Trademark: N-ABLE 2233170
Word
N-ABLE
ID
2233170
Trademark Type
Word
Status
Protected: Registered/protected
Application Date
06 November 2020
Registration Date
29 October 2021
Renewal Date
06 November 2030

Service
DLA Piper Australia

Goods and Services:
Class 9:
Computer software for administration, monitoring, and management of information technology (IT), information technology (IT) infrastructure, networks, systems, computer devices, servers, applications, and information technology (IT) security; computer software for accessing, modifying, and controlling information technology (IT), information technology (IT) infrastructure, networks, systems, computer devices, servers, applications, and information technology (IT) security; computer software for remotely accessing, modifying, and controlling information technology (IT), information technology (IT) infrastructure, networks, systems, computer devices, servers, applications, and information technology (IT) security; computer software for administration, monitoring, and management of email; anti-virus computer software; computer software for data backup, recovery, restoration, continuity, and synchronization; computer software for the automation of administration, monitoring, and management of information technology (IT), information technology (IT) infrastructure, networks, systems, computer devices, systems, servers, applications, and software; computer software for the remote deployment of software; computer software for managing computer network security and predicting and monitoring security threats or vulnerabilities of information technology (IT), information technology (IT) infrastructure, networks, systems, computer devices, systems, servers, applications, and software computer networks; computer software for security and data protection; anti-virus computer software, computer software for data security and protection; computer software for e-commerce protection; computer software for intrusion detection; computer software for data transfer protection.
Class 42:
Providing non-downloadable computer software for administration, monitoring, and management of information technology (IT), information technology (IT) infrastructure, networks, systems, computer devices, servers, applications, information technology (IT) security, information technology (IT) help desk and technology support services, and software; providing non-downloadable computer software for accessing, modifying, and controlling information technology (IT), information technology (IT) infrastructure, networks, systems, computer devices, servers, applications, information technology (IT) security, information technology (IT) help desk and technology support services, and software; providing non-downloadable computer software for remotely accessing, modifying, and controlling information technology (IT), information technology (IT) infrastructure, networks, systems, computer devices, servers, applications, information technology (IT) security, information technology (IT) help desk and technology support services, and software; providing non-downloadable computer software for information technology (IT) help desk and technology support services; providing non-downloadable computer software for administration, monitoring, and management of email; providing non-downloadable anti-virus computer software; providing non-downloadable computer software for data backup, recovery, restoration, continuity, and synchronization; providing technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing information technology service management and information technology operations management for others; application service provider in the field of information technology to host computer application software for the purpose of administration, monitoring, and management of information technology (IT), information technology (IT) infrastructure, networks, systems, computer devices, servers, applications, and software; debugging, maintenance, and updating of software for others; providing non-downloadable computer software for the automation of administration, monitoring, and management of information technology (IT), information technology (IT) infrastructure, networks, systems, computer devices, servers, applications, and software; providing non-downloadable computer software for the administration, monitoring, management, assessment and quantification of security and data breach vulnerability risks; providing non-downloadable computer software for the remote deployment of software; providing non-downloadable computer software for managing computer network security and predicting and monitoring security threats or vulnerabilities of information technology (IT), information technology (IT) infrastructure, networks, systems, computer devices, systems, servers, applications, and software computer networks; providing non-downloadable computer software for security and data protection.