GleanMark

APEX ONE Trademark

APEX ONE is a USPTO trademark filed by Trend Micro Kabushiki Kaisha. Status: Registered.

Trademark Facts

MarkAPEX ONE
Serial Number90786596
Registration Number6836948
StatusRegistered
Filing Date2021-06-21
Registration Date2022-09-06
Mark TypeWord
Nice Classes009 (Electronics & Software)
OwnerTrend Micro Kabushiki Kaisha
Attorney of RecordJoi A. White
Prosecution Events23
Latest EventARAA on 2024-02-02

Goods & Services

downloadable computer security software; downloadable computer antivirus software; downloadable anti-spyware, anti-spam, and anti-fraud computer software; downloadable anti-malware and anti-ransomware software; downloadable firewall software; downloadable malicious code and malicious content screening software; downloadable data loss prevention (DLP) software; downloadable data encryption software; downloadable computer utility software; downloadable computer software for detecting and reporting malware, trojans, worms, spyware, and ransomware; downloadable computer software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; downloadable computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; downloadable computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers | software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring computer antivirus software; providing on-line non-downloadable computer antivirus software; software as a service (SAAS) services featuring anti-spyware, anti-spam, and anti-fraud computer software; providing on-line non-downloadable anti-spyware, anti-spam, and anti-fraud software; software as a service (SAAS) services featuring anti-malware and anti-ransomware software; providing on-line non-downloadable anti-malware and anti-ransomware software; software as a service (SAAS) services featuring firewall software; providing on-line non-downloadable firewall software; software as a service (SAAS) services featuring malicious code and malicious content screening software; providing on-line non-downloadable malicious code and malicious content screening software; software as a service (SAAS) services featuring data loss prevention (DLP) software; providing on-line non-downloadable data loss prevention (DLP) software; software as a service (SAAS) services featuring data encryption software; providing on-line non-downloadable data encryption software; software as a service (SAAS) services featuring computer utility software; providing on-line non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for detecting and reporting malware, trojans, worms, spyware, and ransomware; providing on-line non-downloadable software for detecting and reporting malware, trojans, worms, spyware, and ransomware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; providing on-line non-downloadable software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; providing on-line non-downloadable software for detecting, analyzing, reporting and sharing computer, data and network security threats; software as a service (SAAS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; providing on-line non-downloadable software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers

Related