85163091
Oct 27, 2010
Jul 16, 2013
Active Trademark
Computer antivirus software; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for providing intrusion detection and prevention; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, including computer software for use in the monitoring and control of computer and online activity; computer software for providing online transaction security; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer maintenance software; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; computer software for the creation of virtual private network; computer utility software; computer utility software for removal of computer applications and software; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software, namely, middleware for interfacing client applications and networked or host based databases; computer software for use in updating other computer software; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; computer software for use with a home or remote office for connecting computer network users to global networks; computer software and recorded databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; computer software, hardware, firmware and peripherals for network and Internet security data and system protection, and storage, server, client, and application performance management; computer hardware; computer hardware appliances that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for use in disaster recovery; computer software for use in removable storage media management; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for use in the field of enterprise information management; computer software for use in the field of online analytical processing (OLAP); computer software for generating reports from databases; computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network; computer software for replicating and archiving files from one data store to another; computer software for metering the use of the other computer software; computer software for use in developing data analysis applications and other computer software; computer programs for data security for use with data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; computer programs for remotely monitoring, evaluating, demonstrating and controlling other computer programs or computer processes; computer programs for locking-down one or more computers on a computer network; computer hardware and software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks; embedded software for network monitoring and security; embedded software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks; computer software, namely, content management software which filters, monitors, reports on and controls use of and access to locations on computer systems and networks and on global communication networks; electronic mail and news group filtering software which prevents or shunts delivery of defined categories or origins of electronic mail messages and news postings; protection software which detects electronic inquiries for information from computer systems or of users of computer systems and organizes, monitors, controls and prevents provision of such information; privacy management software which prevents, monitors, certifies, aggregates and reports on the distribution and use of personal identification information on computer systems and networks and on global communications networks; file transfer filtering software which prevents, monitors, reports on or shunts delivery of defined categories, origins, volumes, or timeframes of electronic files; and chat filtering software which prevents, monitors, reports on, analyzes, or shunts delivery of defined categories, senders, recipients, origins, volumes or timeframes of conversations transmitted or stored electronically; downloadable electronic publications in the nature of reference, user, technical and instructional manuals and data sheets for use with computer software, hardware, peripherals and firmware and downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books and pamphlets in the fields of computer software and computer and on-line security
Electrical and Scientific ApparatusComputer user manuals in the field of computers, computer software, computer peripherals, computer security, computer services, and computer networks[; printed matter and publications, namely, magazines and conference materials in the field of computers, computer software, computer peripherals, and computer networks; paper labels and paper printed hologram labels]
Paper Goods and Printed MatterTransmittal of anti-virus scanning and other network security software via a global computer network; information and consultancy with regard to aforementioned services
TelecommunicationsElectronic storage of data files for clients to store and retrieve data via a global computer network; electronic document and email archiving services
Transportation and storageDevelopment of software for network and Internet security and data encryption; computer consultation; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; computer services, namely, filtering of unwanted and unsolicited email; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, providing back-up computer programs and facilities; computer virus protection services; computer software installation services; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; providing information in the field of computer network and Internet security; providing technical information in the field of computer software applications; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; updating computer software; providing information in the field of computer database, software, hardware and network operation, design and development; providing information about accessing computer security, preventing computer threats and design and development of computer security hardware and software applications; computer monitoring services in the nature of tracking hardware and software performance and processes and sending reports thereof; monitoring the computer systems of others for technical purposes and providing back-up computer programs and facilities; integration of computer systems and networks; computer services, namely, providing information concerning the encryption and authentication of electronic data for website and e-commerce transaction security; computer and software consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; creating indexes of information available on websites and filtering unwanted electronic transmissions from websites; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks
Computer and ScientificMonitoring of computer systems for security purposes; monitoring computer networks for security purposes; providing user authentication services in e-commerce transactions; providing information about computer and Internet security in the nature of administering digital keys and certificates
Personal