GleanMark

DEEP SECURITY Trademark

DEEP SECURITY is a USPTO trademark filed by Trend Micro Kabushiki Kaisha. Status: Registered.

Trademark Facts

MarkDEEP SECURITY
Serial Number88631482
Registration Number6145510
StatusRegistered
Filing Date2019-09-25
Registration Date2020-09-08
Mark TypeWord
Nice Classes042 (Software & IT)
OwnerTrend Micro Kabushiki Kaisha
Attorney of RecordJoi A. White
Prosecution Events23
Latest EventREM1 on 2025-09-08

Goods & Services

Class 042: software as a service (SAAS) services featuring computer security software; providing online non-downloadable computer security software; software as a service (SAAS) services featuring computer antivirus, anti-spyware, anti-spam, anti-fraud, anti-malware and anti-ransomware software; providing online non-downloadable computer antivirus, anti-spyware, anti-spam, anti-fraud, anti-malware and anti-ransomware software; software as a service (SAAS) services featuring firewall software; providing online non-downloadable firewall software; software as a service (SAAS) services featuring malicious code and malicious content screening software; providing online non-downloadable malicious code and malicious content screening software; software as a service (SAAS) services featuring computer software for detecting, blocking and reporting malware, Trojans, worms, spyware, and ransomware; providing online non-downloadable software for detecting, blocking and reporting malware, Trojans, worms, spyware, and ransomware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; providing online non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; software as a service (SAAS) services featuring computer software for detecting and blocking exploit activities against vulnerable software; providing online non-downloadable software for detecting and blocking exploit activities against vulnerable software; software as a service (SAAS) services featuring computer software for inspecting and blocking unwanted computer network traffic; providing online non-downloadable software for inspecting and blocking unwanted computer network traffic; software as a service (SAAS) services featuring computer software for application whitelisting, monitoring of sensitive data files, directories and processes, and inspection of computer system logs; providing online non-downloadable software for application whitelisting, monitoring of sensitive data files, directories and processes, and inspection of computer system logs; software as a service (SAAS) services featuring computer software for use in computer and network security policy management and enforcement; providing online non-downloadable software for use in computer and network security policy management and enforcement; software as a service (SAAS) services featuring web consoles; providing online non-downloadable software, namely, hosting web consoles; software as a service (SAAS) services featuring computer software for use in coordinating, managing and tracking responses to computer network and data security breaches; providing online non-downloadable software for use in coordinating, managing and tracking responses to computer network and data security breaches; software as a service (SAAS) services featuring computer software for use in coordinating, managing, monitoring, tracking and reporting computer and network security issues; providing online non-downloadable software for use in coordinating, managing, monitoring, tracking and reporting computer and network security issues; software as a service (SAAS) services featuring computer software for monitoring of and reporting on computer security software and hardware; providing online non-downloadable software for monitoring of and reporting on computer security software and hardware; software as a service (SAAS) services featuring computer software for monitoring the operation, activity, and status of other computer software and software agents; providing online non-downloadable software for monitoring the operation, activity, and status of other computer software and software agents; software as a service (SAAS) services featuring computer software for managing and updating other computer security software, software agents and hardware; providing online non- downloadable software for managing and updating other computer security software, software agents and hardware; software as a service (SAAS) services featuring computer software for notification and delivery of software updates; providing online non-downloadable software featuring computer software for notification and delivery of software updates; consulting services in the fields of computer software and software as a service; consulting services in the fields of computer, data, server and computer network security; consultation in the field of deploying and managing computer security software; consulting services in the fields of server, computer, data and network security; custom configuration of computer software and computer networks; computer programming services; developing and deploying customized software in the field of computer software, data and network security; technical support services, namely, troubleshooting and remediation of computer software prob

Related