Trademarks owned by Petronella Technology Group, Inc. | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks
owned Petronella Technology Group, Inc. owned Petronella Technology Group, Inc.

Trademarks owned by 'Petronella Technology Group, Inc.'

Summary of page content
2020-12-10
US
P
Trademark Image
The mark consists of a stylized letter "P" surrounded by three swirl shapes, forming a circle design around the letter P, with small square shapes appearing at the ends of the swirl designs.
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    information technology consulting services; consulting in the field of information technology; consulting services in the fields of cybersecurity, information security, computer security, network security and monitoring of information technology infrastructure for computer and network security purposes; computer and network security services in the nature of computer and network monitoring services for the purpose of cyber security and information technology network security; providing assessment of threats to information technology networks; computer and digital forensic services; computer research services, namely, computer security threat analysis for protecting data; data mining; digital watermarking; industrial analysis and research services in the field of computer software and data security; design and development of computer hardware and software; computer software design and development, industrial analysis and research, data protection, computer security; computer services, namely, encrypted data recovery services; data encryption services; computer and digital forensic services; computer software testing, namely, source code review; computer forensics; computer security audits, namely, scanning and penetration testing of computers and networks to assess information regarding security vulnerability; computer security consultancy; computer services, namely, hosting of digital content on the internet; computer security consultancy in the field of analyzing, preventing and detecting digital and online threats consisting of computer virus, malware and phishing attacks; cybersecurity services, namely, updating of computer software relating to computer security and prevention of computer risks; computer cyber security services, namely, hard drive erasure; information technology consultation in the field of turnaround and crisis management; cyber security services, namely, monitoring of computer systems for detecting unauthorized access or data breach, computer security threat analysis for protecting data, computer security consultancy; cyber security consulting, mitigation and services, namely, computer security consultancy, data security consultancy, internet security consultancy; software as a service (saas) services featuring secure software that enables encryption and protection of data; software as a service (saas) services featuring software for preventing, investigating, and responding to cyber security incidents by tracking, analyzing, and managing data; software as a service (saas) services featuring software for monitoring, managing, and securing computer systems, networks, and digital assets
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2021-02-18
2021-02-23
information solutions consulting business management marketing international services systems design law medical power health global life research partners energy performance
2020-12-10
US
P
Trademark Image
The mark consists of a stylized letter "P" with a green circle in the center of the letter P, surrounded by three swirl shapes, the top swirl shape being green colored, a blue swirl shape to the right of the letter P, and a grey swirl shape to the left of the letter P, all forming a circle design around the letter P, with small square shapes appearing at the ends of the swirl designs, in the corresponding colors of the swirl shapes.
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    information technology consulting services; consulting in the field of information technology; consulting services in the fields of cybersecurity, information security, computer security, network security and monitoring of information technology infrastructure for computer and network security purposes; computer and network security services in the nature of computer and network monitoring services for the purpose of cyber security and information technology network security; providing assessment of threats to information technology networks; computer and digital forensic services; computer research services, namely, computer security threat analysis for protecting data; data mining; digital watermarking; industrial analysis and research services in the field of computer software and data security; design and development of computer hardware and software; computer software design and development, industrial analysis and research, data protection, computer security; computer services, namely, encrypted data recovery services; data encryption services; computer and digital forensic services; computer software testing, namely, source code review; computer forensics; computer security audits, namely, scanning and penetration testing of computers and networks to assess information regarding security vulnerability; computer security consultancy; computer services, namely, hosting of digital content on the internet; computer security consultancy in the field of analyzing, preventing and detecting digital and online threats consisting of computer virus, malware and phishing attacks; cybersecurity services, namely, updating of computer software relating to computer security and prevention of computer risks; computer cyber security services, namely, hard drive erasure; information technology consultation in the field of turnaround and crisis management; cyber security services, namely, monitoring of computer systems for detecting unauthorized access or data breach, computer security threat analysis for protecting data, computer security consultancy; cyber security consulting, mitigation and services, namely, computer security consultancy, data security consultancy, internet security consultancy; software as a service (saas) services featuring secure software that enables encryption and protection of data; software as a service (saas) services featuring software for preventing, investigating, and responding to cyber security incidents by tracking, analyzing, and managing data; software as a service (saas) services featuring software for monitoring, managing, and securing computer systems, networks, and digital assets
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2021-02-18
2021-02-23
information solutions consulting business management marketing international services systems design law medical power health global life research partners energy performance
2020-12-10
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    information technology consulting services; consulting in the field of information technology; consulting services in the fields of cybersecurity, information security, computer security, network security and monitoring of information technology infrastructure for computer and network security purposes; computer and network security services in the nature of computer and network monitoring services for the purpose of cyber security and information technology network security; providing assessment of threats to information technology networks; computer and digital forensic services; computer research services, namely, computer security threat analysis for protecting data; data mining; digital watermarking; industrial analysis and research services in the field of computer software and data security; design and development of computer hardware and software; computer software design and development, industrial analysis and research, data protection, computer security; computer services, namely, encrypted data recovery services; data encryption services; computer and digital forensic services; computer software testing, namely, source code review; computer forensics; computer security audits, namely, scanning and penetration testing of computers and networks to assess information regarding security vulnerability; computer security consultancy; computer services, namely, hosting of digital content on the internet; computer security consultancy in the field of analyzing, preventing and detecting digital and online threats consisting of computer virus, malware and phishing attacks; cybersecurity services, namely, updating of computer software relating to computer security and prevention of computer risks; computer cyber security services, namely, hard drive erasure; information technology consultation in the field of turnaround and crisis management; cyber security services, namely, monitoring of computer systems for detecting unauthorized access or data breach, computer security threat analysis for protecting data, computer security consultancy; cyber security consulting, mitigation and services, namely, computer security consultancy, data security consultancy, internet security consultancy; software as a service (saas) services featuring secure software that enables encryption and protection of data; software as a service (saas) services featuring software for preventing, investigating, and responding to cyber security incidents by tracking, analyzing, and managing data; software as a service (saas) services featuring software for monitoring, managing, and securing computer systems, networks, and digital assets
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2021-02-18
2021-02-19
information solutions consulting business management marketing international services systems design law medical power health global life research partners energy performance
2021-02-02
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    information technology consulting services; consulting in the field of information technology; consulting services in the fields of cybersecurity, information security, computer security, network security and monitoring of information technology infrastructure for computer and network security purposes; computer and network security services in the nature of computer and network monitoring services for the purpose of cyber security and information technology network security; providing assessment of threats to information technology networks; computer and digital forensic services; computer research services, namely, computer security threat analysis for protecting data; data mining; digital watermarking; industrial analysis and research services in the field of computer software and data security; design and development of computer hardware and software; computer software design and development, industrial analysis and research, data protection, computer security; computer services, namely, encrypted data recovery services; data encryption services; computer and digital forensic services; computer software testing, namely, source code review; computer forensics; computer security audits, namely, scanning and penetration testing of computers and networks to assess information regarding security vulnerability; computer security consultancy; computer services, namely, hosting of digital content on the internet; computer security consultancy in the field of analyzing, preventing and detecting digital and online threats consisting of computer virus, malware and phishing attacks; cybersecurity services, namely, updating of computer software relating to computer security and prevention of computer risks; computer cyber security services, namely, hard drive erasure; information technology consultation in the field of turnaround and crisis management; cyber security services, namely, monitoring of computer systems for detecting unauthorized access or data breach, computer security threat analysis for protecting data, computer security consultancy; cyber security consulting, mitigation and services, namely, computer security consultancy, data security consultancy, internet security consultancy; software as a service (saas) services featuring secure software that enables encryption and protection of data; software as a service (saas) services featuring software for preventing, investigating, and responding to cyber security incidents by tracking, analyzing, and managing data; software as a service (saas) services featuring software for monitoring, managing, and securing computer systems, networks, and digital assets; regulatory compliance consulting in the field of information technology, cybersecurity and healthcare; reviewing standards and practices to assure compliance with information technology, cybersecurity and healthcare laws and regulations; tracking and monitoring regulatory requirements in the field of information technology, cybersecurity and healthcare for regulatory compliance
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2021-02-05
2021-02-06
systems information services solutions consulting business management network international home life medical health global communications digital building incorporated financial homeland
2021-01-21
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    information technology consulting services; consulting in the field of information technology; consulting services in the fields of cybersecurity, information security, computer security, network security and monitoring of information technology infrastructure for computer and network security purposes; computer and network security services in the nature of computer and network monitoring services for the purpose of cyber security and information technology network security; providing assessment of threats to information technology networks; computer and digital forensic services; computer research services, namely, computer security threat analysis for protecting data; data mining; digital watermarking; industrial analysis and research services in the field of computer software and data security; design and development of computer hardware and software; computer software design and development, industrial analysis and research, data protection, computer security; computer services, namely, encrypted data recovery services; data encryption services; computer and digital forensic services; computer software testing, namely, source code review; computer forensics; computer security audits, namely, scanning and penetration testing of computers and networks to assess information regarding security vulnerability; computer security consultancy; computer services, namely, hosting of digital content on the internet; computer security consultancy in the field of analyzing, preventing and detecting digital and online threats consisting of computer virus, malware and phishing attacks; cybersecurity services, namely, updating of computer software relating to computer security and prevention of computer risks; computer cyber security services, namely, hard drive erasure; information technology consultation in the field of turnaround and crisis management; cyber security services, namely, monitoring of computer systems for detecting unauthorized access or data breach, computer security threat analysis for protecting data, computer security consultancy; cyber security consulting, mitigation and services, namely, computer security consultancy, data security consultancy, internet security consultancy; software as a service (saas) services featuring secure software that enables encryption and protection of data; software as a service (saas) services featuring software for preventing, investigating, and responding to cyber security incidents by tracking, analyzing, and managing data; software as a service (saas) services featuring software for monitoring, managing, and securing computer systems, networks, and digital assets; regulatory compliance consulting in the field of information technology, cybersecurity and healthcare; reviewing standards and practices to assure compliance with information technology, cybersecurity and healthcare laws and regulations; tracking and monitoring regulatory requirements in the field of information technology, cybersecurity and healthcare for regulatory compliance
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2021-01-25
2021-01-29
services systems international care certified management solutions center system insider healthcare environmental program training regulatory manager solution safety security global
2021-01-21
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    information technology consulting services; consulting in the field of information technology; consulting services in the fields of cybersecurity, information security, computer security, network security and monitoring of information technology infrastructure for computer and network security purposes; computer and network security services in the nature of computer and network monitoring services for the purpose of cyber security and information technology network security; providing assessment of threats to information technology networks; computer and digital forensic services; computer research services, namely, computer security threat analysis for protecting data; data mining; digital watermarking; industrial analysis and research services in the field of computer software and data security; design and development of computer hardware and software; computer software design and development, industrial analysis and research, data protection, computer security; computer services, namely, encrypted data recovery services; data encryption services; computer and digital forensic services; computer software testing, namely, source code review; computer forensics; computer security audits, namely, scanning and penetration testing of computers and networks to assess information regarding security vulnerability; computer security consultancy; computer services, namely, hosting of digital content on the internet; computer security consultancy in the field of analyzing, preventing and detecting digital and online threats consisting of computer virus, malware and phishing attacks; cybersecurity services, namely, updating of computer software relating to computer security and prevention of computer risks; computer cyber security services, namely, hard drive erasure; information technology consultation in the field of turnaround and crisis management; cyber security services, namely, monitoring of computer systems for detecting unauthorized access or data breach, computer security threat analysis for protecting data, computer security consultancy; cyber security consulting, mitigation and services, namely, computer security consultancy, data security consultancy, internet security consultancy; software as a service (saas) services featuring secure software that enables encryption and protection of data; software as a service (saas) services featuring software for preventing, investigating, and responding to cyber security incidents by tracking, analyzing, and managing data; software as a service (saas) services featuring software for monitoring, managing, and securing computer systems, networks, and digital assets; regulatory compliance consulting in the field of information technology, cybersecurity and healthcare; reviewing standards and practices to assure compliance with information technology, cybersecurity and healthcare laws and regulations; tracking and monitoring regulatory requirements in the field of information technology, cybersecurity and healthcare for regulatory compliance
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2021-01-25
2021-01-29
services systems international care certified management solutions center system insider healthcare environmental program training regulatory manager solution safety security global
2020-12-10
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    information technology consulting services; consulting in the field of information technology; consulting services in the fields of cybersecurity, information security, computer security, network security and monitoring of information technology infrastructure for computer and network security purposes; computer and network security services in the nature of computer and network monitoring services for the purpose of cyber security and information technology network security; providing assessment of threats to information technology networks; computer and digital forensic services; computer research services, namely, computer security threat analysis for protecting data; data mining; digital watermarking; industrial analysis and research services in the field of computer software and data security; design and development of computer hardware and software; computer software design and development, industrial analysis and research, data protection, computer security; computer services, namely, encrypted data recovery services; data encryption services; computer and digital forensic services; computer software testing, namely, source code review; computer forensics; computer security audits, namely, scanning and penetration testing of computers and networks to assess information regarding security vulnerability; computer security consultancy; computer services, namely, hosting of digital content on the internet; computer security consultancy in the field of analyzing, preventing and detecting digital and online threats consisting of computer virus, malware and phishing attacks; cybersecurity services, namely, updating of computer software relating to computer security and prevention of computer risks; computer cyber security services, namely, hard drive erasure; information technology consultation in the field of turnaround and crisis management; cyber security services, namely, monitoring of computer systems for detecting unauthorized access or data breach, computer security threat analysis for protecting data, computer security consultancy; cyber security consulting, mitigation and services, namely, computer security consultancy, data security consultancy, internet security consultancy; software as a service (saas) services featuring secure software that enables encryption and protection of data; software as a service (saas) services featuring software for preventing, investigating, and responding to cyber security incidents by tracking, analyzing, and managing data; software as a service (saas) services featuring software for monitoring, managing, and securing computer systems, networks, and digital assets
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2021-02-18
2021-02-19
information solutions consulting business management marketing international services systems design law medical power health global life research partners energy performance
2019-04-11
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    it services
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2020-01-22
2020-05-31
information solutions consulting business management marketing international services systems design law medical power health global life research partners energy performance
First 1 Last  1 of 1
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.