77977734
Nov 2, 2007
Oct 20, 2009
Active Trademark
Computer software for providing network, Internet, and computer security; computer software for providing online identity protection, privacy control, and parental control; computer software for providing intrusion detection and prevention; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer software for use in the monitoring and control of computer and online activity; [ computer software for providing online transaction security; ] fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer maintenance software; computer software for the back-up, storage, restoration and recovery of data, folders, and files; computer software and downloadable computer software, namely, utility software; computer software for providing software updates; user manuals and instructional guides supplied with all of the foregoing
Electrical and Scientific Apparatus(Based on 44(d) Priority Application) Computer consultation; computer consultation in the field of computer security; computer diagnostic services; technical support services, namely, troubleshooting of computer hardware and software problems; technical support services, namely, providing back-up computer programs and facilities; updating of computer software for others; computer virus protection services; computer software installation services; network and Internet security services, namely, restricting access to and by computer networks to and of undesired websites, media, individuals, and facilities, and providing for the backup of such data; technical consultation in the field of computer software installation and maintenance; consulting services in the field of [ design, ] selection, implementation and use of computer hardware and software systems for others; providing information in the field of computer network and Internet security; providing technical information in the field of computer software applications; providing information in the fields of computer and Internet security, preventing computer threats, computer hardware and software applications in security
Computer and Scientific(Based on 44(d) Priority Application) Monitoring of computer systems for security purposes; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks
Personal