ECHO HUNTERS

USPTO USPTO 2011 ABANDONED - NO STATEMENT OF USE FILED

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The US trademark ECHO HUNTERS was filed as Word mark on 11/03/2011 at the U.S. Patent and Trademark Office. The current status of the mark is "ABANDONED - NO STATEMENT OF USE FILED".

Trademark Details

Trademark form Word mark
File reference 85463550
Application date November 3, 2011
Publication date April 17, 2012

Trademark owner

21575 Ridgetop Circle
20166 Sterling
US

Trademark representatives

goods and services

9 Computer hardware devices for analyzing, monitoring, intercepting, capturing, logging, testing, troubleshooting, securing, and protecting computer networks, network systems, network data, network information, network performance, data packets, and internet protocol traffic, and for generating related reports and event notification alerts; computer hardware devices for on-line scanning, testing, intercepting, capturing, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer networks, network systems, network data, network information, network performance, data packets, and internet protocol traffic, and for providing related reports and event notification alerts
42 Technical support services, namely, 24x7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems involving computer networks, network systems, network data, network information, network performance, data packets; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultation in the field of computer networks, network systems, network data, network information, network performance, data packets, and internet protocol traffic, and providing related reports and event notification alerts; computer services, namely, on-line scanning and testing for viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer networks, network systems, network data, network information, network performance, data packets, and internet protocol traffic, and providing related reports and event notification alerts; computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others
45 Monitoring of computer networks, network systems, network data, network information, network performance, data packets, and internet protocol traffic for security purposes, and providing related reports and event notification alerts; analyzing data in computer databases and networks for criminal activity; computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of network and system activity which typically indicate problems such as security failures, theft, wrongdoing, training issues, or customer service issues; security services, namely, providing security assessments of computer networks and network systems

ID: 1385463550