Trademarks owned by defend7 Inc. | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks
owned defend7 Inc. owned defend7 Inc.

Trademarks owned by 'defend7 Inc.'

Summary of page content
2014-11-20
US
Trademark Image
The mark consists of on the left side, a circular shape resembling a key hole, open at the bottom, created from seven arcs that transition in color from dark blue to cyan to lavender and the right side of the mark includes the word "Defend7" in the color blue, no claim is made to the background color.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer application software for mobile phones and handheld computers for computer system security; computer hardware and software systems for computer system security; computer software and firmware for computer system security, namely, software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    cloud computing featuring software for use for computer system security; computer consultation in the field of computer security; computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, computer system administration for others
606
ABANDONED - NO STATEMENT OF USE FILED
2016-08-22
2020-05-31
DEFEND7 Defend7 Inc.
2014-06-09
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer application software for mobile phones and handheld computers for computer system security; computer hardware and software systems for computer system security; computer software and firmware for computer system security; computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    cloud computing featuring software for computer system security; computer consultation in the field of computer security; computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, computer system administration for others
606
ABANDONED - NO STATEMENT OF USE FILED
2016-08-15
2020-05-31
DEFEND7 defend7 Inc.
2014-06-09
US
D7
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer application software for mobile phones and handheld computers for computer system security; computer hardware and software systems for computer system security; computer software and firmware for computer system security; computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    cloud computing featuring software for computer system security; computer consultation in the field of computer security; computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, computer system administration for others
606
ABANDONED - NO STATEMENT OF USE FILED
2016-08-08
2020-05-31
consulting grupo
2014-06-09
US
Trademark Image
The mark consists of a blue cloud shape with a white keyhole in the center. The cloud is outlined by a thin white line, then a grey line. The literal element "defend7" appears to the right of the cloud shape. The letters, "defen" are black and the "d7" is blue.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer application software for mobile phones and handheld computers for computer system security; computer hardware and software systems for computer system security; computer software and firmware for computer system security; computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    cloud computing featuring software for computer system security; computer consultation in the field of computer security; computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, computer system administration for others
606
ABANDONED - NO STATEMENT OF USE FILED
2015-08-17
2020-05-31
DEFEND7 defend7 Inc.
2014-06-09
US
Trademark Image
The mark consists of a blue cloud shape with a white keyhole in the center. The cloud is outlined by a thin white line, then a grey line.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer application software for mobile phones and handheld computers for computer system security; computer hardware and software systems for computer system security; computer software and firmware for computer system security; computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    cloud computing featuring software for computer system security; computer consultation in the field of computer security; computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, computer system administration for others
606
ABANDONED - NO STATEMENT OF USE FILED
2015-08-10
2020-05-31
defend7 Inc.
First 1 Last  1 of 1
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.