Trademark: AWAKE 1477679
Word
AWAKE
Device Descrption:
HORSE,INCOMPLETE,STYLISED
ID
1477679
Trademark Type
Figurative
Status
Protected: Registered/protected
Application Date
19 January 2012
Registration Date
19 January 2012
Renewal Date
17 June 2031

Service
Clayton Utz

Goods and Services:
Class 9:
Anti-malware software applications, computer software for providing network, Internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, including computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer optimization software, computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and tiles, enterprise security software; fire wall software; privacy control software; content filtering software, computer software for the creation of virtual private network, utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks, computer software for use in updating other computer software, computer software for use in networking applications, computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer, computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for data communications applications, and for the encryption and authentication of electronic information, computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security