BI.ZONE

USPTO USPTO 2018 REGISTERED

Schützen Sie diese Marke vor Nachahmern!

Mit unserer Markenüberwachung werden Sie automatisch per E-Mail über Nachahmer und Trittbrettfahrer benachrichtigt.

Die US-Marke BI.ZONE wurde als Wort-Bildmarke am 24.08.2018 beim Amerikanischen Patent- und Markenamt angemeldet.
Sie wurde am 24.03.2020 im Markenregister eingetragen. Der aktuelle Status der Marke ist "REGISTERED".

Markendetails

Markenform Wort-Bildmarke
Aktenzeichen 79248988
Registernummer 6015630
Anmeldedatum 24. August 2018
Veröffentlichungsdatum 07. Januar 2020
Eintragungsdatum 24. März 2020

Markeninhaber

Markenvertreter

Waren und Dienstleistungen

9 Downloadable computer software for protection, monitoring, authenticating and securing of data on computers, computer networks, endpoints and mobile devices; downloadable computer software for endpoint detection and response; downloadable computer game software; downloadable computer programs for protection, monitoring, authenticating and securing of data on computers, computer networks, endpoints and mobile devices; downloadable computer programs for endpoint detection and response; downloadable computer operating programs; downloadable computer application software for mobile phones, handheld computers, desktop computers, servers, namely, software for endpoint detection and response
35 Collection of information into computer databases in the field of cybersecurity; systemization of information into computer databases; computerized database management; collection of information into computer database for use as a web-based catalogue in the field of cybersecurity; providing business information via a website; business efficiency expert services; collection and systemization of information into computer databases, and compilation and analysis of business data and information stored in such computer databases; on-line data processing services
38 Providing access to databases; computer aided transmission of messages and images; transmission of digital files
42 Data security consultancy; computer virus protection services; electronic monitoring of credit card activity to detect fraud via the internet; electronic monitoring of personal identifying information to detect information theft via the Internet; computer system analysis; recovery of computer data; installation of computer software; scientific research; technical research in the field of cybersecurity; information technology [IT] consultancy; technological consultancy in the technology field of cybersecurity; engineering; computer software consultancy; updating of computer software; monitoring of computer systems to detect breakdowns; monitoring of computer systems by remote access to ensure proper functioning; software as a service [SaaS] services featuring software for threat intelligence, fraud analysis, email security, web application security, DDoS protection, DNS security; maintenance of computer software; providing information on computer technology and programming via a website; conversion of computer programs and data, other than physical conversion; computer system design; data encryption services; development and testing of computer software; research and analysis of malicious software; computer security consultancy in the field of the occurrence of information security incidents and elimination of vulnerabilities; monitoring of computer systems for detecting unauthorized access or data breach; computer security services, namely, restricting unauthorized network access to hard drives, computer networks, and websites from malicious online resources and Internet fraud committed in order to gain access to confidential data of Internet users; maintenance of computer software relating to computer security and prevention of computer risks; website load testing services; computer and technical services, namely, computer security threat analysis for protecting data featuring threat intelligence, fraud analysis, endpoint detection and response, managed detection and response service, all to ensure the security of computer data, personal data and financial data, as well as to detect unauthorized access to data and information; testing of computer hardware, software and application software with regard to security level; rental of application software; design and development of on-line computer software systems for data input, output, processing, display and storage; computer software development in the field of cybersecurity and updating of computer software; computer programming and computer software design; technological research in the field of computer programs and software; testing of computer hardware and computer programs
45 Intellectual property consultancy; inspection of factories for safety purposes; monitoring of burglar and security alarms; online tracking of stolen property; private investigation specializing in information security incidents
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen

ID: 1379248988