About 4 Trade marks found for “OPTIV ”
Filters
Mark | Details | Status | Class/Description | |
---|---|---|---|---|
OPTIV OPTIV PARENT INC. UK00914612659 | Registered | Computer software, namely, cyber security software; computer software ... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software, namely, cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware. Class 035 Class 035 Advertising, Business & Retail Services Value-added re-seller services, namely, distributorship services featuring cyber security, computer security, network security, application security, data security and information technology products; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments. ... Class 037 Construction and Repair Services Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security. Class 041 Education and Entertainment Services Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security products, computer security products, network security products, and information technology products; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and nondownloadable publications in the nature of articles in the field of cyber security. Class 042 Computer & Software Services & Scientific Services Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; incident response, namely, analyzing and resolving cyber incidents and security breach incidents; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; testing of computer software and networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; security services, namely, providing security assessments and security risk assessments of information systems and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of information systems and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes. Class 045 Personal & Legal & Social Services Reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations and working environments, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations and working environments, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing security assessments for businesses and governmental agencies; security consultancy services. | ||
![]() | optiv Antler Office Furniture Ltd UK00002311238 | Dead | Office furniture. Class 020 Class 020 Furniture Products Office furniture. | |
![]() | OPTIV OPTIV PARENT INC. UK00914731582 | Registered | Computer software, namely, cyber security software; computer software ... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software, namely, cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware. Class 035 Class 035 Advertising, Business & Retail Services Value-added re-seller services, namely, distributorship services featuring cyber security, computer security, network security, application security, data security and information technology products; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments. ... Class 037 Construction and Repair Services Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security. Class 041 Education and Entertainment Services Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security products, computer security products, network security products, and information technology products; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and nondownloadable publications in the nature of articles in the field of cyber security. Class 042 Computer & Software Services & Scientific Services Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; incident response, namely, analyzing and resolving cyber incidents and security breach incidents; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; testing of computer software and networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; security services, namely, providing security assessments and security risk assessments of information systems and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of information systems and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes. Class 045 Personal & Legal & Social Services Reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations and working environments, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations and working environments, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing security assessments for businesses and governmental agencies; security consultancy services. | |
![]() | OPTIV SECURITY OPTIV PARENT INC. UK00914731591 | Registered | Computer software, namely, cyber security software; computer software ... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software, namely, cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware. Class 035 Class 035 Advertising, Business & Retail Services Value-added re-seller services, namely, distributorship services featuring cyber security, computer security, network security, application security, data security and information technology products; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments. ... Class 037 Construction and Repair Services Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security. Class 041 Education and Entertainment Services Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security products, computer security products, network security products, and information technology products; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and nondownloadable publications in the nature of articles in the field of cyber security. Class 042 Computer & Software Services & Scientific Services Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; incident response, namely, analyzing and resolving cyber incidents and security breach incidents; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; testing of computer software and networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; security services, namely, providing security assessments and security risk assessments of information systems and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of information systems and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes. Class 045 Personal & Legal & Social Services Reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations and working environments, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations and working environments, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing security assessments for businesses and governmental agencies; security consultancy services. |
OPTIV PARENT INC.
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer software, namely, cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware.
035
Class 035
Advertising, Business & Retail Services
Value-added re-seller services, namely, distributorship services featuring cyber security, computer security, network security, application security, data security and information technology products; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments.
...
Class 037
Construction and Repair Services
Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security.
Class 041
Education and Entertainment Services
Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security products, computer security products, network security products, and information technology products; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and nondownloadable publications in the nature of articles in the field of cyber security.
Class 042
Computer & Software Services & Scientific Services
Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; incident response, namely, analyzing and resolving cyber incidents and security breach incidents; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; testing of computer software and networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; security services, namely, providing security assessments and security risk assessments of information systems and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of information systems and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes.
Class 045
Personal & Legal & Social Services
Reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations and working environments, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations and working environments, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing security assessments for businesses and governmental agencies; security consultancy services.
Computer software, namely, cyber security software; computer software ...
Antler Office Furniture Ltd
020
Class 020
Furniture Products
Office furniture.
Office furniture.
OPTIV PARENT INC.
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer software, namely, cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware.
035
Class 035
Advertising, Business & Retail Services
Value-added re-seller services, namely, distributorship services featuring cyber security, computer security, network security, application security, data security and information technology products; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments.
...
Class 037
Construction and Repair Services
Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security.
Class 041
Education and Entertainment Services
Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security products, computer security products, network security products, and information technology products; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and nondownloadable publications in the nature of articles in the field of cyber security.
Class 042
Computer & Software Services & Scientific Services
Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; incident response, namely, analyzing and resolving cyber incidents and security breach incidents; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; testing of computer software and networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; security services, namely, providing security assessments and security risk assessments of information systems and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of information systems and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes.
Class 045
Personal & Legal & Social Services
Reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations and working environments, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations and working environments, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing security assessments for businesses and governmental agencies; security consultancy services.
Computer software, namely, cyber security software; computer software ...
OPTIV PARENT INC.
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer software, namely, cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware.
035
Class 035
Advertising, Business & Retail Services
Value-added re-seller services, namely, distributorship services featuring cyber security, computer security, network security, application security, data security and information technology products; employment staffing, namely, providing on-site and remote staffing to train on and manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments.
...
Class 037
Construction and Repair Services
Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security.
Class 041
Education and Entertainment Services
Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security products, computer security products, network security products, and information technology products; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and nondownloadable publications in the nature of articles in the field of cyber security.
Class 042
Computer & Software Services & Scientific Services
Research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; binary analysis services for computer security purposes and cyber security purposes; planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; implementation and integration of technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, consultation regarding desired performance levels and reasons for optimization, evaluating the health of the system, providing upgrades to the system, updating software, applying patches, and changing configurations; product support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, gathering and analyzing real-time network information to manage and respond to security vulnerabilities and external threats computer security services in the nature of incident mitigation and response, namely, analyzing, mitigating, and resolving cyber incidents and security breach incidents; networks and communications network security services in the nature of intrusion protection, security threat analysis, vulnerability management and assessment, endpoint security management, threat analysis, incident response, and forensics and penetration testing; incident response, namely, analyzing and resolving cyber incidents and security breach incidents; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; cloud security advisory services, namely, consultation regarding cloud storage, cloud collaboration platforms, and cloud hosted enterprise applications; vulnerability assessment services, namely, assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; information technology system security breach investigation and remediation services; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technical consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud security; testing of computer software and networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; computer monitoring services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; security services, namely, providing security assessments and security risk assessments of information systems and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of information systems and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing information security risk assessments and audits; cyber security consultancy services; providing an on-line interactive website for information security personnel and experts to exchange ideas to establish best practices for secure information technology infrastructures by sharing updates, news, blogs, white papers, and information regarding events in the field of secure information technology; analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes.
Class 045
Personal & Legal & Social Services
Reviewing standards and practices and developing and implementing policies, procedure and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations and working environments, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security audits of physical locations and working environments, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; security services, namely, providing security assessments for businesses and governmental agencies; security consultancy services.
Computer software, namely, cyber security software; computer software ...
Apply for Trade mark
Select countries to protect your logo Trade mark
Trade mark Name
Country Selected
United Kingdom
£249/ 1 class + gov fee
United States
£74/ 1 class + gov fee
Canada
£448/ 1 class + gov fee
Mexico
£373/ 1 class + gov fee
European Union
£523/ 1 class + gov fee
China
£373/ 1 class + gov fee
South Korea
£522/ 1 class + gov fee
Japan
£597/ 1 class + gov fee
India
£74/ 1 class + gov fee
United Kingdom
£249/ 1 class + gov fee
Australia
£224/ 1 class + gov fee
Israel
£522/ 1 class + gov fee
United Arab Emirates
£522/ 1 class + gov fee
New Zealand
£522/ 1 class + gov fee
Brazil
£373/ 1 class + gov fee
Taiwan
£597/ 1 class + gov fee
Ukraine
£597/ 1 class + gov fee
Indonesia
£522/ 1 class + gov fee
South Africa
£373/ 1 class + gov fee
Singapore
£597/ 1 class + gov fee
Saudi Arabia
£597/ 1 class + gov fee
Afghanistan
£597/ 1 class + gov fee
Algeria
£597/ 1 class + gov fee
Argentina
£298/ 1 class + gov fee
Austria
£671/ 1 class + gov fee
Bahrain
£522/ 1 class + gov fee
Bangladesh
£448/ 1 class + gov fee
Benelux
£746/ 1 class + gov fee
Bhutan
£671/ 1 class + gov fee
Bolivia
£597/ 1 class + gov fee
Botswana
£970/ 1 class + gov fee
British Virgin Islands
£895/ 1 class + gov fee
Bulgaria
£597/ 1 class + gov fee
Cambodia
£597/ 1 class + gov fee
Chile
£373/ 1 class + gov fee
Colombia
£522/ 1 class + gov fee
Congo
£895/ 1 class + gov fee
Costa Rica
£671/ 1 class + gov fee
Croatia
£671/ 1 class + gov fee
Cyprus
£746/ 1 class + gov fee
Czech Republic
£671/ 1 class + gov fee
Denmark
£597/ 1 class + gov fee
Curacao
£895/ 1 class + gov fee
Macau
£522/ 1 class + gov fee
Dominican Republic
£671/ 1 class + gov fee
Aruba
£895/ 1 class + gov fee
Greenland
£597/ 1 class + gov fee
Ecuador
£597/ 1 class + gov fee
Egypt
£522/ 1 class + gov fee
El Salvador
£597/ 1 class + gov fee
Ethiopia
£821/ 1 class + gov fee
France
£671/ 1 class + gov fee
Gaza
£597/ 1 class + gov fee
Germany
£671/ 1 class + gov fee
Greece
£597/ 1 class + gov fee
Guatemala
£671/ 1 class + gov fee
Haiti
£671/ 1 class + gov fee
Honduras
£671/ 1 class + gov fee
Hong Kong (SAR)
£671/ 1 class + gov fee
Hungary
£821/ 1 class + gov fee
Iraq
£1,119/ 1 class + gov fee
Italy
£671/ 1 class + gov fee
Jordan
£597/ 1 class + gov fee
Kazakhstan
£597/ 1 class + gov fee
Kenya
£671/ 1 class + gov fee
Kuwait
£597/ 1 class + gov fee
Laos
£522/ 1 class + gov fee
Lebanon
£746/ 1 class + gov fee
Lesotho
£895/ 1 class + gov fee
Libya
£671/ 1 class + gov fee
Madrid Protocol (WIPO)
£1,492/ 1 class + gov fee
Malawi
£821/ 1 class + gov fee
Malaysia
£522/ 1 class + gov fee
Maldives
£746/ 1 class + gov fee
Morocco
£746/ 1 class + gov fee
Mozambique
£671/ 1 class + gov fee
Myanmar
£597/ 1 class + gov fee
Namibia
£597/ 1 class + gov fee
Nepal
£522/ 1 class + gov fee
Nicaragua
£671/ 1 class + gov fee
Norway
£671/ 1 class + gov fee
Oman
£821/ 1 class + gov fee
Pakistan
£597/ 1 class + gov fee
Panama
£671/ 1 class + gov fee
Paraguay
£671/ 1 class + gov fee
Peru
£597/ 1 class + gov fee
Philippines
£671/ 1 class + gov fee
Poland
£373/ 1 class + gov fee
Portugal
£671/ 1 class + gov fee
Puerto Rico
£671/ 1 class + gov fee
Qatar
£597/ 1 class + gov fee
Romania
£671/ 1 class + gov fee
Serbia
£671/ 1 class + gov fee
Slovakia
£671/ 1 class + gov fee
Spain
£671/ 1 class + gov fee
Sri Lanka
£522/ 1 class + gov fee
Swaziland
£970/ 1 class + gov fee
Sweden
£597/ 1 class + gov fee
Switzerland
£671/ 1 class + gov fee
Thailand
£597/ 1 class + gov fee
Tunisia
£671/ 1 class + gov fee
Turkey
£597/ 1 class + gov fee
Uganda
£522/ 1 class + gov fee
United Republic of Tanzania
£522/ 1 class + gov fee
Uruguay
£597/ 1 class + gov fee
Venezuela
£671/ 1 class + gov fee
Vietnam
£597/ 1 class + gov fee
West Bank, Palestine
£597/ 1 class + gov fee
Yemen
£1,268/ 1 class + gov fee
Albania
£671/ 1 class + gov fee
Andorra
£671/ 1 class + gov fee
Angola
£970/ 1 class + gov fee
Antigua and Barbuda
£895/ 1 class + gov fee
Armenia
£597/ 1 class + gov fee
Azerbaijan
£597/ 1 class + gov fee
Bahamas
£1,045/ 1 class + gov fee
Barbados
£970/ 1 class + gov fee
Belgium
£746/ 1 class + gov fee
Belize
£970/ 1 class + gov fee
Benin
£597/ 1 class + gov fee
Bosnia and Herzegovina
£746/ 1 class + gov fee
Brunei
£970/ 1 class + gov fee
Burkina Faso
£597/ 1 class + gov fee
Burundi
£895/ 1 class + gov fee
Cabo Verde
£671/ 1 class + gov fee
Cameroon
£597/ 1 class + gov fee
Central African Republic (CAR)
£597/ 1 class + gov fee
Chad
£597/ 1 class + gov fee
Comoros
£597/ 1 class + gov fee
Cote d'Ivoire
£597/ 1 class + gov fee
Czechia
£746/ 1 class + gov fee
Djibouti
£895/ 1 class + gov fee
Dominica
£970/ 1 class + gov fee
Equatorial Guinea
£597/ 1 class + gov fee
Eritrea
£746/ 1 class + gov fee
Estonia
£970/ 1 class + gov fee
Eswatini
£970/ 1 class + gov fee
Fiji
£671/ 1 class + gov fee
Finland
£522/ 1 class + gov fee
Gabon
£597/ 1 class + gov fee
Gambia
£671/ 1 class + gov fee
Georgia
£597/ 1 class + gov fee
Ghana
£746/ 1 class + gov fee
Grenada
£970/ 1 class + gov fee
Guinea
£597/ 1 class + gov fee
Guinea-Bissau
£597/ 1 class + gov fee
Guyana
£970/ 1 class + gov fee
Iceland
£970/ 1 class + gov fee
Ireland
£597/ 1 class + gov fee
Jamaica
£895/ 1 class + gov fee
Kiribati
£746/ 1 class + gov fee
Kosovo
£671/ 1 class + gov fee
Kyrgyzstan
£671/ 1 class + gov fee
Latvia
£522/ 1 class + gov fee
Liberia
£746/ 1 class + gov fee
Liechtenstein
£746/ 1 class + gov fee
Lithuania
£522/ 1 class + gov fee
Luxembourg
£746/ 1 class + gov fee
Madagascar
£746/ 1 class + gov fee
Mali
£597/ 1 class + gov fee
Malta
£448/ 1 class + gov fee
Marshall Islands
£746/ 1 class + gov fee
Mauritania
£597/ 1 class + gov fee
Mauritius
£746/ 1 class + gov fee
Micronesia
£746/ 1 class + gov fee
Moldova
£746/ 1 class + gov fee
Monaco
£1,045/ 1 class + gov fee
Mongolia
£448/ 1 class + gov fee
Montenegro
£671/ 1 class + gov fee
Nauru
£746/ 1 class + gov fee
Netherlands
£746/ 1 class + gov fee
Niger
£597/ 1 class + gov fee
Nigeria
£298/ 1 class + gov fee
North Macedonia
£671/ 1 class + gov fee
Palau
£746/ 1 class + gov fee
Palestine
£746/ 1 class + gov fee
Papua New Guinea
£597/ 1 class + gov fee
Rwanda
£746/ 1 class + gov fee
Saint Kitts and Nevis
£970/ 1 class + gov fee
Saint Lucia
£970/ 1 class + gov fee
Saint Vincent and the Grenadines
£970/ 1 class + gov fee
Samoa
£895/ 1 class + gov fee
San Marino
£746/ 1 class + gov fee
Sao Tome and Principe
£746/ 1 class + gov fee
Senegal
£597/ 1 class + gov fee
Seychelles
£746/ 1 class + gov fee
Sierra Leone
£746/ 1 class + gov fee
Slovenia
£671/ 1 class + gov fee
Solomon Islands
£746/ 1 class + gov fee
Somalia
£746/ 1 class + gov fee
South Sudan
£746/ 1 class + gov fee
Suriname
£1,194/ 1 class + gov fee
Tajikistan
£597/ 1 class + gov fee
Tanzania
£522/ 1 class + gov fee
Timor-Leste
£746/ 1 class + gov fee
Togo
£597/ 1 class + gov fee
Tonga
£970/ 1 class + gov fee
Trinidad and Tobago
£895/ 1 class + gov fee
Turkmenistan
£597/ 1 class + gov fee
Tuvalu
£746/ 1 class + gov fee
Uzbekistan
£522/ 1 class + gov fee
Vanuatu
£895/ 1 class + gov fee
Zambia
£671/ 1 class + gov fee
Zimbabwe
£671/ 1 class + gov fee
OAPI
£671/ 1 class + gov fee
ARIPO
£746/ 1 class + gov fee