Trademark Alertz ®
Search
Trademark
Owner
Trademark: THREATLOCKER 2296263
Word
THREATLOCKER
ID
2296263
Trademark Type
Word
Status
Registered: Registered/protected
Application Date
26 August 2022
Registration Date
26 August 2022
Renewal Date
26 August 2032
Owner(s)
ThreatLocker, Inc.
Service
Ashurst Australia
Goods and Services:
Class 37
:
Installation, maintenance and repair services
Class 42
:
Providing information about computer software
;
computer design and development services
;
Internet security consultation
;
electronic storage of data
;
computer hardware and software consultation
;
computer consultation regarding computer networks and internal computer networks
;
design and development of computer hardware and software
;
advisory services relating to computer hardware, computer programming services
;
computer software analysis
;
computer systems analysis, computer systems design
;
computer engineering consultancy services
;
computer firewall services
;
data security services (firewalls)
;
computer network services
;
computer security services
;
computer security consultancy
;
computer security engineering
;
identity validation (computer security)
;
internet security consultancy
;
network security services
;
computer virus protection services
;
information technology services
;
security assessment services for computer networks
;
hosting of software as a service (SaaS)
;
software as a service (SaaS)
;
computerised business information storage
;
computerised data storage services
;
development of systems for storage of data
;
electronic data storage
;
cloud computing services
;
providing virtual computer systems through cloud computing
;
cloud seeding
;
Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications
;
Technical support services, namely, installation, administration, and troubleshooting of web and database applications
;
Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems
;
Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems
;
Technical support services, namely, troubleshooting of industrial process control computer software problems
;
Technical support, namely, providing computer facilities for the electronic storage of digital data
;
Software as a service (SAAS) services featuring software for cyber security, including, software that, disables the access of user defined programs to other programs in a user device
;
Software as a service (SAAS) services featuring software in the field of cyber security, including, software that, disables the access of user defined programs to other programs in a user device
;
Consulting in the field of IT project management
;
IT consulting services
;
Computer services, namely, remote management of information technology (IT) systems of others comprised of software applications
;
Computer services, namely, remote management of information technology (IT) systems of others comprised of hardware applications
;
Computer services, namely, on-site management of information technology (IT) systems of others comprised of software applications
;
Computer services, namely, on-site management of information technology (IT) systems of others comprised of hardware applications
;
Computer services, namely, remote management of the information technology (IT) systems of others
;
Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications
;
Information technology consulting services
;
Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems
;
Software as a service (SAAS) services featuring cloud based software for cyber security, including, software that detects, disables and reports unauthorized software and uses a complex set of rules to determine what can be executed on a computer network, and stops anything that has not been approved before it can execute
;
monitoring of computer systems for security purposes
;
providing information in the fields of computer and internet security
;
computer security services
Class 45
:
Computer licensing
;
licensing of computer firmware
;
licensing of computer programs
;
providing on-site security threat management systems
;
identity verification services [personal background investigations]
;
Providing consultation to third parties in the field of prevention of data theft