BT
Mark Identification

BT

Serial Number

88238391

Filing Date

Dec 21, 2018

Registration Date

Feb 22, 2022

Trademark by

BEYONDTRUST CORPORATION

Active Trademark

Classification Information

Computer software, namely, downloadable computer programs and mobile device applications for use in controlling, monitoring, and managing user access to computer systems and software; computer software, namely, downloadable computer programs and mobile device applications for use in providing remote information technology support services; computer software programs and hardware to assist in security and privilege management for computer operating systems, communication protocols, and software applications; computer software programs to assist in systems administration and security on operating systems that support remote access protocols; computer software programs to assist in integrating host credentials into directory services; computer software programs that provide access to multiple applications in different operating systems; computer software programs to assist in data leak protection; computer software programs to assist in cloud and virtualization monitoring and management; computer software for management of application software configuration settings; computer software for privileged account and vulnerability management; computer software for management, analytics and reporting and asset discovery and profiling in the fields of security and privilege management

Electrical and Scientific Apparatus

Computer educational and training services in the field of implementing and configuring privileged access and vulnerability management solutions

Education and Entertainment

Software as a service (SAAS) services featuring computer software for controlling, monitoring, and managing user access to computer systems and software; software as a service (SAAS) services featuring computer software for use in providing remote information technology support services; computer services, namely, technical consultation and assistance in the design, selection, implementation and use of computer networks and computer hardware and software systems for others with respect to implementing privileged access and vulnerability management systems; providing technical information in the field of computer system administration for others; computer security consulting services in the field of privileged access and vulnerability management solutions; computer consultation in the field of computer, network and software application security; non-downloadable computer software for management of application software configuration settings

Computer and Scientific