Trademarks owned by ForceShield, Inc. | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks
owned ForceShield, Inc. owned ForceShield, Inc.

Trademarks owned by 'ForceShield, Inc.'

Summary of page content
2018-09-06
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer hardware; computer hardware, namely, firewalls and networks security devices; computer software for security and protection, namely, software for providing web security and protection, detecting suspicious or malicious user activity and cyber-related threats, monitoring of computer systems for detecting unauthorized access or data breach; computer software, namely, software for protecting applications by concealing or reshaping the interfaces of a website; computer software for providing security and protection of data, networks and communications; downloadable computer software for providing security and protection of data, networks and communications; computer software for identifying and preventing malicious attacks, unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, boot kits, backdoors, cyber-attacks, malicious attacks and advanced persistent threats; computer hardware, namely, network security appliances in the nature of network access server hardware, and network management stations in the nature of computer network server; computer software, namely, network security software applications for controlling and managing access server applications; computer software featuring self-protection mechanisms for detecting and removing computer viruses for vulnerable systems, effectively extending the defense perimeter of enterprises; computer security and information technology products, namely, computer software for authorizing access to databases
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer technology consultancy; providing temporary use of non-downloadable computer software services, namely, web security and protection services, detection of suspicious or malicious user activity, unauthorized access or data breach, and cyber-related threats, monitoring of computer systems; computer security services, namely, restricting unauthorized network access by concealing or reshaping the interfaces of a website; providing a secure electronic online system featuring technology of a real time proactive defense mechanisms for vulnerable systems monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems by remote access to ensure proper functioning; cloud computing services featuring software and databases for use in database management for computer security and prevention and mitigation of computer risks; installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; provision of information in the field of computer security risk and internet security risk consultancy; computer and internet security testing services, namely, threat analysis for protecting data and risk control services in the field of internet security for prevention and mitigation of computer risks; design and development of computer hardware and software for use in computer network security and protection; technological consultation in the field of computer networking and network security; technical support, namely, monitoring of network systems and servers related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical consulting related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support services, namely, 24/7 monitoring application services related to the design, development and management of cyber-security systems for others; software development in the field of network security, incident and fraud prevention and response, digital forensics, intrusion prevention; maintenance of computer software; software as a service (saas) services featuring software for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting software for use by others for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting cloud and datacenter infrastructure software for use by others for providing security and protection in relation to security and protection computer software
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2019-07-18
2020-05-31
eye glove dj johnny auction shopping robot battle tots jet build 3000 create see touch cat pin wee advisor aero
2018-09-06
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer hardware; computer hardware, namely, firewalls and networks security devices; computer software for security and protection, namely, software for providing web security and protection, detecting suspicious or malicious user activity and cyber-related threats, monitoring of computer systems for detecting unauthorized access or data breach; computer software, namely, software for protecting applications by concealing or reshaping the interfaces of a website; computer software for providing security and protection of data, networks and communications; downloadable computer software for providing security and protection of data, networks and communications; computer software for identifying and preventing malicious attacks, unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, boot kits, backdoors, cyber-attacks, malicious attacks and advanced persistent threats; computer hardware, namely, network security appliances in the nature of network access server hardware, and network management stations in the nature of computer network server; computer software, namely, network security software applications for controlling and managing access server applications; computer software featuring self-protection mechanisms for detecting and removing computer viruses for vulnerable systems, effectively extending the defense perimeter of enterprises; computer security and information technology products, namely, computer software for authorizing access to databases
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer technology consultancy; providing temporary use of non-downloadable computer software services, namely, web security and protection services, detection of suspicious or malicious user activity, unauthorized access or data breach, and cyber-related threats, monitoring of computer systems; computer security services, namely, restricting unauthorized network access by concealing or reshaping the interfaces of a website; providing a secure electronic online system featuring technology of a real time proactive defense mechanisms for vulnerable systems monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems by remote access to ensure proper functioning; cloud computing services featuring software and databases for use in database management for computer security and prevention and mitigation of computer risks; installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; provision of information in the field of computer security risk and internet security risk consultancy; computer and internet security testing services, namely, threat analysis for protecting data and risk control services in the field of internet security for prevention and mitigation of computer risks; design and development of computer hardware and software for use in computer network security and protection; technological consultation in the field of computer networking and network security; technical support, namely, monitoring of network systems and servers related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical consulting related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support services, namely, 24/7 monitoring application services related to the design, development and management of cyber-security systems for others; software development in the field of network security, incident and fraud prevention and response, digital forensics, intrusion prevention; maintenance of computer software; software as a service (saas) services featuring software for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting software for use by others for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting cloud and datacenter infrastructure software for use by others for providing security and protection in relation to security and protection computer software
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2019-07-18
2020-05-31
fund system solutions management systems global value funds power focus growth control class technology digital air energy income data international
2017-12-05
6053747
2020-05-12
US
Trademark Image
The mark consists of the stylized word "FORCESHIELD" with "FORCE" in black, the letter "S" in white within a red shield design with a white and red border and the letters "HIELD" in black with the letters "HI" telescoped together with a red dot above the letter "I". All other instances of the color white represent background, outlining, shading, and/or transparent areas and are not part of the mark.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer hardware; computer hardware, namely, firewalls and networks security devices; computer software for security and protection, namely, software for providing web security and protection, detecting suspicious or malicious user activity and cyber-related threats, monitoring of computer systems for detecting unauthorized access or data breach; computer software, namely, software for protecting applications by concealing or reshaping the interfaces of a website; computer software for providing security and protection of data, networks and communications; downloadable computer software for providing security and protection of data, networks and communications; computer software for identifying and preventing malicious attacks, unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, boot kits, backdoors, cyber-attacks, malicious attacks and advanced persistent threats; computer hardware, namely, network security appliances in the nature of network access server hardware, and network management stations in the nature of computer network server; computer software, namely, network security software applications for controlling and managing access server applications; computer software featuring self-protection mechanisms for detecting and removing computer viruses for vulnerable systems, effectively extending the defense perimeter of enterprises; computer security and information technology products, namely, computer software for authorizing access to databases
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer technology consultancy; providing temporary use of non downloadable computer software services, namely, web security and protection services, detection of suspicious or malicious user activity, unauthorized access or data breach, and cyber-related threats, monitoring of computer systems; computer security services, namely, restricting unauthorized network access by concealing or reshaping the interfaces of a website; providing a secure electronic online system featuring technology of areal time proactive defense mechanisms for vulnerable systems; monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems by remote access to ensure proper functioning; cloud computing services featuring software and databases for use in database management for computer security and prevention and mitigation of computer risks; installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; provision of information in the field of computer security risk and internet security risk consultancy; computer and internet security testing services, namely, threat analysis for protecting data and risk control services in the field of internet security for prevention and mitigation of computer risks; design and development of computer hardware and software for use in computer network security and protection; technological consultation in the field of computer networking and network security; technical support, namely, monitoring of network systems and servers related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical consulting related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support services, namely, 24/7 monitoring application services related to the design, development and management of cyber-security systems for others; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing it and application systems; software development in the field of network security, incident and fraud prevention and response, digital forensics, intrusion prevention; maintenance of computer software; software as a service (saas) services featuring software for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting software for use by others for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting cloud and datacenter infrastructure software for use by others for providing security and protection in relation to security and protection computer software
700
REGISTERED
2020-05-12
2020-05-31
FORCESHIELD ForceShield, Inc.
2017-12-05
5885989
2019-10-15
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer hardware; computer hardware, namely, firewalls and networks security devices; computer software for security and protection, namely, software for providing web security and protection, detecting suspicious or malicious user activity and cyber-related threats, monitoring of computer systems for detecting unauthorized access or data breach; computer software, namely, software for protecting applications by concealing or reshaping the interfaces of a website; computer software for providing security and protection of data, networks and communications; downloadable computer software for providing security and protection of data, networks and communications; computer software for identifying and preventing malicious attacks, unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, boot kits, backdoors, cyber-attacks, malicious attacks and advanced persistent threats; computer hardware, namely, network security appliances in the nature of network access server hardware, and network management stations in the nature of computer network server; computer software, namely, network security software applications for controlling and managing access server applications; computer software featuring self-protection mechanisms for detecting and removing computer viruses for vulnerable systems, effectively extending the defense perimeter of enterprises; computer security and information technology products, namely, computer software for authorizing access to databases
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer technology consultancy; providing temporary use of non downloadable computer software, namely, software for monitoring web security and protection, detecting of suspicious or malicious user activity, monitoring unauthorized access or data breach, and cyber-related threats, monitoring of computer systems; computer security services, namely, restricting unauthorized network access by users without credentials by concealing or reshaping the interfaces of a website; providing a secure electronic online system featuring technology that monitors and allows accessing of a real time proactive defense mechanisms for vulnerable systems; monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems by remote access to ensure proper functioning; cloud computing services, namely, providing temporary use of non-downloadable cloud computing software for use in database management for computer security and prevention and mitigation of computer risks; providing on-line computer databases in the fields of computer security and prevention and mitigation of computer risks; installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; provision of technical information in the field of computer security risk and internet security risk consultancy; computer and internet security testing services, namely, threat analysis for protecting data and risk control services in the field of internet security for prevention and mitigation of computer risks; design and development of computer hardware and software for use in computer network security and protection; technological consultation in the field of computer networking and network security; technical support, namely, monitoring of network systems and servers related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical consulting related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support services, namely, 24/7 monitoring of network application related to the design, development and management of cyber-security systems for others; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing it and application systems; software development in the field of network security, incident and fraud prevention and response, digital forensics, intrusion prevention; maintenance of computer software; software as a service (saas) services featuring software for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting software for use by others for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting cloud and datacenter infrastructure software for use by others for providing security and protection in relation to security and protection computer software
700
REGISTERED
2019-10-15
2020-05-31
DYNASHIELD ForceShield, Inc.
2017-12-05
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer hardware; computer hardware, namely, firewalls and networks security devices; computer software for security and protection, namely, software for providing web security and protection, detecting suspicious or malicious user activity and cyber-related threats, monitoring of computer systems for detecting unauthorized access or data breach; computer software, namely, software for protecting applications by concealing or reshaping the interfaces of a website; computer software for providing security and protection of data, networks and communications; downloadable computer software for providing security and protection of data, networks and communications; computer software for identifying and preventing malicious attacks, unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, boot kits, backdoors, cyber-attacks, malicious attacks and advanced persistent threats; computer hardware, namely, network security appliances in the nature of network access server hardware, and network management stations in the nature of computer network server; computer software, namely, network security software applications for controlling and managing access server applications; computer software featuring self-protection mechanisms for detecting and removing computer viruses for vulnerable systems, effectively extending the defense perimeter of enterprises; computer security and information technology products, namely, computer software for authorizing access to databases
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer technology consultancy; providing temporary use of non downloadable computer software, namely, software for monitoring web security and protection, detecting of suspicious or malicious user activity, monitoring unauthorized access or data breach, and cyber-related threats, monitoring of computer systems; computer security services, namely, restricting unauthorized network access by users without credentials by concealing or reshaping the interfaces of a website; providing a secure electronic online system featuring technology that monitors and allows accessing of a real time proactive defense mechanisms for vulnerable systems; monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems by remote access to ensure proper functioning; cloud computing services, namely, providing temporary use of non-downloadable cloud computing software for use in database management for computer security and prevention and mitigation of computer risks; providing on-line computer databases in the fields of computer security and prevention and mitigation of computer risks; installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; provision of technical information in the field of computer security risk and internet security risk consultancy; computer and internet security testing services, namely, threat analysis for protecting data and risk control services in the field of internet security for prevention and mitigation of computer risks; design and development of computer hardware and software for use in computer network security and protection; technological consultation in the field of computer networking and network security; technical support, namely, monitoring of network systems and servers related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical consulting related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support services, namely, 24/7 monitoring of network application related to the design, development and management of cyber-security systems for others; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing it and application systems; software development in the field of network security, incident and fraud prevention and response, digital forensics, intrusion prevention; maintenance of computer software; software as a service (saas) services featuring software for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting software for use by others for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting cloud and datacenter infrastructure software for use by others for providing security and protection in relation to security and protection computer software
606
ABANDONED - NO STATEMENT OF USE FILED
2019-09-23
2020-05-31
DEVICESHIELD ForceShield, Inc.
2017-12-05
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer hardware; computer hardware, namely, firewalls and networks security devices; computer software for security and protection, namely, software for providing web security and protection, detecting suspicious or malicious user activity and cyber-related threats, monitoring of computer systems for detecting unauthorized access or data breach; computer software, namely, software for protecting applications by concealing or reshaping the interfaces of a website; computer software for providing security and protection of data, networks and communications; downloadable computer software for providing security and protection of data, networks and communications; computer software for identifying and preventing malicious attacks, unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, boot kits, backdoors, cyber-attacks, malicious attacks and advanced persistent threats; computer hardware, namely, network security appliances in the nature of network access server hardware, and network management stations in the nature of computer network server; computer software, namely, network security software applications for controlling and managing access server applications; computer software featuring self-protection mechanisms for detecting and removing computer viruses for vulnerable systems, effectively extending the defense perimeter of enterprises; computer security and information technology products, namely, computer software for authorizing access to databases
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer technology consultancy; providing temporary use of non downloadable computer software, namely, software for monitoring web security and protection, detecting of suspicious or malicious user activity, monitoring unauthorized access or data breach, and cyber-related threats, monitoring of computer systems; computer security services, namely, restricting unauthorized network access by users without credentials by concealing or reshaping the interfaces of a website; providing a secure electronic online system featuring technology that monitors and allows accessing of a real time proactive defense mechanisms for vulnerable systems; monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems by remote access to ensure proper functioning; cloud computing services, namely, providing temporary use of non-downloadable cloud computing software for use in database management for computer security and prevention and mitigation of computer risks; providing on-line computer databases in the fields of computer security and prevention and mitigation of computer risks; installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; provision of technical information in the field of computer security risk and internet security risk consultancy; computer and internet security testing services, namely, threat analysis for protecting data and risk control services in the field of internet security for prevention and mitigation of computer risks; design and development of computer hardware and software for use in computer network security and protection; technological consultation in the field of computer networking and network security; technical support, namely, monitoring of network systems and servers related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical consulting related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support services, namely, 24/7 monitoring of network application related to the design, development and management of cyber-security systems for others; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing it and application systems; software development in the field of network security, incident and fraud prevention and response, digital forensics, intrusion prevention; maintenance of computer software; software as a service (saas) services featuring software for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting software for use by others for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting cloud and datacenter infrastructure software for use by others for providing security and protection in relation to security and protection computer software
606
ABANDONED - NO STATEMENT OF USE FILED
2019-09-23
2020-05-31
GATEWAYSHIELD ForceShield, Inc.
First 1 Last  1 of 1
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.