Trademark Alertz ®
Search
Trademark
Owner
Trademark: AMAZON GUARDDUTY 1929215
Word
AMAZON GUARDDUTY
ID
1929215
Trademark Type
Word
Status
Registered: Registered/protected
Application Date
24 May 2018
Registration Date
24 May 2018
Renewal Date
24 May 2028
Owner(s)
Amazon Technologies, Inc.
Service
King & Wood Mallesons
Goods and Services:
Class 9
:
Computer software, namely, software for monitoring, detecting, identifying, tracking, logging, analyzing and reporting in the field security monitoring and threat and intrusion detection
;
computer software for continuous security monitoring and threat and intrusion detection for cloud-based applications and services
;
network threat detection software
;
computer network security software
;
network access management and monitoring software
;
computer software development tools
;
computer software for allowing users to access, query, analyze, and quarantine cloud-based information and applications
;
computer software for data processing
;
computer hardware
;
computer software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information
;
computer software for IT security
;
computer software for data protection
;
computer software for data security
;
computer software for preventing attacks on networks, data, applications and services
;
computer software for insider threat detection and prevention
;
computer software for security and threat detection, monitoring, prevention and remediation
;
computer software for protecting user accounts, networks and applications from compromise
;
computer software for reading and analyzing computer event logs
;
computer software for monitoring computer network access and activity
;
computer software for detecting third party reconnaissance actions by potential attackers
;
computer software for automated remediation of security threats
;
computer software for identifying unauthorized, malicious or unexpected activity that present threats to user accounts, applications and services running in the cloud
;
computer software that uses machine learning for threat detection, threat intelligence and anomaly detection to proactively identify, alert and remediate malicious or unauthorized activity
;
computer software that provides detailed security findings on potential and actual unauthorized, malicious, or unexpected activity related to user accounts, applications or services
Class 38
:
Providing access to hosted operating systems and computer applications through the Internet
;
providing access to databases
;
providing multiple-user access to data on the Internet in the fields of computer network security, security monitoring, threat detection and remediation
;
providing temporary access to remote computers for the purpose of running software programs
Class 42
:
Consultation in the field of cloud computing
;
research and development in the field of network security
;
research and development in the field of software
;
research and development in the field of information technology
;
computer systems analysis
;
computer systems, software and hardware consulting
;
computer technology consulting
;
computer security consulting
;
IT consulting
;
computer network security consulting
;
consulting in the field of security monitoring and threat detection
;
software as a service (SaaS) featuring software for network security
;
application service provider (ASP) services featuring software for network security
;
platform as a service (PaaS) services featuring software for network security, security monitoring, threat and intrusion detection and remediation
;
providing temporary use of non-downloadable software featuring software for network security, security monitoring, threat detection and remediation
;
software rental
;
software as a service (SaaS) featuring software for monitoring, detecting, identifying, tracking, logging, analyzing and reporting in the field security monitoring and threat and intrusion detection
;
software as a service (SaaS) featuring software for continuous security monitoring and threat and intrusion detection for cloud-based applications and services
;
software as a service (SaaS) featuring software for allowing users to access, query, analyze and quarantine cloud-based information and applications
;
software as a service (SaaS) services featuring software in the fields of computer security, security monitoring, threat detection and remediation
;
software as a service (SaaS) featuring software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information
;
software as a service (SaaS) featuring software for IT security
;
software as a service (SaaS) featuring software for data protection
;
software as a service (SaaS) featuring software for data security
;
software as a service (SaaS) featuring software for preventing attacks on networks, data, applications and services
;
software as a service (SaaS) featuring software for insider threat detection and prevention
;
software as a service (SaaS) featuring software for security and threat detection, monitoring, prevention and remediation
;
software as a service (SaaS) featuring software for protecting user accounts, networks and applications from compromise
;
software as a service (SaaS) featuring software for reading and analyzing computer event logs
;
software as a service (SaaS) featuring software for monitoring computer network access and activity
;
software as a service (SaaS) featuring software for detecting third party reconnaissance actions by potential attackers
;
software as a service (SaaS) featuring software for automated remediation of security threats
;
software as a service (SaaS) featuring software for identifying unauthorized, malicious or unexpected activity that present threats to user accounts, applications and services running in the cloud
;
software as a service (SaaS) featuring software that uses machine learning for threat detection, threat intelligence and anomaly detection to proactively identify, alert and remediate malicious or unauthorized activity
;
software as a service (SaaS) featuring software that provides detailed security findings on potential and actual unauthorized, malicious, or unexpected activity related to user accounts, applications or services
Class 45
:
Monitoring of computer systems and databases for security purposes
;
computerized security services, namely, electronically monitoring, identifying, detecting and reporting on unauthorized, malicious or unexpected activity related to user accounts, applications or services