CURE8
Mark Identification

CURE8

Serial Number

90609897

Filing Date

Mar 29, 2021

Registration Date

Mar 7, 2023

Trademark by

GEEKTEK IT SERVICES INC.

Active Trademark

Classification Information

Online retail store services featuring a wide variety of consumer goods of others; Online retail store services in the field of consumer electronics, tvs, projectors, monitoring systems, security systems, information technology products, video equipment, audio equipment, portable electronic devices and related accessories, personal computers, printers, scanners, point-of sale hardware and electronic cables and office supplies

Advertising and Business

Consulting in the field of IT project management; IT consulting services; IT integration services; Computer services, namely, remote and on-site management of the information technology (IT) systems of others; Web site and web application design and programming; Computer co-location services, namely, providing facilities for the location of computer servers with the equipment of others; Computer services, namely, providing virtual and non virtual application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers of variable capacity to third party computing and data storage facilities; Rental of space in a computer co-location facility for containerized data centers of others; Application service provider (ASP), namely, hosting computer software applications of others; Application service provider, namely, hosting, managing, developing, and maintaining applications, software, and web sites, in the fields of personal productivity, wireless communication, mobile information access, and remote data management for wireless delivery of content to handheld computers, laptops and mobile electronic devices; Computer services, namely, cloud hosting provider services; Consulting services in the field of hosting computer software applications; Hosting the web sites of others; Maintenance of websites and hosting on-line web facilities for others; Web site hosting services; Developing and hosting a server on a global computer network for the purpose of facilitating e-commerce via such a server. Technology consultation in the field of information systems threat analysis and network security; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, remote and on-site management of information technology (IT) systems of others comprised of computer software systems used in provision of information technology security services for others; Monitoring of computer systems for detecting unauthorized access or data breach; providing computer virus protection services; providing computer services, namely, online scanning and detecting of viruses, spyware, adware, malware, ransomware, and other malicious code and programs on computers and electronic devices; computer security services, namely, restricting unauthorized network access by users without credentials to hard drives, computer networks and websites; Information technology security network infrastructure consulting services, namely, providing security strategies to assist businesses in protecting their intellectual property, data and network infrastructure against cyber security attack, and conducting security, vulnerability and penetration assessments; information technology computer security consultancy in the field of incident response, risk assessments, cyber security compliance, regulation compliance, and other practices of consultancy in relation to cyber security; Computer security threat analysis for protecting data from cyber threats and incidents; Managed information technology security services, namely, computer security threat analysis for protecting data; Monitoring of computer systems for detecting unauthorized access or data breach, namely, monitoring third-party information systems, operational technology (OT) and internet of things (IoT) networks for security detection and response purposes; Computer security threat analysis for protecting data, namely, assisting third-party enterprise network owners and operators to guard, monitor, detect, secure and respond to cyberattack and malware network and digital infrastructure intrusion incidents, both actual and attempted; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security consultancy and monitoring of computer systems for detecting unauthorized access or data breach, namely, Information, OT and IoT networks security incident and response services, consisting of monitoring third-party information systems and IoT and OT networks for security and incident response purposes, including detection and response plan development, delivery and implementation services. Technology supervision and inspection in the field of security, fire and burglar alarm systems and alarm detection and monitoring services; Design, development and installation of security systems and surveillance systems

Computer and Scientific

Complete security facility services, namely, monitoring of security systems, security software, security surveillance systems, climate control systems, closed circuit television and other monitoring systems, access control systems, burglar and fire alarms

Personal