Trademark: 98781287
Word
MARO
Status
Pending
Status Code
630
Status Date
Wednesday, October 2, 2024
Serial Number
98781287
Mark Type
4
Filing Date
Tuesday, October 1, 2024

Trademark Owner History

Classifications
9 Downloadable anti-piracy software; Downloadable anti-spyware software; Downloadable computer software for computer network and computer system security, enterprise system management, network management, and monitoring; Downloadable computer software for protecting businesses and customer data from malware and hackers; Downloadable computer software for internet security, security vulnerability assessment, security awareness training, compliance monitoring, compliance tracking, and managed security solutions; Downloadable computer software for use in the field of cybersecurity for assisting in IT risk management, network analysis, and threat identification and protection; Downloadable computer software for use in collecting, filtering, normalizing, enriching, processing, and analyzing system, application, and security event data from computers and computer networks; Downloadable computer software for use in transmitting and receiving system, application, and security event data from computers and computer networks for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, and network attacks and breaches; Downloadable computer software for monitoring, analyzing, and reporting on event data from computers and computer networks for analysis and action by security administrators or security software; Downloadable computer software for use in providing a secure connection for security log and event data between computers, mobile devices, computer networks, and hosted security software; Downloadable computer software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming event transmission; Downloadable computer software for scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Downloadable computer software for use by others for detecting, blocking, and removing computer viruses and threats; Downloadable computer software for identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Downloadable computer software for managing security and access control to computer networks and network devices; Downloadable computer software for imaging, updating, and maintaining security and access control to computers; Downloadable computer software for remotely and securely managing computers, other electronic devices, and the content on those computers and devices; Downloadable computer software for surveillance, security, cybersecurity, cybersecurity control, cybersecurity warning, data security, managing business processes, authentication services, and enhancement of business productivity; Downloadable computer software for monitoring and controlling communication between computers and automated machine systems; Downloadable computer software for ollecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; Downloadable computer software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; Downloadable computer software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; Downloadable computer software for use in analyzing and monitoring computer networks and network access; Downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; Downloadable computer software for the creation of firewalls; Downloadable computer anti-virus software
42 Computer services, namely, computer system administration for others; Computer services, namely, on-site management of information technology (IT) systems of others; Computer virus protection services; Monitoring of computer systems for detecting unauthorized access or data breach; Services for maintenance of computer software; Consultation services relating to computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Outsource service providers in the field of information technology relating to installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for computer network and computer system security, enterprise system management, network management, and monitoring; Software as a service (SAAS) services featuring software for protecting businesses and customer data from malware and hackers; Software as a service (SAAS) services featuring software for internet security, security vulnerability assessment, security awareness training, compliance monitoring, compliance tracking, and managed security solutions; Software as a service (SAAS) services featuring software for use in the field of cybersecurity for assisting in IT risk management, network analysis, and threat identification and protection; Software as a service (SAAS) services featuring software for use in collecting, filtering, normalizing, enriching, processing, and analyzing system, application, and security event data from computers and computer networks; Software as a service (SAAS) services featuring software for use in transmitting and receiving system, application, and security event data from computers and computer networks for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, and network attacks and breaches; Software as a service (SAAS) services featuring software for monitoring, analyzing, and reporting on event data from computers and computer networks for analysis and action by security administrators or security software; Software as a service (SAAS) services featuring software for use in providing a secure connection for security log and event data between computers, mobile devices, computer networks, and hosted security software; Software as a service (SAAS) services featuring software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming event transmission; Software as a service (SAAS) services featuring software for scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Software as a service (SAAS) services featuring software for use by others for detecting, blocking, and removing computer viruses and threats; Software as a service (SAAS) services featuring software for identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Software as a service (SAAS) services featuring software for managing security and access control to computer networks and network devices; Software as a service (SAAS) services featuring software for imaging, updating, and maintaining security and access control to computers; Software as a service (SAAS) services featuring software for remotely and securely managing computers, other electronic devices, and the content on those computers and devices; Software as a service (SAAS) services featuring software for surveillance, security, cybersecurity, cybersecurity control, cybersecurity warning, data security, managing business processes, authentication services, and enhancement of business productivity; Software as a service (SAAS) services featuring software for monitoring and controlling communication between computers and automated machine systems; Software as a service (SAAS) services featuring software for ollecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; Software as a service (SAAS) services featuring software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; Software as a service (SAAS) services featuring software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; Software as a service (SAAS) services featuring software for use in analyzing and monitoring computer networks and network access; Software as a service (SAAS) services featuring software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; Software as a service (SAAS) services featuring software for the creation of firewalls; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Updating of computer software relating to computer security and prevention of computer risks
The wording "MARO" has no meaning in a foreign language.

Trademark Events
Oct 2, 2024
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24