software; providing temporary use of on-line non-downloadable software for cyber security anomaly detection; providing temporary use of on-line non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing temporary use of on-line non-downloadable computer software for providing protection against data theft; providing temporary use of on-line non-downloadable computer software for providing protection against identity theft; providing temporary use of on-line non-downloadable computer software for cyber security intrusion and cyber security threat detection and response; providing temporary use of on-line non-downloadable security software for ensuring the security of electronic mail, protecting data, and computer virus scanning, in the fields of mobile security, cloud security, sec

Related