ARBOR OPTIMA
Mark Identification

ARBOR OPTIMA

Serial Number

85048366

Filing Date

May 26, 2010

Trademark by

ARBOR NETWORKS INC.

Classification Information

Anti-spyware software; Computer anti-virus software; Computer hardware; Computer hardware and computer peripheral devices; Computer hardware and computer peripherals; Computer hardware and peripheral devices; Computer hardware and peripherals; Computer hardware and peripherals therefor; Computer hardware and software for setting up and configuring local area networks; Computer hardware and software for setting up and configuring wide area networks; Computer hardware and software sold as a unit for testing of embedded computer systems; Computer hardware, namely, firewalls; Computer network adapters; Computer network adapters, switches, routers and hubs; Computer network hubs; Computer network hubs, switches and routers; Computer network interface devices; Computer network switches; Computer networking hardware; Computer operating software; Computer programs for searching remotely for content on computers and computer networks; Computer programs for searching the contents of computers and computer networks by remote control; Computer search engine software; Computer software for accessing information directories that may be downloaded from the global computer network; Computer software for computer system and application development, deployment and management; Computer software for controlling and managing access server applications; Computer software for creating searchable databases of information and data; Computer software for encryption; Computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Computer software for the creation of firewalls; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Computer software to automate data warehousing; Decoder software; Enterprise software in the nature of a database for non-transactional data and a search engine for database content; Gateway routers in the nature of computer control hardware; Network access server hardware; Network access server operating software; Software for ensuring the security of electronic mail

Electrical and Scientific Apparatus

Application service provider (ASP), namely, hosting computer software applications of others; Application service provider featuring software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer service, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating searchable databases of information and data; Computer service, namely, acting as an application service provider in the field of knowledge management to host computer application software for searching and retrieving information from databases and computer networks; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software development; Computer systems integration services; Computer virus protection services; Consultation services in the field of search engine optimization; Consultation services in the fields of selection, implementation and use of computer hardware and software systems for others; Consulting in the field of configuration management for computer hardware and software; Creating of computer programs; Customization of computer hardware and software; Customized software development services; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Data conversion of electronic information; Data encryption and decoding services; Data encryption services; Data migration services; Design and development of computer hardware; Design and development of computer hardware and software; Design and development of computer software; Design and development of electronic data security systems; Design, creation, hosting, maintenance of websites for others; Design, deployment and management of wireless networks for others; Design, development and consulting services in the field of software for content management; Design, development and implementation of software; Design, development, installation and maintenance of computer software; Design, installation, updating and maintenance of computer software; Design, maintenance, development and updating of computer software; Designing and developing computer game software and video game software for use with computers, video game program systems and computer networks; Developing and hosting a server on a global computer network for the purpose of facilitating e-commerce via such a server; Developing and implementing customized plans for improving security and preventing criminal activity for businesses and governmental agencies; Developing and updating computer software; Developing computer software; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Technical support services, namely, 24x7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support, namely, monitoring of network systems; Updating of computer software relating to computer security and prevention of computer risks

Computer and Scientific