associated with 7 other trademarks
maintenance and repair of computer hardware Regulatory compliance consulting in the field of computer security Technical support and comprehensive man...

Words that describe this trademark:

hardware technical support  maintenance repair  security 247  computer hardware  repair computer  managed security  technical support  247 monitoring  support  comprehensive 

Serial Number:

86585414

Mark:

Status:

Section 8 and 15-accepted and acknowledged

Status Date:

12-06-2023

Filing Date:

Registration Number:

5211566

Registration Date:

05-30-2017

Goods and Services:

maintenance and repair of computer hardware Regulatory compliance consulting in the field of computer security Technical support and comprehensive managed security services, namely, the 24/7 monitoring, for protection and defense against cyber threats, malicious code, and malfunctioning hardware and software, of network systems, servers, web and database users and applications, and endpoint devices, monitoring, detection, and incident response for security breaches, and receiving, analyzing and providing notification of related events and alerts; technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; computer security services, namely, enforcing, restricting, and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; anything as a service (XAAS) services, namely, software as a service (SAAS) featuring software that assists in the protection and defense against and response to cyber threats, malicious code, and malfunctioning hardware and software; providing technical support, in the nature of providing visibility and analytics for software, troubleshooting of computer software problems and diagnosing computer hardware problems; infrastructure as a service (IAAS), namely, providing virtual computer systems and virtual computer environments through cloud computing that helps others protect and defend against and respond to cyber threats, malicious code, and malfunctioning hardware and software; platform as a service (PAAS) featuring computer software platforms that assist with protection and defense against and response to cyber threats, malicious code, and malfunctioning hardware and software; technical support, in the nature of providing visibility and analytics and troubleshooting of computer software problems; storage as a service, namely, leasing data storage equipment, computer hardware, software and networking equipment; providing technical support of storage equipment, computer hardware, software and networking equipment, by storing, managing, analyzing, and providing redundancy of forensic evidence data and by providing redundancy for computer data storage infrastructure equipment; desktop as a service (DAAS), namely, featuring desktop software for detection analysis and remediation of desktop security events and end user support for storing, securing, updating, upgrading, and backing up data; technical support in the nature of detection analysis and remediation of desktop security events and end user support for storing, securing, updating, upgrading, and backing up data; network as a service (NAAS) featuring software used to provide virtual private networks; disaster recovery as a service (DRAAS) being the media duplication of data and duplication of software on, and hosting of, physical or virtual servers to provide failover in the event of a catastrophe; other IT solutions as a service in the nature of Encryption as a Service (EAAS) being data encryption services, and IT Integration Services provided through cloud infrastructure or over the internet, for monitoring, maintenance, and ensuring the security of computer networks, servers, web and database users and applications, and infrastructure devices, for ensuring uptime and functionality of computer networks and protection of data, and compliance with industry standards; testing, analysis and evaluation of network security and data protection systems to assure compliance with industry standards; data encryption services; computer virus protection services; technical support, namely, providing backup computer programs and facilities; development of software for secure network operations

Mark Description:

The mark consists of a stylized hand design, made up of three concentric curved lines, with the inner line forming a u shape, the middle line forming a j shape and the outer line forming a flattened j shape.

Class:

Legal services

Type of Mark:

Servicemark

Published for Opposition Date:

03-14-2017

Mark Drawing Status:

Design Only

Abandon Date:

N/A

Business Name:

TRENAM LAW

Correspondent Name:

Recent Trademark filings by this company