Filters
on 16 Apr 2015
DIGITAL HANDS, LLC
78446711 · 07 Jul 2004
19 Jan 2026
037
Class 037
Construction and Repair Services
Maintenance and repair of computer hardware
Maintenance and repair of computer hardware,Maintenance and repair of ...
on 06 Dec 2023
DIGITAL HANDS, LLC
86585411 · 02 Apr 2015
31 May 2027
042
Class 042
Computer & Software Services & Scientific Services
"DIGITAL"
045
Class 045
Personal & Legal & Social Services
Technical support and comprehensive managed security services, namely, the 24/7 monitoring, for protection and defense against cyber threats, malicious code, and malfunctioning hardware and software, of network systems, servers, web and database users and applications, and endpoint devices, monitoring, detection, and incident response for security breaches, and receiving, analyzing and providing notification of related events and alerts; technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; computer security services, namely, enforcing, restricting, and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; anything as a service (XAAS) services, namely, software as a service (SAAS) featuring software that assists in the protection and defense against and response to cyber threats, malicious code, and malfunctioning hardware and software; providing technical support, in the nature of providing visibility and analytics for software, troubleshooting of computer software problems and diagnosing computer hardware problems; infrastructure as a service (IAAS), namely, providing virtual computer systems and virtual computer environments through cloud computing that helps others protect and defend against and respond to cyber threats, malicious code, and malfunctioning hardware and software; platform as a service (PAAS) featuring computer software platforms that assist with protection and defense against and response to cyber threats, malicious code, and malfunctioning hardware and software; technical support, in the nature of providing visibility and analytics and troubleshooting of computer software problems; storage as a service, namely, leasing data storage equipment, computer hardware, software and networking equipment; providing technical support of storage equipment, computer hardware, software and networking equipment, by storing, managing, analyzing, and providing redundancy of forensic evidence data and by providing redundancy for computer data storage infrastructure equipment; desktop as a service (DAAS), namely, featuring desktop software for detection analysis and remediation of desktop security events and end user support for storing, securing, updating, upgrading, and backing up data; technical support in the nature of detection analysis and remediation of desktop security events and end user support for storing, securing, updating, upgrading, and backing up data; network as a service (NAAS) featuring software used to provide virtual private networks; disaster recovery as a service (DRAAS) being the media duplication of data and duplication of software on, and hosting of, physical or virtual servers to provide failover in the event of a catastrophe; other IT solutions as a service in the nature of Encryption as a Service (EAAS) being data encryption services, and IT Integration Services provided through cloud infrastructure or over the internet, for monitoring, maintenance, and ensuring the security of computer networks, servers, web and database users and applications, and infrastructure devices, for ensuring uptime and functionality of computer networks and protection of data, and compliance with industry standards; testing, analysis and evaluation of network security and data protection systems to assure compliance with industry standards; data encryption services; computer virus protection services; technical support, namely, providing backup computer programs and facilities; development of software for secure network operations
Technical support and comprehensive managed security services, namely,...
on 06 Dec 2023
DIGITAL HANDS, LLC
86585421 · 02 Apr 2015
31 May 2027
042
Class 042
Computer & Software Services & Scientific Services
"DIGITAL"
045
Class 045
Personal & Legal & Social Services
Technical support and comprehensive managed security services, namely, the 24/7 monitoring, for protection and defense against cyber threats, malicious code, and malfunctioning hardware and software, of network systems, servers, web and database users and applications, and endpoint devices, monitoring, detection, and incident response for security breaches, and receiving, analyzing and providing notification of related events and alerts; technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; computer security services, namely, enforcing, restricting, and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; anything as a service (XAAS) services, namely, software as a service (SAAS) featuring software that assists in the protection and defense against and response to cyber threats, malicious code, and malfunctioning hardware and software; providing technical support, in the nature of providing visibility and analytics for software, troubleshooting of computer software problems and diagnosing computer hardware problems; infrastructure as a service (IAAS), namely, providing virtual computer systems and virtual computer environments through cloud computing that helps others protect and defend against and respond to cyber threats, malicious code, and malfunctioning hardware and software; platform as a service (PAAS) featuring computer software platforms that assist with protection and defense against and response to cyber threats, malicious code, and malfunctioning hardware and software; technical support, in the nature of providing visibility and analytics and troubleshooting of computer software problems; storage as a service, namely, leasing data storage equipment, computer hardware, software and networking equipment; providing technical support of storage equipment, computer hardware, software and networking equipment, by storing, managing, analyzing, and providing redundancy of forensic evidence data and by providing redundancy for computer data storage infrastructure equipment; desktop as a service (DAAS), namely, featuring desktop software for detection analysis and remediation of desktop security events and end user support for storing, securing, updating, upgrading, and backing up data; technical support in the nature of detection analysis and remediation of desktop security events and end user support for storing, securing, updating, upgrading, and backing up data; network as a service (NAAS) featuring software used to provide virtual private networks; disaster recovery as a service (DRAAS) being the media duplication of data and duplication of software on, and hosting of, physical or virtual servers to provide failover in the event of a catastrophe; other IT solutions as a service in the nature of Encryption as a Service (EAAS) being data encryption services, and IT Integration Services provided through cloud infrastructure or over the internet, for monitoring, maintenance, and ensuring the security of computer networks, servers, web and database users and applications, and infrastructure devices, for ensuring uptime and functionality of computer networks and protection of data, and compliance with industry standards; testing, analysis and evaluation of network security and data protection systems to assure compliance with industry standards; data encryption services; computer virus protection services; technical support, namely, providing backup computer programs and facilities; development of software for secure network operations
Technical support and comprehensive managed security services, namely,...
on 26 Mar 2024
Digital Hands, LLC
97379903 · 25 Apr 2022
26 Mar 2030
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer security equipment, namely, computer hardware, and recorded and downloadable computer software for use in virtual environments and on premises for security protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; downloadable video recordings and electronic whitepapers and checklists featuring information in the fields of cybersecurity managed services and Information Technology (IT) and Internet of Things (IOT) security services
041
Class 041
Education and Entertainment Services
Color is not claimed as a feature of the mark.
...
Class 042
Computer & Software Services & Scientific Services
Providing managed security services, namely, the 24/7 monitoring, for protection and defense against cyber threats, malicious code, and malfunctioning hardware and software, of network systems, servers, web and database users and applications, and endpoint devices, monitoring, detection, and incident response for security breaches, and receiving, analyzing and providing notification of related events and alerts; providing cybersecurity services, namely, providing online non-downloadable computer software programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; providing cybersecurity services, namely, services related to ensuring the secure access to data and all the cybersecurity measures and controls in place to prevent unauthorized access, namely, providing cybersecurity protection from intrusion and data exfiltration services for IT and Internet of Things (IOT) systems and equipment; providing Information Technology (IT) and Internet of Things (IOT) managed services, namely, remote management of the Information Technology (IT) and Internet of Things (IOT) cloud computing systems of others; providing Information Technology (IT) and Internet of Things (IOT) security and cybersecurity services, namely, computer security and data security consulting; providing customized on-line web pages and data feeds featuring user-defined information, which includes blog posts, new media content, other on-line content, and on-line web links to other websites, all featuring information in the field of cybersecurity managed services and Information Technology (IT) and Internet of Things (IOT) security services; providing threat hunting and remediation services, namely, searching for malicious code and fixing the vulnerabilities; providing ransomware detection and remediation services namely, searching for anomalous activities and malicious operating behaviors and quarantining the damage and preventing spreading; providing endpoint detection and response services, namely, monitoring for malicious code and and halting the damage, repairing the vulnerability and preventing spreading; providing Information Technology (IT) and Internet of Things (IOT) vulnerability and compromise assessments, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; providing data log storage and correlation of cyber indicators of compromise, namely, storing such device and cloud generated logs to secure facilities with retention for searching and trend tracking to discover anomalous behavior; providing alerting of security indicators of compromise, namely, escalating triggered alarms for further action; providing hosting and technical skilled operations services for security and incident event management, namely, hosting a security incident and event monitoring tool that alerts and activates skilled security labor for escalations and remediation of faults; providing data privacy discovery and breach analysis services, namely, discovering where sensitive data resides and protecting it from security breaches; providing threat intelligence services, namely, computer security threat intelligence consulting; providing automation services for cyber security operations, namely, automating workflow to discover, triage, and repair breaches; providing proactive threat blocking to Information Technology (IT) and Internet of Things (IOT) devices, namely, preventing malicious activity from invading the perimeter at the edge of the network or the internet entry point; providing comprehensive realtime security visibility through portal and application access, namely, allowing end users to see into the ticketing systems and applications portals any of the pertinent protective security operations activities; providing cloud computing and premise anti-phishing and malware protection, namely, protecting resources from being exploited through email scams and malware insertion into the endpoint, device, or application; providing security administration and device and platform management, namely, maintaining and managing the uptime and availability of infrastructure; providing dark web monitoring and advisory services, namely, detecting and reporting hidden data about companies and users on the internet; providing cyber risk analysis, namely, identifying risks of potential data breaches and potential theft of sensitive data; providing security software and hardware configuration and deployment; providing identity management, namely, assuring end user access is authentic and verified.; providing patch management for critical Information Technology (IT) and Internet of Things (IOT) systems, namely, patching operating systems and applications for known vulnerabilities; providing secure edge access services, namely, providing secure access for users and applications to and from cloud resources; providing cloud computing security monitoring and managed services, namely, looking for malicious activities in cloud resources such as hosted email or financial systems access; providing workflow orchestration and automation services, namely, correlation of events from many devices and applications spanning network, cloud, and supply chain; providing secure network administration and management services, namely, expertly operating security controls and conducting adds, moves, and changes to those controls; providing security network traffic analysis services, namely, identifying and analyzing anomalous activities in the traffic traversing the network; proving security user and entity behavioral analytics, namely, identifying deviations of normal enterprise and user behavior in order to predict vulnerabilities and isolate areas of compromise; providing security data analytics, namely, computer security threat analysis for protecting data; providing cybersecurity protection from intrusion and data exfiltration services for Information Technology (IT) and Internet of Things (IOT) systems and equipment, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; software-as-a service (SAAS) services, namely, hosting software for use by others that integrates all security technology into one definition to allow automation and orchestration of security data in one source; software-as-a-service (SAAS) services featuring security orchestration, automation and response (SOAR) software solutions that combine incident response, orchestration and automation, and threat intelligence (TI) management capabilities in a single platform; software-as-a service (SAAS) services featuring SOAR software to document and implement playbooks, workflows and processes, support security incident management, and apply machine-based assistance to human security analysts and operators; software-as-a- service (SAAS) services featuring (SOAR) software that integrates workflows with other technologies to achieve desired outcomes, namely, incident triage, incident response, TI curation and management, and compliance monitoring and management
Providing managed security services, namely, the 24/7 monitoring, for ...
on 20 Jun 2023
Intelligent Wellhead Systems Inc.
90048643 · 12 Jul 2020
20 Jun 2029
009
Class 009
Computer & Software Products & Electrical & Scientific Products
"DIGITAL"
042
Class 042
Computer & Software Services & Scientific Services
DIGITAL HANDS HAKE
"DIGITAL",DIGITAL HANDS HAKE,Providing temporary use of non-downloadab...
on 21 Jan 2020
Digital GRC LLC
88489823 · 26 Jun 2019
21 Jan 2026
042
Class 042
Computer & Software Services & Scientific Services
The mark consists of a rectangle carrier containing two stacked rectangles with the top smaller rectangle containing the stylized wording "DIGITAL" and the bottom rectangle containing the stylized wording "GRC LLC".
The mark consists of a rectangle carrier containing two stacked rectan...
on 09 Feb 2021
Nine Digital LLC
90060577 · 19 Jul 2020
09 Feb 2027
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Headphones; Adapter plugs; Audio cables; Audio headphones; Cables, electric; Closed circuit TV systems for security and surveillance, namely, cameras, switchers, monitors, microphones, and recorders; Computer cables; Digital cameras; Earphones and headphones; Electric adapter cables; Electric door bells; Game headphones; PC tablets; Personal headphones for sound transmitting apparatuses; Power adapters for computers; Loudspeakers, headphones, microphones and CD players; Music headphones; Noise cancelling headphones
Headphones; Adapter plugs; Audio cables; Audio headphones; Cables, ele...
on 09 Feb 2021
Nine Digital LLC
90060590 · 19 Jul 2020
09 Feb 2027
009
Class 009
Computer & Software Products & Electrical & Scientific Products
"DIGITAL"
"DIGITAL",Headphones; Adapter plugs; Cables, electric; Closed circuit ...
on 09 Feb 2021
CLEAR CHANNEL IP, LLC
85038096 · 13 May 2010
30 Dec 2030
035
Class 035
Advertising, Business & Retail Services
"DIGITAL"
"DIGITAL",Out-of-home advertising services, namely, rental of advertis...
Country
US
Status
All
Registered
Pending
Abandoned
Other
Owners
Disney enterprises inc. (1797)
Mattel inc. (639)
Hartford fire insurance company (304)
Church & dwight co inc. (282)
Discovery communications llc (276)
Hard rock cafe international usa inc. (243)
Igt (228)
Hallmark licensing llc (225)
Kennedy randolph dennis (223)
The hartz mountain corporation (217)
Categories
Class 35 (49853)
Class 41 (44581)
Class 9 (41916)
Class 25 (38924)
Class 42 (31880)
Class 16 (23995)
Class 36 (19797)
Class 3 (18162)
Class 28 (15346)
Class 30 (13649)
Class 44 (13289)
Class 5 (13153)
Class 21 (10699)
Class 43 (10679)
Class 37 (10492)
Class 33 (9798)
Class 29 (8761)
Class 14 (8644)
Class 20 (8178)
Class 45 (7474)
Class 39 (7296)
Class 18 (6740)
Class 38 (6706)
Class 32 (6256)
Class 10 (6167)
Class 11 (6137)
Class 7 (5792)
Class 26 (5076)
Class 40 (5046)
Class 12 (4642)
Class 31 (4280)
Class 6 (4190)
Class 24 (3964)
Class 1 (3715)
Class 8 (3526)
Class 19 (2678)
Class 34 (2400)
Class 4 (1909)
Class 17 (1267)
Class 27 (1225)
Class 22 (1166)
Class 2 (1164)
Class 13 (943)
Class 15 (847)
Class 46 (764)
Class 23 (707)
Attorney
Raj abhyanker (1495)
Christopher j day (777)
Steven plotkin (554)
Lawrence e abelman (532)
Matthew h swyers (460)
Jonathan g morton (411)
Adriano pacifici (385)
William scott goldman (363)
Joshua m gerben esq (329)
Michael markos (293)
Correspondents
Legalforce rapc worldwide pc (2405)
Lz legal services llc (1429)
The walt disney company (1183)
Christopher j day (670)
Greenberg traurig llp (477)
Lawrence e abelman (447)
Holland hart llp (429)
Matthew h swyers (413)
Intellectual property consulting llc (397)
AI Trademark Registrability
Image Search
Drag and drop or upload to search any image
Page 1 of 834