Filters
on 23 Dec 2024
modzero GmbH
98235125 · 23 Oct 2023
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Training in software systems development; Training in software systems design; Training services in the field of software, including secure design, security software, and secure programming; educational services providing instruction and hands-on training on best practices for secure software development, including threat modeling, secure coding techniques, and vulnerability management; training programs on the design and implementation of security features in software applications, systems, and networks; workshops and courses on using security software tools for threat detection, risk assessment, and incident response; educational seminars on compliance with security standards, regulations, and industry frameworks; professional development programs focused on advanced topics in cybersecurity, including secure software architecture, encryption methods, and secure application lifecycle management; certification programs for validating expertise in security software and secure programming practices; online and in-person training sessions for developers, IT professionals, and security experts on safeguarding applications and systems against cyber threats; Training in the field of the operation of software systems;
041
Class 041
Education and Entertainment Services
The mark consists of the numeral 0 displayed in the color white on a red background.
...
Class 042
Computer & Software Services & Scientific Services
Downloadable software for use in the identification, mitigation, prevention, analysis, and management of cybersecurity threats and vulnerabilities; downloadable software for network security testing, penetration testing, vulnerability scanning, risk assessment, and security auditing; downloadable software for monitoring, detecting, and responding to cyberattacks, data breaches, and unauthorized access; downloadable software for encryption, data protection, secure communications, malware detection, and incident response; downloadable software for reporting, visualizing, and analyzing cybersecurity metrics and trends; Downloadable authentication software for identity management, access control, and authorization for users, machines, devices, and objects; downloadable software for managing digital identities, verifying credentials, and securing access to networks, systems, applications, and connected devices; downloadable software for authentication processes, including multi-factor authentication, single sign-on (SSO), and certificate-based authentication; downloadable software for enforcing access policies, managing permissions, and securing sensitive data; downloadable software for credential management, password protection, and encryption for both user and machine identities in physical, virtual, and cloud environments; Downloadable computer software for security testing, vulnerability scanning, penetration testing, and risk assessment of IT systems, networks, and applications; downloadable software for monitoring, detecting, and analyzing cybersecurity threats, vulnerabilities, and malicious activity; downloadable software for identifying and mitigating risks associated with unauthorized access, data breaches, malware, ransomware, and other cyberattacks; downloadable software for auditing, reporting, and ensuring compliance with security policies and regulations; downloadable software for security configuration management, patch management, and continuous security monitoring; downloadable software for simulating cyberattacks to assess system defenses and response capabilities; downloadable software for managing incident response, forensic analysis, and recovery after security breaches; Downloadable debugging software for quality assurance, information security research, and performance optimization of software applications, systems, and networks; downloadable software for detecting, analyzing, and resolving software bugs, vulnerabilities, and security flaws; downloadable software for identifying and mitigating security risks through real-time debugging and code analysis; downloadable software for security testing, vulnerability assessment, and penetration testing during the development and deployment of IT infrastructure; downloadable software for ensuring compliance with security standards, secure coding practices, and system integrity; downloadable software for conducting forensic analysis, incident investigation, and post-breach debugging to identify the source of cybersecurity incidents; Downloadable embedded software for providing peripheral drivers, functional logic, and secure communication protocols to microcontrollers in the field of embedded device security and research; downloadable software for securing embedded systems and firmware against unauthorized access, tampering, and malware; downloadable software for encryption, secure boot, and authentication processes in embedded devices; downloadable software for real-time monitoring, threat detection, and vulnerability analysis of embedded systems and Internet of Things (IoT) devices; downloadable software for conducting security testing, penetration testing, and risk assessments specific to firmware and hardware interfaces; downloadable software for managing secure updates, patch management, and lifecycle maintenance of embedded device firmware and software; downloadable software for auditing and ensuring compliance with embedded system security standards and regulations; Downloadable software for computer security, security hardening, and implementing security patches and enhancements across IT systems, networks, and applications; downloadable software for identifying, mitigating, and remediating vulnerabilities, security flaws, and misconfigurations; downloadable software for deploying security patches, updates, and enhancements to prevent unauthorized access, malware, ransomware, and other cyber threats; downloadable software for enhancing system defenses through configuration management, encryption, and access control; downloadable software for automated vulnerability assessments, patch management, and real-time monitoring of security postures; downloadable software for strengthening security protocols, improving system resilience, and ensuring compliance with industry security standards and regulations; downloadable software for providing security hardening recommendations, enforcing security policies, and tracking the implementation of security improvements; Downloadable software for general use in security, operation, and monitoring of computer systems, networks, and applications; downloadable software for enhancing system performance, managing system operations, and ensuring secure and efficient operation of software and hardware; Downloadable privacy protection software for analyzing, modifying, and enhancing the configuration and behavior of other software with regard to information security and privacy; downloadable software for assessing and improving the security and privacy practices of applications, systems, and data management processes; downloadable software for identifying and mitigating privacy vulnerabilities, ensuring compliance with data protection regulations, and enforcing privacy policies; downloadable software for securing sensitive information, managing user consent, and protecting personal data from unauthorized access and breaches; downloadable software for auditing software behavior, securing communication channels, and implementing encryption and anonymization techniques; downloadable software for providing insights into privacy risks, generating compliance reports, and offering recommendations for enhancing overall privacy and data protection measures; Downloadable hardware testing software for quality assurance, information security research, and analysis of electronic and embedded systems; downloadable software for evaluating hardware performance, reliability, and compliance with industry standards; downloadable software for conducting security assessments, vulnerability scanning, and penetration testing on hardware components and embedded systems; downloadable software for analyzing and detecting potential security weaknesses, unauthorized access points, and susceptibility to cyber threats; downloadable software for stress testing hardware under various operational conditions, ensuring secure data handling, and verifying the integrity of hardware-software interfaces; downloadable software for auditing hardware configurations, managing firmware updates, and implementing security patches; downloadable software for generating detailed reports on hardware security posture, quality metrics, and compliance with regulatory requirements; Downloadable data processing software for the collection, manipulation, analysis, and visualization of data from various sources; downloadable software for managing and transforming large datasets, performing statistical analysis, and generating actionable insights; downloadable software for data cleansing, validation, and enrichment to ensure accuracy and reliability; downloadable software for integrating data from multiple sources, supporting data migration, and facilitating data warehousing; downloadable software for automating data workflows, including data extraction, transformation, and loading (ETL) processes; downloadable software for implementing data security measures, including encryption, access controls, and compliance with data protection regulations; downloadable software for real-time data monitoring, reporting, and decision-making support; downloadable software for creating and managing databases, performing data backups, and ensuring data integrity; Downloadable risk identification software for detecting, assessing, and managing potential risks across various domains, including IT systems, business operations, and project management; downloadable software for identifying security vulnerabilities, compliance gaps, and operational risks within systems and processes; downloadable software for analyzing risk factors, evaluating impact and likelihood, and prioritizing risk mitigation strategies; downloadable software for conducting risk assessments, generating risk reports, and providing actionable insights for risk management; downloadable software for integrating with other risk management tools and frameworks to enhance overall risk visibility and control; downloadable software for monitoring risk indicators, tracking risk mitigation efforts, and updating risk profiles in real-time; downloadable software for supporting decision-making processes by offering risk modeling, scenario analysis, and forecasting capabilities; downloadable software for ensuring compliance with industry regulations and standards related to risk management and security;
Training in software systems development; Training in software systems...
on 23 Dec 2024
modzero GmbH
98228783 · 18 Oct 2023
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Training in software systems development; Training in software systems design; Training services in the field of software, including secure design, security software, and secure programming; educational services providing instruction and hands-on training on best practices for secure software development, including threat modeling, secure coding techniques, and vulnerability management; training programs on the design and implementation of security features in software applications, systems, and networks; workshops and courses on using security software tools for threat detection, risk assessment, and incident response; educational seminars on compliance with security standards, regulations, and industry frameworks; professional development programs focused on advanced topics in cybersecurity, including secure software architecture, encryption methods, and secure application lifecycle management; certification programs for validating expertise in security software and secure programming practices; online and in-person training sessions for developers, IT professionals, and security experts on safeguarding applications and systems against cyber threats; Training in the field of the operation of software systems;
041
Class 041
Education and Entertainment Services
Downloadable software for use in the identification, mitigation, prevention, analysis, and management of cybersecurity threats and vulnerabilities; downloadable software for network security testing, penetration testing, vulnerability scanning, risk assessment, and security auditing; downloadable software for monitoring, detecting, and responding to cyberattacks, data breaches, and unauthorized access; downloadable software for encryption, data protection, secure communications, malware detection, and incident response; downloadable software for reporting, visualizing, and analyzing cybersecurity metrics and trends; Downloadable authentication software for identity management, access control, and authorization for users, machines, devices, and objects; downloadable software for managing digital identities, verifying credentials, and securing access to networks, systems, applications, and connected devices; downloadable software for authentication processes, including multi-factor authentication, single sign-on (SSO), and certificate-based authentication; downloadable software for enforcing access policies, managing permissions, and securing sensitive data; downloadable software for credential management, password protection, and encryption for both user and machine identities in physical, virtual, and cloud environments; Downloadable computer software for security testing, vulnerability scanning, penetration testing, and risk assessment of IT systems, networks, and applications; downloadable software for monitoring, detecting, and analyzing cybersecurity threats, vulnerabilities, and malicious activity; downloadable software for identifying and mitigating risks associated with unauthorized access, data breaches, malware, ransomware, and other cyberattacks; downloadable software for auditing, reporting, and ensuring compliance with security policies and regulations; downloadable software for security configuration management, patch management, and continuous security monitoring; downloadable software for simulating cyberattacks to assess system defenses and response capabilities; downloadable software for managing incident response, forensic analysis, and recovery after security breaches; Downloadable debugging software for quality assurance, information security research, and performance optimization of software applications, systems, and networks; downloadable software for detecting, analyzing, and resolving software bugs, vulnerabilities, and security flaws; downloadable software for identifying and mitigating security risks through real-time debugging and code analysis; downloadable software for security testing, vulnerability assessment, and penetration testing during the development and deployment of IT infrastructure; downloadable software for ensuring compliance with security standards, secure coding practices, and system integrity; downloadable software for conducting forensic analysis, incident investigation, and post-breach debugging to identify the source of cybersecurity incidents; Downloadable embedded software for providing peripheral drivers, functional logic, and secure communication protocols to microcontrollers in the field of embedded device security and research; downloadable software for securing embedded systems and firmware against unauthorized access, tampering, and malware; downloadable software for encryption, secure boot, and authentication processes in embedded devices; downloadable software for real-time monitoring, threat detection, and vulnerability analysis of embedded systems and Internet of Things (IoT) devices; downloadable software for conducting security testing, penetration testing, and risk assessments specific to firmware and hardware interfaces; downloadable software for managing secure updates, patch management, and lifecycle maintenance of embedded device firmware and software; downloadable software for auditing and ensuring compliance with embedded system security standards and regulations; Downloadable software for computer security, security hardening, and implementing security patches and enhancements across IT systems, networks, and applications; downloadable software for identifying, mitigating, and remediating vulnerabilities, security flaws, and misconfigurations; downloadable software for deploying security patches, updates, and enhancements to prevent unauthorized access, malware, ransomware, and other cyber threats; downloadable software for enhancing system defenses through configuration management, encryption, and access control; downloadable software for automated vulnerability assessments, patch management, and real-time monitoring of security postures; downloadable software for strengthening security protocols, improving system resilience, and ensuring compliance with industry security standards and regulations; downloadable software for providing security hardening recommendations, enforcing security policies, and tracking the implementation of security improvements; Downloadable software for general use in security, operation, and monitoring of computer systems, networks, and applications; downloadable software for enhancing system performance, managing system operations, and ensuring secure and efficient operation of software and hardware; Downloadable privacy protection software for analyzing, modifying, and enhancing the configuration and behavior of other software with regard to information security and privacy; downloadable software for assessing and improving the security and privacy practices of applications, systems, and data management processes; downloadable software for identifying and mitigating privacy vulnerabilities, ensuring compliance with data protection regulations, and enforcing privacy policies; downloadable software for securing sensitive information, managing user consent, and protecting personal data from unauthorized access and breaches; downloadable software for auditing software behavior, securing communication channels, and implementing encryption and anonymization techniques; downloadable software for providing insights into privacy risks, generating compliance reports, and offering recommendations for enhancing overall privacy and data protection measures; Downloadable hardware testing software for quality assurance, information security research, and analysis of electronic and embedded systems; downloadable software for evaluating hardware performance, reliability, and compliance with industry standards; downloadable software for conducting security assessments, vulnerability scanning, and penetration testing on hardware components and embedded systems; downloadable software for analyzing and detecting potential security weaknesses, unauthorized access points, and susceptibility to cyber threats; downloadable software for stress testing hardware under various operational conditions, ensuring secure data handling, and verifying the integrity of hardware-software interfaces; downloadable software for auditing hardware configurations, managing firmware updates, and implementing security patches; downloadable software for generating detailed reports on hardware security posture, quality metrics, and compliance with regulatory requirements; Downloadable data processing software for the collection, manipulation, analysis, and visualization of data from various sources; downloadable software for managing and transforming large datasets, performing statistical analysis, and generating actionable insights; downloadable software for data cleansing, validation, and enrichment to ensure accuracy and reliability; downloadable software for integrating data from multiple sources, supporting data migration, and facilitating data warehousing; downloadable software for automating data workflows, including data extraction, transformation, and loading (ETL) processes; downloadable software for implementing data security measures, including encryption, access controls, and compliance with data protection regulations; downloadable software for real-time data monitoring, reporting, and decision-making support; downloadable software for creating and managing databases, performing data backups, and ensuring data integrity; Downloadable risk identification software for detecting, assessing, and managing potential risks across various domains, including IT systems, business operations, and project management; downloadable software for identifying security vulnerabilities, compliance gaps, and operational risks within systems and processes; downloadable software for analyzing risk factors, evaluating impact and likelihood, and prioritizing risk mitigation strategies; downloadable software for conducting risk assessments, generating risk reports, and providing actionable insights for risk management; downloadable software for integrating with other risk management tools and frameworks to enhance overall risk visibility and control; downloadable software for monitoring risk indicators, tracking risk mitigation efforts, and updating risk profiles in real-time; downloadable software for supporting decision-making processes by offering risk modeling, scenario analysis, and forecasting capabilities; downloadable software for ensuring compliance with industry regulations and standards related to risk management and security;
...
Class 042
Computer & Software Services & Scientific Services
MOD ZERO
Training in software systems development; Training in software systems...
on 23 Dec 2024
modzero GmbH
98250068 · 01 Nov 2023
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Training in software systems development; Training in software systems design; Training services in the field of software, including secure design, security software, and secure programming; educational services providing instruction and hands-on training on best practices for secure software development, including threat modeling, secure coding techniques, and vulnerability management; training programs on the design and implementation of security features in software applications, systems, and networks; workshops and courses on using security software tools for threat detection, risk assessment, and incident response; educational seminars on compliance with security standards, regulations, and industry frameworks; professional development programs focused on advanced topics in cybersecurity, including secure software architecture, encryption methods, and secure application lifecycle management; certification programs for validating expertise in security software and secure programming practices; online and in-person training sessions for developers, IT professionals, and security experts on safeguarding applications and systems against cyber threats; Training in the field of the operation of software systems;
041
Class 041
Education and Entertainment Services
The mark consists of the literal element "MODZERO" displayed in lowercase block letters with the "mod" displayed in outlined letters on a rectangular black field and the "zero" letters displayed in black, the literal element is superimposed over a red colored sinus wave design. The entire mark appears on a contrasting background.
...
Class 042
Computer & Software Services & Scientific Services
Downloadable software for use in the identification, mitigation, prevention, analysis, and management of cybersecurity threats and vulnerabilities; downloadable software for network security testing, penetration testing, vulnerability scanning, risk assessment, and security auditing; downloadable software for monitoring, detecting, and responding to cyberattacks, data breaches, and unauthorized access; downloadable software for encryption, data protection, secure communications, malware detection, and incident response; downloadable software for reporting, visualizing, and analyzing cybersecurity metrics and trends; Downloadable authentication software for identity management, access control, and authorization for users, machines, devices, and objects; downloadable software for managing digital identities, verifying credentials, and securing access to networks, systems, applications, and connected devices; downloadable software for authentication processes, including multi-factor authentication, single sign-on (SSO), and certificate-based authentication; downloadable software for enforcing access policies, managing permissions, and securing sensitive data; downloadable software for credential management, password protection, and encryption for both user and machine identities in physical, virtual, and cloud environments; Downloadable computer software for security testing, vulnerability scanning, penetration testing, and risk assessment of IT systems, networks, and applications; downloadable software for monitoring, detecting, and analyzing cybersecurity threats, vulnerabilities, and malicious activity; downloadable software for identifying and mitigating risks associated with unauthorized access, data breaches, malware, ransomware, and other cyberattacks; downloadable software for auditing, reporting, and ensuring compliance with security policies and regulations; downloadable software for security configuration management, patch management, and continuous security monitoring; downloadable software for simulating cyberattacks to assess system defenses and response capabilities; downloadable software for managing incident response, forensic analysis, and recovery after security breaches; Downloadable debugging software for quality assurance, information security research, and performance optimization of software applications, systems, and networks; downloadable software for detecting, analyzing, and resolving software bugs, vulnerabilities, and security flaws; downloadable software for identifying and mitigating security risks through real-time debugging and code analysis; downloadable software for security testing, vulnerability assessment, and penetration testing during the development and deployment of IT infrastructure; downloadable software for ensuring compliance with security standards, secure coding practices, and system integrity; downloadable software for conducting forensic analysis, incident investigation, and post-breach debugging to identify the source of cybersecurity incidents; Downloadable embedded software for providing peripheral drivers, functional logic, and secure communication protocols to microcontrollers in the field of embedded device security and research; downloadable software for securing embedded systems and firmware against unauthorized access, tampering, and malware; downloadable software for encryption, secure boot, and authentication processes in embedded devices; downloadable software for real-time monitoring, threat detection, and vulnerability analysis of embedded systems and Internet of Things (IoT) devices; downloadable software for conducting security testing, penetration testing, and risk assessments specific to firmware and hardware interfaces; downloadable software for managing secure updates, patch management, and lifecycle maintenance of embedded device firmware and software; downloadable software for auditing and ensuring compliance with embedded system security standards and regulations; Downloadable software for computer security, security hardening, and implementing security patches and enhancements across IT systems, networks, and applications; downloadable software for identifying, mitigating, and remediating vulnerabilities, security flaws, and misconfigurations; downloadable software for deploying security patches, updates, and enhancements to prevent unauthorized access, malware, ransomware, and other cyber threats; downloadable software for enhancing system defenses through configuration management, encryption, and access control; downloadable software for automated vulnerability assessments, patch management, and real-time monitoring of security postures; downloadable software for strengthening security protocols, improving system resilience, and ensuring compliance with industry security standards and regulations; downloadable software for providing security hardening recommendations, enforcing security policies, and tracking the implementation of security improvements; Downloadable software for general use in security, operation, and monitoring of computer systems, networks, and applications; downloadable software for enhancing system performance, managing system operations, and ensuring secure and efficient operation of software and hardware; Downloadable privacy protection software for analyzing, modifying, and enhancing the configuration and behavior of other software with regard to information security and privacy; downloadable software for assessing and improving the security and privacy practices of applications, systems, and data management processes; downloadable software for identifying and mitigating privacy vulnerabilities, ensuring compliance with data protection regulations, and enforcing privacy policies; downloadable software for securing sensitive information, managing user consent, and protecting personal data from unauthorized access and breaches; downloadable software for auditing software behavior, securing communication channels, and implementing encryption and anonymization techniques; downloadable software for providing insights into privacy risks, generating compliance reports, and offering recommendations for enhancing overall privacy and data protection measures; Downloadable hardware testing software for quality assurance, information security research, and analysis of electronic and embedded systems; downloadable software for evaluating hardware performance, reliability, and compliance with industry standards; downloadable software for conducting security assessments, vulnerability scanning, and penetration testing on hardware components and embedded systems; downloadable software for analyzing and detecting potential security weaknesses, unauthorized access points, and susceptibility to cyber threats; downloadable software for stress testing hardware under various operational conditions, ensuring secure data handling, and verifying the integrity of hardware-software interfaces; downloadable software for auditing hardware configurations, managing firmware updates, and implementing security patches; downloadable software for generating detailed reports on hardware security posture, quality metrics, and compliance with regulatory requirements; Downloadable data processing software for the collection, manipulation, analysis, and visualization of data from various sources; downloadable software for managing and transforming large datasets, performing statistical analysis, and generating actionable insights; downloadable software for data cleansing, validation, and enrichment to ensure accuracy and reliability; downloadable software for integrating data from multiple sources, supporting data migration, and facilitating data warehousing; downloadable software for automating data workflows, including data extraction, transformation, and loading (ETL) processes; downloadable software for implementing data security measures, including encryption, access controls, and compliance with data protection regulations; downloadable software for real-time data monitoring, reporting, and decision-making support; downloadable software for creating and managing databases, performing data backups, and ensuring data integrity; Downloadable risk identification software for detecting, assessing, and managing potential risks across various domains, including IT systems, business operations, and project management; downloadable software for identifying security vulnerabilities, compliance gaps, and operational risks within systems and processes; downloadable software for analyzing risk factors, evaluating impact and likelihood, and prioritizing risk mitigation strategies; downloadable software for conducting risk assessments, generating risk reports, and providing actionable insights for risk management; downloadable software for integrating with other risk management tools and frameworks to enhance overall risk visibility and control; downloadable software for monitoring risk indicators, tracking risk mitigation efforts, and updating risk profiles in real-time; downloadable software for supporting decision-making processes by offering risk modeling, scenario analysis, and forecasting capabilities; downloadable software for ensuring compliance with industry regulations and standards related to risk management and security;
Training in software systems development; Training in software systems...
AI Trademark Registrability
Image Search
Drag and drop or upload to search any image
End of search results
Page 1 of 1