BITDEFENDER.AWAKE. trademarks | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks

exact BITDEFENDER.AWAKE. exact BITDEFENDER.AWAKE.

Trademarks matching 'bitdefender.awake'

Summary of page content
2011-06-17
4159681
2012-06-19
US
Trademark Image
The mark consists of the word "BITDEFENDER" followed by a period and then the word "AWAKE" followed by another period appearing below a stylized diagonal line depicting the top-line of a mythological animal formed of a wolf head and a snake tail.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications, computer software for providing network, internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, including computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer software for optimizing computer performance, namely, removing unnecessary files and registry entries to enhance computer performance, computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and tiles, enterprise security software; fire wall software; computer software for controlling privacy on the internet and protecting private information; content filtering software, computer software for the creation of virtual private network, utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks, computer software for use in updating other computer software, computer software for use in administering and maintaining computer networks, computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer, computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network for use in the field of centralized administration of software applications installed on computers, as part of a computer network; computer software for replicating and archiving files from one data store to another; computer programs for data communications applications, and for the encryption and authentication of electronic information, computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
709
2019-01-25
2020-05-31
institute pain international business public 360° dow pac rehabilitation relations instituto para irrational radio choice content providers system capital asset
First 1 Last  1 of 1
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.