SYMANTEC O3 trademarks | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks

exact SYMANTEC O3 exact SYMANTEC O3

Trademarks matching 'symantec o3'

Summary of page content
2011-02-08
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software, namely, computer gateway software for providing security for enterprise cloud services, with functions consisting of data security, information protection, data loss prevention, data authentication, identity protection, management of identity security policies, network management, network monitoring, cloud services usage, controlling employee access, controlling user access, monitoring and auditing cloud services, governance and auditing of public and private it cloud services, and monitoring the security of remote computers and mobile electronic devices; computer software in the field of cryptographic network security and data security functions; computer software for integration of information logic and data between computer networks; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (pki) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer programs for data communications applications, and for the encryption and authentication of electronic information; computer software for identity security; computer software for authentication and identity management information security; computer software for detecting identity fraud; computer software and firmware for the management, transmission, and storage of data and information; computer software for administration of computer networks; network access server operating software; computer antivirus software; internet security software; enterprise security software; intrusion detection software; firewall software; privacy control software; content filtering software, namely, filtering unwanted electronic transmissions from websites and unwanted and unsolicited email; computer software, namely, middleware for interfacing client applications and networked or host based databases; computer hardware; gateway routers in the nature of computer control hardware; mobile computing and operating platforms consisting of data transceivers, wireless networks and gateways for collection and management of data
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer services, namely, software as a service (saas) services featuring software for providing security for enterprise cloud services, with functions including data security, information protection gateway services, data loss prevention, data authentication, identity protection, management of identity security policies, network management, network monitoring, cloud services usage, controlling employee access, controlling user access, monitoring and auditing cloud services, governance and auditing of public and private it cloud services, and monitoring the security of remote computers and mobile electronic devices; providing authentication of website operator identity; computer services, namely providing information concerning the encryption and authentication of electronic data; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication, encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and internet security services, namely, public key infrastructure (pki) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; technical consulting services in the field of identity management, namely, in the development and implementation of digital identity systems for authenticating, authorizing, and administering user identity and information over global computer networks; on-line technical support services, namely, troubleshooting of computer hardware and software problems; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; computer consultation in the field of computer security; computer support services, namely, technical support and software update services; computer consulting services related to computer products and services; computer software design for others; providing services for ensuring safe, secure online transactions and for security of access to identities and information
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    managed public key infrastructure services, namely, application and network infrastructure security services for authentication, issuance and validation of digital certificates; providing user authentication services in e-commerce transactions; business management, namely, issuance of digital certificates for authentication; monitoring of computer systems for security purposes; providing information in the fields of global computer network and local area network security, preventing computer viruses, computer hardware and software applications in security
606
ABANDONED - NO STATEMENT OF USE FILED
2015-04-06
2020-05-31
technology system zone chia premium hispanica omega ozone active antimicrobial clear nk nutech rich source high mayor fuente proteina cow
First 1 Last  1 of 1
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.