Trademark: MENLO SECURITY 2103240
Word
MENLO SECURITY
ID
2103240
Trademark Type
Word
Status
Registered: Registered/protected
Application Date
13 July 2020
Registration Date
13 July 2020
Renewal Date
13 July 2030

Service
Griffith Hack

Goods and Services:
Class 9:
Computer software for searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications; Computer software for managing and filtering electronic communications; Computer software for protecting and securing computer networks and applications; Computer software for encrypting and authenticating data; Computer software for virtualization management and for virtualization of data, applications, operating systems, web browsers, and user tasks; Computer software for virtualization management and for virtualization of data, applications, operating systems, web browsers, and user tasks, to enable information, system and network security and to enable application compatibility, delivery and isolation; Computer software, namely, computer software for security, detection and removal of computer viruses, malware activity and threats; Computer software for managing and filtering electronic communications; Computer software for protecting and securing computer networks, applications, desktops, operating systems and data; Computer software for encrypting and authenticating data; Computer software for providing alerts, reports, data, and information regarding application, system and network security; Computer software for managing and filtering electronic communications; Computer software for protecting and securing computer networks and applications; Computer software for encrypting and authenticating data; Computer software for virtualization; Downloadable computer software for off-site network and personal computer monitoring, administration and management, server analysis; Downloadable cloud-computing software for deploying virtual machines to a cloud computing platform and managing virtual machines on a cloud computing platform
Class 42:
Computer services, namely, providing design, implementation, and application service provider services featuring application programming interface (API) software for interfaces for customized searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing information, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and work group communications; Computer security services, namely, data encryption for protecting the integrity of data and electronic communications over computer network; web browser protection services blocking malicious, untrustworthy and unwanted content and programs; Providing temporary use of on-line non-downloadable software for use in the protection of computers against unauthorized third-party access and for computer security and authentication; Providing online non-downloadable software for security, detection and removal of computer viruses and threats, and for protecting and securing computer networks and applications; Computer co-location services, namely, providing facilities for the location of computer servers with the equipment of others; Computer network configuration services; Computer services, namely, computer system administration for others; Computer services, namely, on-site management of information technology (IT) systems of others; Computer technology support services, namely, help desk services; Electronic data storage; Subscription computer services, namely, remote management of applications for others; Computer services, namely, providing virtual and non virtual application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers of variable capacity to third party computing and data storage facilities; Computer services, namely, providing virtual application servers to others; Hosting the software, websites and other computer applications of others on a virtual private server; Providing virtual computer systems and virtual computer environments through cloud computing; Computer security threat analysis for protecting data; Rental of computers relating to computer security and prevention of computer risks; Computer security services, namely, restricting unauthorized access to computer networks; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials