Trademarks owned by Red 5 Holdings, Inc. | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks
owned Red 5 Holdings, Inc. owned Red 5 Holdings, Inc.

Trademarks owned by 'Red 5 Holdings, Inc.'

Summary of page content
2019-07-10
6122126
2020-08-11
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of cyber and physical protection; computer security threat analysis for protecting data; data security consultancy; development of security systems and contingency planning for information systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; engineering and system analysis in the field of home security systems; testing of security systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer network and data security services, namely, computer network vulnerability assessment; providing temporary use of non-downloadable computer software for internet security, security vulnerability assessment, and managed security solutions; computer systems and network management for others in the fields of internet security, security vulnerability assessment, and managed security solutions in the nature of management of wireless computer networks for others; remote monitoring of computer systems and networks for others to ensure internet security and protection from vulnerability from viruses, malware and hackers; providing temporary use of on-line non-downloadable computer software for security awareness training, simulation of security attacks, and vulnerability assessments; conducting security audits of computer network systems in the nature of monitoring technological functions of computer network systems; providing cybersecurity consulting and threat assessment in the nature of computer security threat analysis for protecting data; computer security consultancy services, namely, providing assessment of crisis action planning comprised of cyber security audits to assess computer security vulnerability, vulnerability and threat detection analysis, monitoring of computer systems and computer networks for computer security purposes, computer network traffic monitoring and analysis, computer network identity monitoring and management, computer network access and authentication monitoring and management, and continuity of operations response, namely, conducting recovery operations for the recovery of computers; computer security consulting services in the field of computer security threat assessment for protecting data
700
REGISTERED
2020-08-11
2020-08-11
security click data certified manager protection kids truste statement plus control esrb internet trust matters hipaa staff personal online card
2019-03-13
5878708
2019-10-08
US
  • 35
    Advertising; business management; business administration; office functions
    arranging for others the repair and replacement of home security systems; business assistance, advisory and consulting services in the field of the foreign corrupt practices act (fcpa) industry, only for business and commercial purposes; business risk assessment services
  • 41
    Education; providing of training; entertainment; sporting and cultural activities
    educational services, namely, conducting classes, seminars, conferences, and workshops in the field of security, and distributing course materials in connection therewith; educational services, namely, conducting online classes, seminars, conferences, and workshops in the field of security, and distributing course materials in connection therewith
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of cyber and physical protection; computer security threat analysis for protecting data; data security consultancy; design and development of electronic data security systems; design and development of home security systems; development of security systems and contingency planning for information systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; engineering and system analysis in the field of home security systems; testing of security systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer network and data security services, namely, computer network vulnerability assessment; providing temporary use of non-downloadable computer software for internet security, security vulnerability assessment, and managed security solutions; computer systems and network management for others in the fields of internet security, security vulnerability assessment, and managed security solutions in the nature of management of wireless computer networks for others; remote monitoring of computer systems and networks for others to ensure internet security and protection from vulnerability from viruses, malware and hackers; providing temporary use of on-line non-downloadable computer software for security awareness training, simulation of security attacks, and vulnerability assessments; conducting security audits of computer network systems in the nature of monitoring technological functions of computer network systems; providing cybersecurity consulting and threat assessment in the nature of computer security threat analysis for protecting data; computer security consultancy services, namely, providing assessment of crisis action planning comprised of cyber security audits to assess computer security vulnerability, vulnerability and threat detection analysis, monitoring of computer systems and computer networks for computer security purposes, computer network traffic monitoring and analysis, computer network identity monitoring and management, computer network access and authentication monitoring and management, and continuity of operations response, namely, conducting recovery operations for the recovery of computers; computer security consulting services in the field of computer security threat assessment for protecting data
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    security guard services; security guarding for facilities; security services, namely, armed escorts and security personnel for protecting personal property of various individuals and businesses; security services, namely, providing executive protection; security threat analysis for protecting personal property; consultancy services in the field of home security; personal security consultation; physical security consultancy; providing security surveillance of premises for others; providing information in the field of personal physical security; physical security audits being a security threat analysis for protecting personal property and public safety; corporate security services namely, physical security audits, threat assessments, information technology security audits, executive protection programs, technical countermeasure security programs and security contingency planning all in the nature of being a security threat analysis for protecting personal property and public safety; security due diligence services for individuals or businesses in the nature of detailed security briefings, vetting of local personnel, and providing information on sustainable security measures; threat assessments of physical security; consulting services in the field of security threat assessment, and threat management for protecting public safety and personal property; remote monitoring of security alarm services for protecting personal property in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing; providing information in the field of emergency response preparedness, personal safety, physical security, and threat assessment of physical security and personal safety; security guard services, namely, intrusion detection services, intrusion prevention services, vulnerability assessment services all for preventing the intrusion of burglars and protecting physical security and personal safety; security services for individuals and business persons traveling internationally and domestically, namely, providing foreign country security briefings, embassy information and security reports for security purposes
700
REGISTERED
2019-10-08
2020-05-31
group blue energy river rock green star power gold ribbon lion hot white carpet wine little ale black baron brand
2019-03-13
5878711
2019-10-08
US
5
Trademark Image
The mark consists of a shield with the number "five" in the center and a sword going over the top of the number "five" and then under the upper curve of the number "five" and then over the bottom curve of the number "five".
  • 35
    Advertising; business management; business administration; office functions
    arranging for others the repair and replacement of home security systems; business assistance, advisory and consulting services in the field of the foreign corrupt practices act (fcpa) industry, only for business and commercial purposes; business risk assessment services
  • 41
    Education; providing of training; entertainment; sporting and cultural activities
    educational services, namely, conducting classes, seminars, conferences, and workshops in the field of security, and distributing course materials in connection therewith; educational services, namely, conducting online classes, seminars, conferences, and workshops in the field of security, and distributing course materials in connection therewith
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of cyber and physical protection; computer security threat analysis for protecting data; data security consultancy; design and development of electronic data security systems; design and development of home security systems; development of security systems and contingency planning for information systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; engineering and system analysis in the field of home security systems; testing of security systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer network and data security services, namely, computer network vulnerability assessment; providing temporary use of non-downloadable computer software for internet security, security vulnerability assessment, and managed security solutions; computer systems and network management for others in the fields of internet security, security vulnerability assessment, and managed security solutions in the nature of management of wireless computer networks for others; remote monitoring of computer systems and networks for others to ensure internet security and protection from vulnerability from viruses, malware and hackers; providing temporary use of on-line non-downloadable computer software for security awareness training, simulation of security attacks, and vulnerability assessments; conducting security audits of computer network systems in the nature of monitoring technological functions of computer network systems; providing cybersecurity consulting and threat assessment in the nature of computer security threat analysis for protecting data; computer security consultancy services, namely, providing assessment of crisis action planning comprised of cyber security audits to assess computer security vulnerability, vulnerability and threat detection analysis, monitoring of computer systems and computer networks for computer security purposes, computer network traffic monitoring and analysis, computer network identity monitoring and management, computer network access and authentication monitoring and management, and continuity of operations response, namely, conducting recovery operations for the recovery of computers; computer security consulting services in the field of computer security threat assessment for protecting data
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    security guard services; security guarding for facilities; security services, namely, armed escorts and security personnel for protecting personal property of various individuals and businesses; security services, namely, providing executive protection; security threat analysis for protecting personal property; consultancy services in the field of home security; personal security consultation; physical security consultancy; providing security surveillance of premises for others; providing information in the field of personal physical security; physical security audits being a security threat analysis for protecting personal property and public safety; corporate security services namely, physical security audits, threat assessments, information technology security audits, executive protection programs, technical countermeasure security programs and security contingency planning all in the nature of being a security threat analysis for protecting personal property and public safety; security due diligence services for individuals or businesses in the nature of detailed security briefings, vetting of local personnel, and providing information on sustainable security measures; threat assessments of physical security; consulting services in the field of security threat assessment, and threat management for protecting public safety and personal property; remote monitoring of security alarm services for protecting personal property in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing; providing information in the field of emergency response preparedness, personal safety, physical security, and threat assessment of physical security and personal safety; security guard services, namely, intrusion detection services, intrusion prevention services, vulnerability assessment services all for preventing the intrusion of burglars and protecting physical security and personal safety; security services for individuals and business persons traveling internationally and domestically, namely, providing foreign country security briefings, embassy information and security reports for security purposes
700
REGISTERED
2019-10-08
2020-05-31
group blue energy river rock green star power gold ribbon lion hot white carpet wine little ale black baron brand
2018-09-20
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    building security systems comprising software and hardware for providing picture, video, alarm status, building plans, and other information to a remote station; electronic video surveillance products, namely, electronic components of security systems; software for ensuring the security of electronic mail
  • 35
    Advertising; business management; business administration; office functions
    arranging for others the repair and replacement of residential appliances, home security systems and consumer goods
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of cyber and physical protection; computer security threat analysis for protecting data; data security consultancy; design and development of electronic data security systems; design and development of home security systems; development of security systems and contingency planning for information systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; engineering and system analysis in the field of home security systems; testing of security systems
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    security guard services; security guarding for facilities; security services, namely, armed escorts and security personnel for various individuals and businesses; security services, namely, providing executive protection; security threat analysis for protecting personal property; consultancy services in the field of home security; personal security consultation; physical security consultancy; providing security surveillance of premises for others; providing information in the field of personal physical security
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2019-08-14
2020-05-31
group security click data certified manager protection kids truste statement plus control esrb internet trust matters hipaa staff personal online
First 1 Last  1 of 1
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.