Trademark: AMAZON MACIE 1894238
Word
AMAZON MACIE
ID
1894238
Trademark Type
Word
Status
Registered: Registered/protected
Application Date
13 December 2017
Registration Date
13 December 2017
Renewal Date
13 December 2027

Service
King & Wood Mallesons

Goods and Services:
Class 9:
Computer software for data processing; computer hardware; computer software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information; computer software for IT security; computer software for network security; computer software for data protection; computer software for data security; computer software for data analytics; computer software for preventing attacks on networks and data; computer software for insider threat detection and prevention; computer software for data loss prevention and remediation; computer software for preventing theft of data and intellectual property; computer software for tracking intellectual property across an organization's network; computer software for identifying an organization's sensitive documents; computer software for identifying an organization's intellectual property; computer software for identifying business risk arising from data that is being exposed or shared outside the organization; computer software for assessing the business importance of data and determining how said data is accessed; computer software for protecting user accounts from compromise; computer software for identifying which users are accessing certain documents; computer software for detecting changes in groups of users; computer software for detecting changes in users' behavior; computer software for reading and analyzing computer event logs; computer software for monitoring computer network access and activity; computer software for setting data access and sharing policies
Class 42:
Consultation in the field of cloud computing; research and development in the field of data security and data loss prevention; research and development in the field of software; research and development in the field of information technology; computer systems analysis; computer systems, software and hardware consulting; computer technology consulting; computer security consulting; IT consulting; data security consulting; computer network security consulting; consulting in the field of data loss prevention; software as a service (SaaS) featuring software for data processing; application service provider (ASP) services featuring software for data processing; platform as a service (PaaS) services featuring software for data processing; providing temporary use of non-downloadable software featuring software for data processing; software rental; software as a service (SaaS) featuring software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information; software as a service (SaaS) featuring software for IT security; software as a service (SaaS) featuring software for network security; software as a service (SaaS) featuring software for data protection; software as a service (SaaS) featuring software for data security; software as a service (SaaS) featuring software for data analytics; software as a service (SaaS) featuring software for preventing attacks on networks and data; software as a service (SaaS) featuring software for insider threat detection and prevention; software as a service (SaaS) featuring software for data loss prevention and remediation; software as a service (SaaS) featuring software for preventing theft of data and intellectual property; software as a service (SaaS) featuring software for tracking intellectual property across an organization's network; software as a service (SaaS) featuring software for identifying an organization's sensitive documents; software as a service (SaaS) featuring software for identifying an organization's intellectual property; software as a service (SaaS) featuring software for identifying business risk arising from data that is being exposed or shared outside the organization; software as a service (SaaS) featuring software for assessing the business importance of data and determining how said data is accessed; software as a service (SaaS) featuring software for protecting user accounts from compromise; software as a service (SaaS) featuring software for identifying which users are accessing certain documents; software as a service (SaaS) featuring software for detecting changes in groups of users; software as a service (SaaS) featuring software for detecting changes in users' behavior; software as a service (SaaS) featuring software for reading and analyzing computer event logs; software as a service (SaaS) featuring software for monitoring computer network access and activity; software as a service (SaaS) featuring software for setting data access and sharing policies; software installation, maintenance and update services; remote computer and network monitoring services