Trademark: AMAZON GUARDDUTY 1929215
Word
AMAZON GUARDDUTY
ID
1929215
Trademark Type
Word
Status
Registered: Registered/protected
Application Date
24 May 2018
Registration Date
24 May 2018
Renewal Date
24 May 2028

Service
King & Wood Mallesons

Goods and Services:
Class 9:
Computer software, namely, software for monitoring, detecting, identifying, tracking, logging, analyzing and reporting in the field security monitoring and threat and intrusion detection; computer software for continuous security monitoring and threat and intrusion detection for cloud-based applications and services; network threat detection software; computer network security software; network access management and monitoring software; computer software development tools; computer software for allowing users to access, query, analyze, and quarantine cloud-based information and applications; computer software for data processing; computer hardware; computer software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information; computer software for IT security; computer software for data protection; computer software for data security; computer software for preventing attacks on networks, data, applications and services; computer software for insider threat detection and prevention; computer software for security and threat detection, monitoring, prevention and remediation; computer software for protecting user accounts, networks and applications from compromise; computer software for reading and analyzing computer event logs; computer software for monitoring computer network access and activity; computer software for detecting third party reconnaissance actions by potential attackers; computer software for automated remediation of security threats; computer software for identifying unauthorized, malicious or unexpected activity that present threats to user accounts, applications and services running in the cloud; computer software that uses machine learning for threat detection, threat intelligence and anomaly detection to proactively identify, alert and remediate malicious or unauthorized activity; computer software that provides detailed security findings on potential and actual unauthorized, malicious, or unexpected activity related to user accounts, applications or services
Class 42:
Consultation in the field of cloud computing; research and development in the field of network security; research and development in the field of software; research and development in the field of information technology; computer systems analysis; computer systems, software and hardware consulting; computer technology consulting; computer security consulting; IT consulting; computer network security consulting; consulting in the field of security monitoring and threat detection; software as a service (SaaS) featuring software for network security; application service provider (ASP) services featuring software for network security; platform as a service (PaaS) services featuring software for network security, security monitoring, threat and intrusion detection and remediation; providing temporary use of non-downloadable software featuring software for network security, security monitoring, threat detection and remediation; software rental; software as a service (SaaS) featuring software for monitoring, detecting, identifying, tracking, logging, analyzing and reporting in the field security monitoring and threat and intrusion detection; software as a service (SaaS) featuring software for continuous security monitoring and threat and intrusion detection for cloud-based applications and services; software as a service (SaaS) featuring software for allowing users to access, query, analyze and quarantine cloud-based information and applications; software as a service (SaaS) services featuring software in the fields of computer security, security monitoring, threat detection and remediation; software as a service (SaaS) featuring software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information; software as a service (SaaS) featuring software for IT security; software as a service (SaaS) featuring software for data protection; software as a service (SaaS) featuring software for data security; software as a service (SaaS) featuring software for preventing attacks on networks, data, applications and services; software as a service (SaaS) featuring software for insider threat detection and prevention; software as a service (SaaS) featuring software for security and threat detection, monitoring, prevention and remediation; software as a service (SaaS) featuring software for protecting user accounts, networks and applications from compromise; software as a service (SaaS) featuring software for reading and analyzing computer event logs; software as a service (SaaS) featuring software for monitoring computer network access and activity; software as a service (SaaS) featuring software for detecting third party reconnaissance actions by potential attackers; software as a service (SaaS) featuring software for automated remediation of security threats; software as a service (SaaS) featuring software for identifying unauthorized, malicious or unexpected activity that present threats to user accounts, applications and services running in the cloud; software as a service (SaaS) featuring software that uses machine learning for threat detection, threat intelligence and anomaly detection to proactively identify, alert and remediate malicious or unauthorized activity; software as a service (SaaS) featuring software that provides detailed security findings on potential and actual unauthorized, malicious, or unexpected activity related to user accounts, applications or services