87737736
Dec 29, 2017
Feb 26, 2019
Active Trademark
Computer hardware; wireless access points; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; downloadable computer data-security programs; computer software for use in threat-reduction scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; computer compliance software; computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; downloadable electronic publications in the nature of manuals, technical notes, technical briefs, booklets, books, magazines, newsletters, and product guides, and data files in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; mouse pads, webcam covers, USB hardware, mobile phone battery chargers, mobile phone cases
Electrical and Scientific ApparatusPaper and cardboard; printed matter, namely, calendars, books in the field of data security, computer security, and network security, notebooks, cards, notepads, magazines in the field of data security, computer security, and network security, newsletters in the field of data security, computer security, and network security, booklets in the field of data security, computer security, and network security, manuals in the field of data security, computer security, and network security, technical briefs, stickers, bags, coasters; stationery; office requisites namely, markers, pens, staplers; printed instructional and teaching material in the field of information technology; plastic materials for packaging
Paper Goods and Printed MatterHousehold containers for foods and liquids; drinking vessels and containers; water bottles sold empty; lunch boxes; food storage containers
Housewares and GlassClothing, namely, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; footwear; headgear, namely, hats, caps, and visors
ClothingGames and playthings, namely, action figures, playing cards, puzzles, and fidget spinners; gymnastic and sporting articles, namely, balls, carabiners, golf tees and chips, and divot tools; surfboards; skateboards; flying discs
Toys and Sporting Goodsadministration of a program for enabling participants to receive expedited sales support services in the field of data security, computer security, and network security; business administration services; customer service management for others; value-added reseller services connected with the resale of computer hardware and computer software; distributorship services of computer hardware and computer software; database management; promoting the use of the security assurance best practices of others in the field of cloud computing; on-line commercial ordering services, provided via a website, in the field of computer hardware and computer software; wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software; providing commercial or product information to businesses regarding privacy, data security, and computer security
Advertising and BusinessInstallation, maintenance and repair of computer hardware; technical support services in the field of computer hardware; technical advice related to installation and repair of computer hardware; troubleshooting in the nature of the repair of computer hardware
Building Construction and Repairproviding of training in the fields of information technology, computers, data security, computer security, and network security; conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the fields of information technology, computers, data security, computer security, and network security and distribution of training materials in connection therewith
Education and EntertainmentComputer programming services for the protection of software; data security services for the protection of networks; computer software technical support services; installation, maintenance and repair of computer software; computer security consultancy; computer consulting services in the fields of of information technology, computers, data security, computer security, and network security; computer software, hardware, firmware, network, and computer security consulting services; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer development services; computer programming services; computer virus protection services; computer security services by way of notification of unauthorized electronic messages and related computer attacks; computer security services, namely, virtual private network (VPN) services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; providing information on data security, and computer security; troubleshooting of computer software problems; technical advice related to computer and computer network security; monitoring of computer systems for security purposes; providing threat information in the field of security for protecting data and information from unauthorized access
Computer and ScientificProviding online information in the field of development of privacy, security and data governance law; providing threat information in the field of security for protecting people and property; security consultancy services in the nature of protecting people and property
Personal