Trademark: 2318764
Word
Device Descrption:
TRIANGLE,CONCAVE-SIDES DIVIDES HEXAGON
ID
2318764
Trademark Type
Figurative
Status
Protected: Registered/protected
Application Date
27 July 2022
Registration Date
27 July 2022
Renewal Date
27 July 2032

Service

Goods and Services:
Class 9:
Computer application software for electronic devices, mobile phones, and handheld computers, namely, software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device, and cloud application content; downloadable computer software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device and cloud application content; downloadable computer software for encryption; downloadable computer software for litigation hold and electronic discovery; downloadable computer software for monitoring properties of files; downloadable computer software for analyzing file properties and determining if file properties have changed; downloadable computer software for creating reports regarding properties of files and changes in the properties of files; downloadable computer software for identifying when files have been moved to removable media or cloud applications; downloadable computer software for creating audit trails relating to file properties; downloadable computer software for generating reports regarding ownership history of files, movement history of files, and content history of files; downloadable computer software for tracking and identifying unusual activity relating digital content and files; downloadable computer software for analyzing file properties and generating file property reports; downloadable computer software for tracking, identifying, searching, and reporting on file activity data; downloadable computer software for tracking activity across computers, email and the cloud; downloadable software for use in connection with data security, computer security, cybersecurity, software threats, and prevention of computer risks.
Class 42:
File protection services, namely, back-up services for computer hard drive and cloud data; data warehousing; remote computer backup services; remote online backup of computer and cloud data; software as a service (SaaS) services featuring software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device and cloud application content; providing temporary use of non-downloadable cloud-based software for monitoring files and properties of files; providing temporary use of non-downloadable cloud-based software for analyzing file properties and determining if file properties have changed; providing temporary use of non-downloadable cloud-based software for creating reports regarding properties of files and changes in the properties of files; data encryption services, data encryption and decoding services; computer services, namely, encrypted data recovery and data security services; providing temporary use of non-downloadable computer software for litigation hold and electronic discovery; cross-platform conversion of digital content into other forms of digital content; providing temporary use of non-downloadable computer software for identifying when files have been moved to removable media or cloud-based applications or storage; providing temporary use of non-downloadable computer software for creating audit trails relating to file properties; providing temporary use of non-downloadable computer software for generating reports regarding ownership history of files, movement history of files, and content history of files; providing temporary use of non-downloadable computer software for tracking and identifying unusual activity relating digital content and files; providing temporary use of non-downloadable computer software for analyzing file properties and generating file property reports; providing temporary use of non-downloadable computer software for tracking, identifying, searching, and reporting on file activity data; software as a service (SaaS) services featuring software for data security and for assistance and support in the prevention of unauthorized network data exfiltration on computers, computer systems, computer networks and digital devices; software as a service (SaaS) services featuring software for computer system, corporate cloud and email risk detection; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; consulting services in the fields of information risk management and computer data security; technical consulting services related to designing, developing, customizing, configuring, deploying, analyzing, and managing of data security systems for others; computer security consultancy in the field of insider threat management, in the nature of insider risk monitoring and reduction; computer security consultancy in the nature of advanced cybersecurity services featuring the application and implementation of techniques, tools and expertise to detect, investigate and remediate advanced persistent threats and insider threats and include offensive cyber capabilities.