About 7 Trademarks found for “OPTIV”
Filters
Mark | Details | Status | Class/Description | |
---|---|---|---|---|
OPTIV OPTIV PARENT INC. (DELAWARE) 1722065 1 Apr 2015 | REGISTERED on 7 Jun 2022 | Computer software, namely cyber security software; computer software f... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software, namely cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware. Class 035 Class 035 Advertising, Business & Retail Services Value-added re-seller services, namely distributorship services of software and computer hardware used for the purpose of cyber security, computer security, network security, and data security; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments. ... Class 037 Construction and Repair Services Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security. Class 041 Education and Entertainment Services Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of software and computer hardware used for the purpose of cyber security, computer security, network security, and electronic data security; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security. Class 042 Computer & Software Services & Scientific Services Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats; computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; security breach response services, namely analyzing and resolving security breaches in relation to computer networks, cyber security, electronic data and identity theft; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software for facilitating the compatibility and scalability of multiple computer software programs; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; conducting tests on computer software and computer networks to assess information security vulnerability; design and development of electronic data security systems and computer network security systems; design and development of contingency plans for addressing threats to electronic data and computer network security systems; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities. Class 045 Personal & Legal & Social Services Compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; providing security assessments of physical locations, data security, software security, work environments, computer network security for businesses and governmental agencies; security consulting services in the fields of computer and network security, data security, identity theft and information technology security; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes. | ||
OPTIV Hexagon Technology Center GmbH 1367572 15 Oct 2007 | REGISTERED on 17 Nov 2010 | Vision inspection equipment, namely industrial optical inspection appa... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Vision inspection equipment, namely industrial optical inspection apparatus for dimensional inspection of manufactured components. | ||
![]() | OPTIV DESIGN OPTIV PARENT INC. (DELAWARE) 1728538 19 May 2015 | REGISTERED on 7 Jun 2022 | Computer software, namely cyber security software; computer software f... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software, namely cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware. Class 035 Class 035 Advertising, Business & Retail Services Value-added re-seller services, namely distributorship services of software and computer hardware used for the purpose of cyber security, computer security, network security, and data security; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments. ... Class 037 Construction and Repair Services Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security. Class 041 Education and Entertainment Services Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of software and computer hardware used for the purpose of cyber security, computer security, network security, and electronic data security; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security. Class 042 Computer & Software Services & Scientific Services Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk and help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats; computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; security breach response services, namely analyzing and resolving security breaches in relation to computer networks, cyber security, electronic data and identity theft; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software for facilitating the compatibility and scalability of multiple computer software programs; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; conducting tests on computer software and computer networks to assess information security vulnerability; design and development of electronic data security systems and computer network security systems; design and development of contingency plans for addressing threats to electronic data and computer network security systems; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities. Class 045 Personal & Legal & Social Services Compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; providing security assessments of physical locations, data security, software security, work environments, computer network security for businesses and governmental agencies; security consulting services in the fields of computer and network security, data security, identity theft and information technology security; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes. | |
OPTIV SECURITY OPTIV PARENT INC. (DELAWARE) 1726650 4 May 2015 | REGISTERED on 7 Jun 2022 | Computer software, namely cyber security software; computer software f... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software, namely cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware. Class 035 Class 035 Advertising, Business & Retail Services Value-added re-seller services, namely distributorship services of software and computer hardware used for the purpose of cyber security, computer security, network security, and data security; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments. ... Class 037 Construction and Repair Services Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security. Class 041 Education and Entertainment Services Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of software and computer hardware used for the purpose of cyber security, computer security, network security, and electronic data security; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security. Class 042 Computer & Software Services & Scientific Services Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk and help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats; computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; security breach response services, namely analyzing and resolving security breaches in relation to computer networks, cyber security, electronic data and identity theft; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software for facilitating the compatibility and scalability of multiple computer software programs; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; conducting tests on computer software and computer networks to assess information security vulnerability; design and development of electronic data security systems and computer network security systems; design and development of contingency plans for addressing threats to electronic data and computer network security systems; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities. Class 045 Personal & Legal & Social Services Compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; providing security assessments of physical locations, data security, software security, work environments, computer network security for businesses and governmental agencies; security consulting services in the fields of computer and network security, data security, identity theft and information technology security; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes. | ||
OPTIV MARKET SYSTEM OPTIV PARENT INC. (DELAWARE) 2349996 17 Sept 2024 | FORMALIZED on 17 Sept 2024 | Business consulting services in the field of cyber security; marketing... Class 035 Class 035 Advertising, Business & Retail Services Business consulting services in the field of cyber security; marketing consulting services in the field of cyber security; Class 042 Class 042 Computer & Software Services & Scientific Services Technology research in the field of cyber security, data and information security, and network security; product research in the field of cyber security; technology consultation services in the field of cyber security; | ||
![]() | OPTIV SECURITY DESIGN OPTIV PARENT INC. (DELAWARE) 1728539 19 May 2015 | REGISTERED on 7 Jun 2022 | Computer software, namely cyber security software; computer software f... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software, namely cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware. Class 035 Class 035 Advertising, Business & Retail Services Value-added re-seller services, namely distributorship services of software and computer hardware used for the purpose of cyber security, computer security, network security, and data security; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments. ... Class 037 Construction and Repair Services Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security. Class 041 Education and Entertainment Services Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of software and computer hardware used for the purpose of cyber security, computer security, network security, and electronic data security; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security. Class 042 Computer & Software Services & Scientific Services Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk and help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats; computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; security breach response services, namely analyzing and resolving security breaches in relation to computer networks, cyber security, electronic data and identity theft; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software for facilitating the compatibility and scalability of multiple computer software programs; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; conducting tests on computer software and computer networks to assess information security vulnerability; design and development of electronic data security systems and computer network security systems; design and development of contingency plans for addressing threats to electronic data and computer network security systems; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities. Class 045 Personal & Legal & Social Services Compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; providing security assessments of physical locations, data security, software security, work environments, computer network security for businesses and governmental agencies; security consulting services in the fields of computer and network security, data security, identity theft and information technology security; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes. | |
STEAM LAB SPONSORED BY OPTIV OPTIV PARENT INC. (Delaware) 2362198 14 Nov 2024 | FORMALIZED on 14 Nov 2024 | Charitable services namely, coordination of volunteers and volunteer o... Class 035 Class 035 Advertising, Business & Retail Services Charitable services namely, coordination of volunteers and volunteer opportunities with schools and community-based organizations; organizing and conducting volunteer programs and community service projects directed toward early education in the fields of science, technology, engineering, art and Mathematics in underserved communities; Class 036 Class 036 Insurance & Financial Services Charitable services namely, providing financial support and donations of technology and equipment to schools and community-based organizations to support educational opportunities and programs directed toward the fields of science, technology, engineering, art and Mathematics in underserved communities; |
on 7 Jun 2022
OPTIV PARENT INC. (DELAWARE)
1722065 · 1 Apr 2015
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer software, namely cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware.
035
Class 035
Advertising, Business & Retail Services
Value-added re-seller services, namely distributorship services of software and computer hardware used for the purpose of cyber security, computer security, network security, and data security; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments.
...
Class 037
Construction and Repair Services
Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security.
Class 041
Education and Entertainment Services
Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of software and computer hardware used for the purpose of cyber security, computer security, network security, and electronic data security; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security.
Class 042
Computer & Software Services & Scientific Services
Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats; computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; security breach response services, namely analyzing and resolving security breaches in relation to computer networks, cyber security, electronic data and identity theft; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software for facilitating the compatibility and scalability of multiple computer software programs; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; conducting tests on computer software and computer networks to assess information security vulnerability; design and development of electronic data security systems and computer network security systems; design and development of contingency plans for addressing threats to electronic data and computer network security systems; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities.
Class 045
Personal & Legal & Social Services
Compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; providing security assessments of physical locations, data security, software security, work environments, computer network security for businesses and governmental agencies; security consulting services in the fields of computer and network security, data security, identity theft and information technology security; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes.
Computer software, namely cyber security software; computer software f...
on 17 Nov 2010
Hexagon Technology Center GmbH
1367572 · 15 Oct 2007
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Vision inspection equipment, namely industrial optical inspection apparatus for dimensional inspection of manufactured components.
Vision inspection equipment, namely industrial optical inspection appa...
on 7 Jun 2022
OPTIV PARENT INC. (DELAWARE)
1728538 · 19 May 2015
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer software, namely cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware.
035
Class 035
Advertising, Business & Retail Services
Value-added re-seller services, namely distributorship services of software and computer hardware used for the purpose of cyber security, computer security, network security, and data security; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments.
...
Class 037
Construction and Repair Services
Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security.
Class 041
Education and Entertainment Services
Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of software and computer hardware used for the purpose of cyber security, computer security, network security, and electronic data security; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security.
Class 042
Computer & Software Services & Scientific Services
Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk and help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats; computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; security breach response services, namely analyzing and resolving security breaches in relation to computer networks, cyber security, electronic data and identity theft; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software for facilitating the compatibility and scalability of multiple computer software programs; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; conducting tests on computer software and computer networks to assess information security vulnerability; design and development of electronic data security systems and computer network security systems; design and development of contingency plans for addressing threats to electronic data and computer network security systems; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities.
Class 045
Personal & Legal & Social Services
Compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; providing security assessments of physical locations, data security, software security, work environments, computer network security for businesses and governmental agencies; security consulting services in the fields of computer and network security, data security, identity theft and information technology security; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes.
Computer software, namely cyber security software; computer software f...
on 7 Jun 2022
OPTIV PARENT INC. (DELAWARE)
1726650 · 4 May 2015
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer software, namely cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware.
035
Class 035
Advertising, Business & Retail Services
Value-added re-seller services, namely distributorship services of software and computer hardware used for the purpose of cyber security, computer security, network security, and data security; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments.
...
Class 037
Construction and Repair Services
Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security.
Class 041
Education and Entertainment Services
Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of software and computer hardware used for the purpose of cyber security, computer security, network security, and electronic data security; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security.
Class 042
Computer & Software Services & Scientific Services
Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk and help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats; computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; security breach response services, namely analyzing and resolving security breaches in relation to computer networks, cyber security, electronic data and identity theft; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software for facilitating the compatibility and scalability of multiple computer software programs; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; conducting tests on computer software and computer networks to assess information security vulnerability; design and development of electronic data security systems and computer network security systems; design and development of contingency plans for addressing threats to electronic data and computer network security systems; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities.
Class 045
Personal & Legal & Social Services
Compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; providing security assessments of physical locations, data security, software security, work environments, computer network security for businesses and governmental agencies; security consulting services in the fields of computer and network security, data security, identity theft and information technology security; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes.
Computer software, namely cyber security software; computer software f...
on 17 Sept 2024
OPTIV PARENT INC. (DELAWARE)
2349996 · 17 Sept 2024
035
Class 035
Advertising, Business & Retail Services
Business consulting services in the field of cyber security; marketing consulting services in the field of cyber security;
042
Class 042
Computer & Software Services & Scientific Services
Technology research in the field of cyber security, data and information security, and network security; product research in the field of cyber security; technology consultation services in the field of cyber security;
Business consulting services in the field of cyber security; marketing...
on 7 Jun 2022
OPTIV PARENT INC. (DELAWARE)
1728539 · 19 May 2015
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer software, namely cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware.
035
Class 035
Advertising, Business & Retail Services
Value-added re-seller services, namely distributorship services of software and computer hardware used for the purpose of cyber security, computer security, network security, and data security; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments.
...
Class 037
Construction and Repair Services
Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security.
Class 041
Education and Entertainment Services
Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of software and computer hardware used for the purpose of cyber security, computer security, network security, and electronic data security; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security.
Class 042
Computer & Software Services & Scientific Services
Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk and help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats; computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; security breach response services, namely analyzing and resolving security breaches in relation to computer networks, cyber security, electronic data and identity theft; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software for facilitating the compatibility and scalability of multiple computer software programs; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; conducting tests on computer software and computer networks to assess information security vulnerability; design and development of electronic data security systems and computer network security systems; design and development of contingency plans for addressing threats to electronic data and computer network security systems; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities.
Class 045
Personal & Legal & Social Services
Compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; providing security assessments of physical locations, data security, software security, work environments, computer network security for businesses and governmental agencies; security consulting services in the fields of computer and network security, data security, identity theft and information technology security; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes.
Computer software, namely cyber security software; computer software f...
on 14 Nov 2024
OPTIV PARENT INC. (Delaware)
2362198 · 14 Nov 2024
035
Class 035
Advertising, Business & Retail Services
Charitable services namely, coordination of volunteers and volunteer opportunities with schools and community-based organizations; organizing and conducting volunteer programs and community service projects directed toward early education in the fields of science, technology, engineering, art and Mathematics in underserved communities;
036
Class 036
Insurance & Financial Services
Charitable services namely, providing financial support and donations of technology and equipment to schools and community-based organizations to support educational opportunities and programs directed toward the fields of science, technology, engineering, art and Mathematics in underserved communities;
Charitable services namely, coordination of volunteers and volunteer o...
Apply for Trademark
Select countries to protect your logo trademark
Trademark Name
Country Selected
Canada
$599 / 1 class + gov fee
United States
$99 / 1 class + gov fee
Canada
$599 / 1 class + gov fee
Mexico
$499 / 1 class + gov fee
European Union
$700 / 1 class + gov fee
China
$499 / 1 class + gov fee
South Korea
$699 / 1 class + gov fee
Japan
$799 / 1 class + gov fee
India
$99 / 1 class + gov fee
United Kingdom
$499 / 1 class + gov fee
Australia
$299 / 1 class + gov fee
Israel
$699 / 1 class + gov fee
United Arab Emirates
$699 / 1 class + gov fee
New Zealand
$699 / 1 class + gov fee
Brazil
$499 / 1 class + gov fee
Taiwan
$799 / 1 class + gov fee
Ukraine
$799 / 1 class + gov fee
Indonesia
$699 / 1 class + gov fee
South Africa
$499 / 1 class + gov fee
Singapore
$799 / 1 class + gov fee
Saudi Arabia
$799 / 1 class + gov fee
Afghanistan
$799 / 1 class + gov fee
Algeria
$799 / 1 class + gov fee
Argentina
$399 / 1 class + gov fee
Austria
$899 / 1 class + gov fee
Bahrain
$699 / 1 class + gov fee
Bangladesh
$599 / 1 class + gov fee
Benelux
$999 / 1 class + gov fee
Bhutan
$899 / 1 class + gov fee
Bolivia
$799 / 1 class + gov fee
Botswana
$1299 / 1 class + gov fee
British Virgin Islands
$1199 / 1 class + gov fee
Bulgaria
$799 / 1 class + gov fee
Cambodia
$799 / 1 class + gov fee
Chile
$499 / 1 class + gov fee
Colombia
$699 / 1 class + gov fee
Congo
$1199 / 1 class + gov fee
Costa Rica
$899 / 1 class + gov fee
Croatia
$899 / 1 class + gov fee
Cyprus
$999 / 1 class + gov fee
Czech Republic
$899 / 1 class + gov fee
Denmark
$799 / 1 class + gov fee
Dominican Republic
$899 / 1 class + gov fee
Ecuador
$799 / 1 class + gov fee
Egypt
$699 / 1 class + gov fee
El Salvador
$799 / 1 class + gov fee
Ethiopia
$1099 / 1 class + gov fee
France
$899 / 1 class + gov fee
Gaza
$799 / 1 class + gov fee
Germany
$899 / 1 class + gov fee
Greece
$799 / 1 class + gov fee
Guatemala
$899 / 1 class + gov fee
Haiti
$899 / 1 class + gov fee
Honduras
$899 / 1 class + gov fee
Hong Kong (SAR)
$899 / 1 class + gov fee
Hungary
$1099 / 1 class + gov fee
Iraq
$1499 / 1 class + gov fee
Italy
$899 / 1 class + gov fee
Jordan
$799 / 1 class + gov fee
Kazakhstan
$799 / 1 class + gov fee
Kenya
$899 / 1 class + gov fee
Kuwait
$799 / 1 class + gov fee
Laos
$699 / 1 class + gov fee
Lebanon
$999 / 1 class + gov fee
Lesotho
$1199 / 1 class + gov fee
Libya
$899 / 1 class + gov fee
Madrid Protocol (WIPO)
$1999 / 1 class + gov fee
Malawi
$1099 / 1 class + gov fee
Malaysia
$699 / 1 class + gov fee
Maldives
$999 / 1 class + gov fee
Morocco
$999 / 1 class + gov fee
Mozambique
$899 / 1 class + gov fee
Myanmar
$799 / 1 class + gov fee
Namibia
$799 / 1 class + gov fee
Nepal
$699 / 1 class + gov fee
Nicaragua
$899 / 1 class + gov fee
Norway
$899 / 1 class + gov fee
Oman
$1099 / 1 class + gov fee
Pakistan
$799 / 1 class + gov fee
Panama
$899 / 1 class + gov fee
Paraguay
$899 / 1 class + gov fee
Peru
$799 / 1 class + gov fee
Philippines
$899 / 1 class + gov fee
Poland
$499 / 1 class + gov fee
Portugal
$899 / 1 class + gov fee
Puerto Rico
$899 / 1 class + gov fee
Qatar
$799 / 1 class + gov fee
Romania
$899 / 1 class + gov fee
Serbia
$899 / 1 class + gov fee
Slovakia
$899 / 1 class + gov fee
Spain
$899 / 1 class + gov fee
Sri Lanka
$699 / 1 class + gov fee
Swaziland
$1299 / 1 class + gov fee
Sweden
$799 / 1 class + gov fee
Switzerland
$899 / 1 class + gov fee
Thailand
$799 / 1 class + gov fee
Tunisia
$899 / 1 class + gov fee
Turkey
$799 / 1 class + gov fee
Uganda
$699 / 1 class + gov fee
United Republic of Tanzania
$699 / 1 class + gov fee
Uruguay
$799 / 1 class + gov fee
Venezuela
$899 / 1 class + gov fee
Vietnam
$799 / 1 class + gov fee
West Bank, Palestine
$799 / 1 class + gov fee
Yemen
$1699 / 1 class + gov fee
Albania
$899 / 1 class + gov fee
Andorra
$899 / 1 class + gov fee
Angola
$1299 / 1 class + gov fee
Antigua and Barbuda
$1299 / 1 class + gov fee
Armenia
$799 / 1 class + gov fee
Azerbaijan
$799 / 1 class + gov fee
Bahamas
$1399 / 1 class + gov fee
Barbados
$1299 / 1 class + gov fee
Belgium
$999 / 1 class + gov fee
Belize
$1299 / 1 class + gov fee
Benin
$799 / 1 class + gov fee
Bosnia and Herzegovina
$999 / 1 class + gov fee
Brunei
$1299 / 1 class + gov fee
Burkina Faso
$799 / 1 class + gov fee
Burundi
$1199 / 1 class + gov fee
Cabo Verde
$899 / 1 class + gov fee
Cameroon
$799 / 1 class + gov fee
Central African Republic (CAR)
$799 / 1 class + gov fee
Chad
$799 / 1 class + gov fee
Comoros
$799 / 1 class + gov fee
Cote d'Ivoire
$799 / 1 class + gov fee
Czechia
$999 / 1 class + gov fee
Djibouti
$1199 / 1 class + gov fee
Dominica
$1299 / 1 class + gov fee
Equatorial Guinea
$799 / 1 class + gov fee
Eritrea
$999 / 1 class + gov fee
Estonia
$1299 / 1 class + gov fee
Eswatini
$1299 / 1 class + gov fee
Fiji
$899 / 1 class + gov fee
Finland
$699 / 1 class + gov fee
Gabon
$799 / 1 class + gov fee
Gambia
$899 / 1 class + gov fee
Georgia
$799 / 1 class + gov fee
Ghana
$999 / 1 class + gov fee
Grenada
$1299 / 1 class + gov fee
Guinea
$799 / 1 class + gov fee
Guinea-Bissau
$799 / 1 class + gov fee
Guyana
$1299 / 1 class + gov fee
Iceland
$1299 / 1 class + gov fee
Ireland
$899 / 1 class + gov fee
Jamaica
$1199 / 1 class + gov fee
Kiribati
$999 / 1 class + gov fee
Kosovo
$899 / 1 class + gov fee
Kyrgyzstan
$899 / 1 class + gov fee
Latvia
$699 / 1 class + gov fee
Liberia
$999 / 1 class + gov fee
Liechtenstein
$999 / 1 class + gov fee
Lithuania
$699 / 1 class + gov fee
Luxembourg
$999 / 1 class + gov fee
Madagascar
$999 / 1 class + gov fee
Mali
$799 / 1 class + gov fee
Malta
$599 / 1 class + gov fee
Marshall Islands
$999 / 1 class + gov fee
Mauritania
$799 / 1 class + gov fee
Mauritius
$899 / 1 class + gov fee
Micronesia
$999 / 1 class + gov fee
Moldova
$999 / 1 class + gov fee
Monaco
$1399 / 1 class + gov fee
Mongolia
$599 / 1 class + gov fee
Montenegro
$899 / 1 class + gov fee
Nauru
$999 / 1 class + gov fee
Netherlands
$999 / 1 class + gov fee
Niger
$799 / 1 class + gov fee
Nigeria
$399 / 1 class + gov fee
North Macedonia
$899 / 1 class + gov fee
Palau
$999 / 1 class + gov fee
Palestine
$999 / 1 class + gov fee
Papua New Guinea
$799 / 1 class + gov fee
Rwanda
$999 / 1 class + gov fee
Saint Kitts and Nevis
$1299 / 1 class + gov fee
Saint Lucia
$1299 / 1 class + gov fee
Saint Vincent and the Grenadines
$1299 / 1 class + gov fee
Samoa
$1199 / 1 class + gov fee
San Marino
$999 / 1 class + gov fee
Sao Tome and Principe
$999 / 1 class + gov fee
Senegal
$799 / 1 class + gov fee
Seychelles
$999 / 1 class + gov fee
Sierra Leone
$999 / 1 class + gov fee
Slovenia
$899 / 1 class + gov fee
Solomon Islands
$999 / 1 class + gov fee
Somalia
$999 / 1 class + gov fee
South Sudan
$999 / 1 class + gov fee
Suriname
$1599 / 1 class + gov fee
Tajikistan
$799 / 1 class + gov fee
Tanzania
$699 / 1 class + gov fee
Timor-Leste
$999 / 1 class + gov fee
Togo
$799 / 1 class + gov fee
Tonga
$1299 / 1 class + gov fee
Trinidad and Tobago
$1399 / 1 class + gov fee
Turkmenistan
$799 / 1 class + gov fee
Tuvalu
$999 / 1 class + gov fee
Uzbekistan
$699 / 1 class + gov fee
Vanuatu
$1199 / 1 class + gov fee
Zambia
$899 / 1 class + gov fee
Zimbabwe
$899 / 1 class + gov fee
OAPI
$899 / 1 class + gov fee
ARIPO
$999 / 1 class + gov fee