Trademark: THREATLOCKER 2296263
Word
THREATLOCKER
ID
2296263
Trademark Type
Word
Status
Registered: Registered/protected
Application Date
26 August 2022
Registration Date
26 August 2022
Renewal Date
26 August 2032

Service
Ashurst Australia

Goods and Services:
Class 42:
Providing information about computer software; computer design and development services; Internet security consultation; electronic storage of data; computer hardware and software consultation; computer consultation regarding computer networks and internal computer networks; design and development of computer hardware and software; advisory services relating to computer hardware, computer programming services; computer software analysis; computer systems analysis, computer systems design; computer engineering consultancy services; computer firewall services; data security services (firewalls); computer network services; computer security services; computer security consultancy; computer security engineering; identity validation (computer security); internet security consultancy; network security services; computer virus protection services; information technology services; security assessment services for computer networks; hosting of software as a service (SaaS); software as a service (SaaS); computerised business information storage; computerised data storage services; development of systems for storage of data; electronic data storage; cloud computing services; providing virtual computer systems through cloud computing; cloud seeding; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting of industrial process control computer software problems; Technical support, namely, providing computer facilities for the electronic storage of digital data; Software as a service (SAAS) services featuring software for cyber security, including, software that, disables the access of user defined programs to other programs in a user device; Software as a service (SAAS) services featuring software in the field of cyber security, including, software that, disables the access of user defined programs to other programs in a user device; Consulting in the field of IT project management; IT consulting services; Computer services, namely, remote management of information technology (IT) systems of others comprised of software applications; Computer services, namely, remote management of information technology (IT) systems of others comprised of hardware applications; Computer services, namely, on-site management of information technology (IT) systems of others comprised of software applications; Computer services, namely, on-site management of information technology (IT) systems of others comprised of hardware applications; Computer services, namely, remote management of the information technology (IT) systems of others; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Information technology consulting services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Software as a service (SAAS) services featuring cloud based software for cyber security, including, software that detects, disables and reports unauthorized software and uses a complex set of rules to determine what can be executed on a computer network, and stops anything that has not been approved before it can execute; monitoring of computer systems for security purposes; providing information in the fields of computer and internet security; computer security services