BITDEFENDER YOU DO YOU. WE'LL DO SECURITY. trademarks | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks

exact BITDEFENDER YOU DO YOU. WE'LL DO SECURITY. exact BITDEFENDER YOU DO YOU. WE'LL DO SECURITY.

Trademarks matching 'bitdefender you do you. we'll do security'

Summary of page content
2018-04-16
5999554
2020-03-03
US
Trademark Image
The mark consists of the stylized word "Bitdefender" appearing above the phrase "You do you. We'll do security" in stylized font.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications; computer software for providing network, internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in administering networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other computer security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and administering storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for operating data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    conversion of the computer code for others; computer advice, namely, technical advice relating to the operation of computers; design, development and maintenance of computer data bases; diagnosis services for computers in the nature of diagnosing computer hardware and software problems; maintenance of computer software; computer programming; computer on-line services in the nature of a website for providing information about computer software; audit for computer software and networks in the nature of data security auditing; computer services, namely, creation and maintenance, design and implementation of data recovery; database design and development in the nature of supplying of databases characteristics; supplying of internet search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis; providing temporary use of on-line non-downloadable software for accessing computer and software applications; rental of software applications; computer design; research and development for software applications; technical assistance for software applications, namely, troubleshooting of computer software problems
700
REGISTERED
2020-03-03
2020-06-25
institute international business systems services financial homeland system network solutions home group information safety plan protection life insurance social global
First 1 Last  1 of 1
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.