Trademarks owned by BITDEFENDER IPR MANAGEMENT LTD | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks
owned BITDEFENDER IPR MANAGEMENT LTD owned BITDEFENDER IPR MANAGEMENT LTD

Trademarks owned by 'BITDEFENDER IPR MANAGEMENT LTD'

Summary of page content
2014-12-05
4865603
2015-12-08
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer hardware and software which ensures the information security and management of the functions of fixed and mobile devices connected to an information network; computer hardware and software which ensures the monitoring and administration of data storage on administrated devices; computer hardware and software which ensures the monitoring and administration of internet bandwidth allocated for administrated devices; computer hardware and software which ensures the monitoring and administration of software installed on administrated devices; computer hardware and software which ensures the monitoring and administration of access to applications and personal data of users available on the administrated devices; computer hardware and software which ensures the monitoring of the geographic location of the administrated devices; computer hardware and software which ensures the protection of data traffic (internet) performed by the administrated devices in the local internet network or outside such network
700
REGISTERED
2015-12-08
2020-12-08
business services solutions network speed access marketing commerce exchange wireless group global guide power high center communications home system tv
2014-12-12
4862158
2015-12-01
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer hardware and software which ensures the information security and management of the functions of fixed and mobile devices connected to an information network; computer hardware and software which ensures the monitoring and administration of data storage on administrated devices; computer hardware and software which ensures the monitoring and administration of internet bandwidth allocated for administrated devices; computer hardware and software which ensures the monitoring and administration of software installed on administrated devices; computer hardware and software which ensures the monitoring and administration of access to applications and personal data of users available on the administrated devices; computer hardware and software which ensures the monitoring of the geographic location of the administrated devices; computer hardware and software which ensures the protection of data traffic (internet) performed by the administrated devices in the local internet network or outside such network
700
REGISTERED
2015-12-01
2020-12-01
business international bank equity trust label network reserve virtual banking group client wealth collection capital stock services club public placement
2014-12-19
US
Trademark Image
The mark consists of the words "Bitdefender BOX" in a stylized format.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer hardware and software which ensures the information security and management of the functions of fixed and mobile devices connected to an information network; computer hardware and software which ensures the monitoring and administration of data storage on administrated devices; computer hardware and software which ensures the monitoring and administration of internet bandwidth allocated for administrated devices; computer hardware and software which ensures the monitoring and administration of software installed on administrated devices; computer hardware and software which ensures the monitoring and administration of access to applications and personal data of users available on the administrated devices; computer hardware and software which ensures the monitoring of the geographic location of the administrated devices; computer hardware and software which ensures the protection of data traffic (internet) performed by the administrated devices in the local internet network or outside such network
604
ABANDONED - AFTER INTER-PARTES DECISION
2020-01-22
2020-05-31
business outside office tool lunch think music black inside mail little red thinking toy gift blue magic home bag original
2015-01-19
5024929
2016-08-23
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer hardware and software which ensures the information security and management of the functions of fixed and mobile devices connected to an information network; computer hardware and software which ensures the monitoring and administration of data storage on administrated devices; computer hardware and software which ensures the monitoring and administration of internet bandwidth allocated for administrated devices; computer hardware and software which ensures the monitoring and administration of software installed on administrated devices; computer hardware and software which ensures the monitoring and administration of access to applications and personal data of users available on the administrated devices; computer hardware and software which ensures the monitoring of the geographic location of the administrated devices; computer hardware and software which ensures the protection of data traffic (internet) performed by the administrated devices in the local internet network or outside such network
700
REGISTERED
2016-08-23
2020-06-25
business international bank equity trust label network reserve virtual banking group client wealth collection capital stock services club public placement
2014-07-01
4824938
2015-10-06
US
B
Trademark Image
The mark consists of the letter "B", positioned centrally, depicted in white on a black surface in the middle of 2 concentric circles depicted in white and blue, separated by a section of small lines in white positioned perpendicular between the circles, light rays in white, light flashes in blue and white.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications; computer software for providing network, internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer optimization software, computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for data storage management in storage area network; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases; computer software for scheduling automated processes; computer software for central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for encryption and authentication of electronic information for use in data communication application; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer code conversion for others, computer advice, design and maintenance services for computer data bases; diagnosis services for computers damaged by malware, maintenance of computer software, computer facilities for digital data storage, computer programming, computer on-line services for providing information about computer software, data security audit for computer software and networks, computer services, namely, creation and maintenance, design and implementation of data recovery, supplying of databases characteristics, assuring on-line network security via malware monitoring; supplying of search engines, design of computer websites, monitoring of computer software installation, monitoring of computer software updating; computer system analysis, providing temporary use of non-downloadable computer software for malware detection and removal; rental of software applications; computer design; research and development for software applications; technical support, namely, troubleshooting for software applications
700
REGISTERED
2015-10-06
2020-10-06
institute pain international business public 360° dow pac rehabilitation relations instituto para irrational radio choice content providers system capital asset
2014-07-01
4820675
2015-09-29
US
Trademark Image
The mark consists of a representation of a stylized mythological animal, consisting of a wolf head in shades of blue, gold and red, and snake body, mainly depicted in shades of blue with some white, and which shows a stylized inner structure representing various metallic components in shades of blue and white. The color black represents background.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications; computer software for providing network, internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer optimization software, computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for data storage management in storage area network; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases; computer software for scheduling automated processes; computer software for central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for encryption and authentication of electronic information for use in data communication application; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer code conversion for others, computer advice, design and maintenance services for computer data bases; diagnosis services for computers damaged by malware, maintenance of computer software, computer facilities for digital data storage, computer programming, computer on-line services for providing information about computer software, data security audit for computer software and networks, computer services, namely, creation and maintenance, design and implementation of data recovery, supplying of databases characteristics, assuring on-line network security via malware monitoring; supplying of search engines, design of computer websites, monitoring of computer software installation, monitoring of computer software updating; computer system analysis, providing temporary use of non-downloadable computer software for malware detection and removal; rental of software applications; computer design; research and development for software applications; technical support, namely, troubleshooting for software applications
700
REGISTERED
2015-09-29
2020-09-29
institute pain international business public 360° dow pac rehabilitation relations instituto para irrational radio choice content providers system capital asset
2013-06-21
4766777
2015-07-07
US
Trademark Image
The mark consists of the word "Bitdefender" in stylized letters with the "B" capitalized, followed by the word "PHOTON" in uppercase stylized letters.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications; computer software for providing network, internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, trojan horses, ad-ware, spyware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software, computer optimization software; computer software to prevent and diagnose computer problems; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for use in networking applications; computer software for connecting remote computers, for providing security to remote computer users, for implementing computer software and network security measures for remote computer users; computer software for file management and transfer content filtering, intrusion alert, virus protection and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management in storage area networks; computer software for monitoring and identifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases; computer software for use in central management of malware threat responses for computers attached to a computer network; computer programs for data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, computer programs for managing the software configurations of computer systems and computer networks; embedded software for network monitoring and security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    diagnosis services for computers damaged by malware, maintenance of computer software, computer facilities for digital data storage, computer on-line services for providing information about computer software, data security audit for computer software and networks, computer services, namely, on-line network security via malware monitoring; monitoring of computer software installation, monitoring of computer software updating; computer system analysis, providing temporary use of non-downloadable computer software for malware detection and removal, technical support, namely, troubleshooting for software applications
700
REGISTERED
2015-07-07
2020-07-07
control technologies system power probe technology solar smart gel golden pct philo alley beach blade bonding connect consulting delivery doodler
2013-06-21
4762718
2015-06-30
US
Trademark Image
The mark consists of the word ''Bitdefender" in stylized letters with the "B" capitalized, followed by the word "GravityZone" in stylized letters with the "G" and "Z" capitalized.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications; computer software for providing network, internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, trojan horses, ad-ware, spyware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software, computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management in storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, and identifying, rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases; computer software for scheduling automated processes; computer software for use in central management of malware threat responses for computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer code conversion for others, computer advice, design and maintenance services for computer data bases; diagnosis services for computers damaged by malware, maintenance of computer software, computer facilities for digital data storage, computer programming, computer on-line services for providing information about computer software, data security audit for computer software and networks, computer services, namely, creation and maintenance, design and implementation of data recovery, supplying of databases characteristics, assuring on-line network security via malware monitoring; supplying of search engines, monitoring of computer software installation, monitoring of computer software updating; computer system analysis, providing temporary use of non-downloadable computer software for malware detection and removal; technical support, namely, troubleshooting for software applications
700
REGISTERED
2015-06-30
2020-06-30
institute pain international business public 360° dow pac rehabilitation relations instituto para irrational radio choice content providers system capital asset
2013-06-21
4762719
2015-06-30
US
Trademark Image
The mark consists of the word "Bitdefender" in stylized letters with the "B" capitalized, followed by the word "CLOUD" in uppercase stylized letters with the "O" represented by a cloud design.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications; computer software for providing network, internet, and computer security; computer software for providing online identity protection and parental control; computer software for scanning, detecting, and removing viruses, worms, trojan horses, ad-ware, spyware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer and online activity; fraud protection software, computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; computer software for the creation of virtual private network; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software for use in updating other computer software; computer software for use in networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer software and network security measures for remote computer users; computer software for file management and transfer; computer software that provides firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management in storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, and identifying, rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases; computer software for scheduling automated processes; computer software for use in central management of malware threat responses for computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer code conversion for others, computer advice, design and maintenance services for computer data bases; diagnosis services for computers damaged by malware, maintenance of computer software, computer facilities for digital data storage, computer programming, computer on-line services for providing information about computer software, data security audit for computer software and networks, computer services, namely, creation and maintenance, design and implementation of data recovery, supplying of databases characteristics, assuring on-line network security via malware monitoring; supplying of search engines, design of computer websites, monitoring of computer software installation, monitoring of computer software updating; computer system analysis, providing temporary use of non-downloadable computer software for malware detection and removal; technical support, namely, troubleshooting for software applications
700
REGISTERED
2015-06-30
2020-06-30
nine computing white sleeping soft security storage black little red life sealy silver campaign solutions comfort services florida center emr
2011-03-21
4405360
2013-09-24
US
Trademark Image
The mark consists of a stylized representation of a safe door handle to the left of the stylized wording "SAFEBOX" above the stylized wording "POWERED BY BITDEFENDER".
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer anti-virus software; computer software for ensuring the security and protection of data; computer software for ensuring the security and protection of data transfer; computer software for creating online or local backup copies and for restoring data; computer software for data synchronization across multiple devices; computer software for sharing files with other people
710
CANCELLED - SECTION 8
2020-06-05
2020-07-14
business people technology solutions solar network driven green sun air high innovation internet performance mobile nature media human water services
2010-11-11
4214572
2012-09-25
US
Trademark Image
The mark consists of the term "BITDEFENDER" with "BIT" in red and "DEFENDER" in black, and a red caption with the words "SAFEGO" in white, over a gray shadow.
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer on-line services for providing information about the status of web pages, and for blocking access to untrusted or suspicious webpages; conversion of the computer code; providing reputation-based filtering for accessed websites and links; providing statistics and history about the access to specific webpages; retrieving and displaying information about references to a webpage
710
CANCELLED - SECTION 8
2019-04-26
2020-05-31
institute pain international business public 360° dow pac rehabilitation relations instituto para irrational radio choice content providers system capital asset
2010-11-11
4214574
2012-09-25
US
Trademark Image
The mark consists of three circular symbols, one green one showing a checkmark in light green, one orange one showing a question mark in light yellow, and one red one showing and X-shape in light red, along with the words "TRAFFICLIGHT" in black and "POWERED BY BITDEFENDER" in gray.
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer on-line services for providing information about the status of web pages, and for blocking access to untrusted or suspicious webpages; conversion of the computer code; providing reputation-based filtering for accessed websites and links; providing statistics and history about the access to specific webpages; retrieving and displaying information about references to a webpage
710
CANCELLED - SECTION 8
2019-04-26
2020-05-31
business people technology solutions solar network driven green sun air high innovation internet performance mobile nature media human water services
2016-08-19
5420557
2018-03-13
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications, computer software for providing network, internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spy ware, and other malware; internet security software, including computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer optimization software, computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and tiles, enterprise security software; fire wall software; privacy control software; content filtering software, computer software for the creation of virtual private network, utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks, computer software for use in updating other computer software, computer software for use in networking applications, computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security software for remote computer users; computer software for file management and transfer, computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for data communications applications, and for the encryption and authentication of electronic information, computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
  • 38
    Telecommunications
    providing access to internet connections
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    conversion of the computer code, computer advice, design and maintenance of computer data bases; diagnosis services for computers, maintenance of computer software, leasing of computer facilities, computer programming, computer on-line services for providing information about computer software, data security audit for computer software and networks, computer services, namely, creation and maintenance, design and implementation of data recovery, supplying of databases characteristics, assuring on-line network; supplying of search engines, design of computer websites, computer software installation, computer software updating, software design; computer system analysis, providing temporary use of computer and software applications and internet connection; rental of software applications; computer design; research and development for software applications, technical assistance for software applications, namely, troubleshooting of computer software problems
700
REGISTERED
2018-03-13
2020-05-31
best right good beautiful since doing terrible waste such happen every love about theres because mind closest well shore girl
2011-06-17
4188526
2012-08-14
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications, computer software for providing network, internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, trojan horses, ad ware, spy ware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer online activity, fraud protection software, computer optimization software, computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and files, enterprise security software; fire wall software; privacy control software; content filtering software, computer software for the creation of virtual private network, utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks, computer software for use in updating other computer software, computer software for use in connecting remote computers in networking applications; computer software for connecting and managing remote computers, computer software for synchronization of files through e-mail, computer software for providing security to remote computer users, computer software for implementing computer software network security measures for remote computer users; computer software for file management and transfer, computer software for providing firewalls, content filtering, intrusion alert, virus protection, virtual private networking and other security functions, computer software for file server storage management; computer software for use in file, disk and systems management; computer software for data storage management in storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for encryption and authentication of electronic information for use in data communications applications, computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
739
2019-01-19
2020-05-31
partner system storm power entertainment = night salesman run super americas hero will glide knight air pro technology auction treatment
2011-06-17
4159675
2012-06-19
US
Trademark Image
The mark consists of the word "BITDEFENDER" appearing below a stylized diagonal line depicting the top-line of a mythological animal formed of a wolf head and a snake tail.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications, computer software for providing network, internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, including computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer software for optimizing computer performance, namely, removing unnecessary files and registry entries to enhance computer performance, computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and tiles, enterprise security software; fire wall software; computer software for controlling privacy on the internet and protecting private information; content filtering software, computer software for the creation of virtual private network, utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks, computer software for use in updating other computer software, computer software for use in administering and maintaining computer networks, computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer, computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network for use in the field of centralized administration of software applications installed on computers, as part of a computer network; computer software for replicating and archiving files from one data store to another; computer programs for data communications applications, and for the encryption and authentication of electronic information, computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
739
2019-01-08
2020-05-31
institute pain international business public 360° dow pac rehabilitation relations instituto para irrational radio choice content providers system capital asset
2011-06-17
4159681
2012-06-19
US
Trademark Image
The mark consists of the word "BITDEFENDER" followed by a period and then the word "AWAKE" followed by another period appearing below a stylized diagonal line depicting the top-line of a mythological animal formed of a wolf head and a snake tail.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications, computer software for providing network, internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, including computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer software for optimizing computer performance, namely, removing unnecessary files and registry entries to enhance computer performance, computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and tiles, enterprise security software; fire wall software; computer software for controlling privacy on the internet and protecting private information; content filtering software, computer software for the creation of virtual private network, utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks, computer software for use in updating other computer software, computer software for use in administering and maintaining computer networks, computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer, computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network for use in the field of centralized administration of software applications installed on computers, as part of a computer network; computer software for replicating and archiving files from one data store to another; computer programs for data communications applications, and for the encryption and authentication of electronic information, computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
709
2019-01-25
2020-05-31
institute pain international business public 360° dow pac rehabilitation relations instituto para irrational radio choice content providers system capital asset
2011-06-17
4159682
2012-06-19
US
Trademark Image
The mark consists of the word "AWAKE" appearing below a stylized diagonal line depicting the top-line of a mythological animal formed of a wolf head and a snake tail.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications, computer software for providing network, internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, including computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer software for optimizing computer performance, namely, removing unnecessary files and registry entries to enhance computer performance, computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and tiles, enterprise security software; fire wall software; computer software for controlling privacy on the internet and protecting private information; content filtering software, computer software for the creation of virtual private network, utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks, computer software for use in updating other computer software, computer software for use in administering and maintaining computer networks, computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer, computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network for use in the field of centralized administration of software applications installed on computers, as part of a computer network; computer software for replicating and archiving files from one data store to another; computer programs for data communications applications, and for the encryption and authentication of electronic information, computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
709
2019-01-25
2020-05-31
stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution deep purity
2011-06-17
4159689
2012-06-19
US
Trademark Image
The mark consists of the a stylized diagonal line depicting the top-line of a mythological animal formed of a wolf head and a snake tail.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications, computer software for providing network, internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, including computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer software for optimizing computer performance, namely, removing unnecessary files and registry entries to enhance computer performance, computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and tiles, enterprise security software; fire wall software; computer software for controlling privacy on the internet and protecting private information; content filtering software, computer software for the creation of virtual private network, utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks, computer software for use in updating other computer software, computer software for use in administering and maintaining computer networks, , computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer, computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network for use in the field of centralized administration of software applications installed on computers, as part of a computer network; computer software for replicating and archiving files from one data store to another; computer programs for data communications applications, and for the encryption and authentication of electronic information, computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
739
2019-07-19
2020-05-31
institute pain international business public 360° dow pac rehabilitation relations instituto para irrational radio choice content providers system capital asset
2011-06-17
4196447
2012-08-28
US
Trademark Image
The mark consists of a three dimensional device in the form of a stylized mythological animal consisting of a wolf head with silver eyes and a snake tail having three segments, all made of shiny black material; on its sides; it has a red material with holes, resembling to a net.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications, computer software for providing network, internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer optimization software, computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and files, enterprise security software; fire wall software; privacy control software; content filtering software, computer software for the creation of virtual private network, utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks, computer software for use in updating other computer software, computer software for connecting remote computers and for providing anti-malware protection for networking applications, computer software for synchronization of files through e-mail, computer software for providing security to remote computer users; computer software for implementing computer software network security measures for remote computer users, computer software for file management and transfer, computer software for providing firewalls, content filtering, intrusion alert, virus protection, virtual private networking and other security functions, computer software for file server storage management, computer software for use in file, disk and systems management; computer software for data storage management in storage area networks; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer programs for central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for encryption and authentication of electronic information for use in data communications applications, computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
739
2019-03-23
2020-05-31
institute pain international business public 360° dow pac rehabilitation relations instituto para irrational radio choice content providers system capital asset
2012-02-23
4244199
2012-11-20
US
B
Trademark Image
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    anti-malware software applications, computer software for providing network, internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, trojan horses, ad-ware, spyware, and other malware; internet security software, namely, computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer optimization software; computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and files, enterprise security software; fire wall software; privacy control software; content filtering software, computer software for the creation of virtual private network, utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks, computer software for use in updating other computer software, computer software for use in networking applications, computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer, computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for data storage management in storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for encryption and authentication of electronic information for use in data communication application, computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security
709
2019-06-21
2020-06-12
institute pain international business public 360° dow pac rehabilitation relations instituto para irrational radio choice content providers system capital asset
First 1 2 3 Last  2 of 3
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.