GleanMark

T TELOS Trademark

T TELOS is a USPTO trademark filed by Telos Corporation. Status: Registered.

Trademark Facts

MarkT TELOS
Serial Number85956100
Registration Number5066643
StatusRegistered
Filing Date2013-06-11
Registration Date2016-10-25
Mark TypeCombined
Nice Classes009 (Electronics & Software), 037 (Construction), 038 (Telecommunications), 042 (Software & IT), 045 (Legal Services)
OwnerTelos Corporation
Attorney of RecordDavid R. Schaffer
Prosecution Events56
Latest EventREM2 on 2025-10-26

Goods & Services

Computer software for security certification and accreditation, network security testing and evaluation, vulnerability analysis and rectification, malicious code analysis, and security risk assessment and security process automation; computer hardware and peripherals; portable computers; computer workstations comprising computer hardware; computer networking products, namely, computer servers, peripherals and computer software for data communication between application programs, data management and data integration; e-commerce software to allow users to perform business transactions via a global computer network; computer software for others engaged in e-commerce, namely, software for business process automation and service management, system and network health monitoring, [ automated employee job scheduling and notification, ] remote monitoring of systems and workstations, automated delivery of software, automated scanning and monitoring of hardware and software inventory assets, and inventory management of physical hardware and network assets; computer software to allow users to engage in e-commerce, namely, software for providing security certification and accreditation support, and software for security policy and operational procedure development; computer software for administration of computer networks, namely, software for automated cross-platform data backup and recovery, and cross-platform user administration from a single computer console; software for computer systems security architecture design and implementation, computer network security testing and evaluation, computer systems vulnerability analysis and rectification, malicious code analysis, and computer network security risk assessment; computer software to allow users to visually represent and manipulate data sets in a touch optimized environment; all of the foregoing in the fields of information assurance, information security, cyber security, operational security, data analytics, visualization, secure wireless networking and secure mobility, identity management, secure message handling, secure LAN data integration, and enterprise risk management | Computer hardware maintenance services for others | Telecommunications services, the providing of connections to existing information technology utilizing wired and wireless technology, namely, the electronic transmission of voice, video, data, facsimile, electronic messages, mail and live video conversations, conferencing and communications and information through personal computers, the global computer network, devices interfacing with local and wide area networks, and consulting services concerning data communications and network access, all of the foregoing in the fields of information assurance, information security, cyber security, operational security, data analytics, visualization, secure wireless networking and secure mobility, identity management, secure message handling, secure LAN data integration, and enterprise risk management | Information technology services, namely, computer consulting services in the fields of computer security, computer network security, and electronic data security; development, design, integration and installation of computer software, computer systems and networks; computer systems analysis; testing, analysis and evaluation of information technology systems and networks of others for the purposes of enabling organizations to make risk-based security authorization decisions and ensuring that such systems and networks comply with government and industry standards; computer software design for others; all of the foregoing in the fields of information assurance, information security, cyber security, operational security, data analytics, visualization, secure wireless networking and secure mobility, identity management, secure message handling, secure LAN data integration, and enterprise risk management | Consulting services concerning the management of user identity and access to a computer network in the fields of information assurance, information security, cyber security, operational security, data analytics, visualization, secure wireless networking and secure mobility, identity management, secure message handling, secure LAN data integration, and enterprise risk management

Related