LOGISYNC
By: Ashish Kasbekar
Downloadable Computer Software, Namely, Downloadable Computer Security Software For Computer, Applications, Cloud, And Computer Network Security, Automated Domain Threat Protection And Prevention, Analysis, Management And Integration Of Threat Data, Security Information And Event Management, Detection, Investigation And Elimination Of Computer Threats, Cyberattacks And Data Breaches, Threat And Intrusion Detection And Prevention, Exploit Protection And Prevention, And Automated Remediation And Restoration Of Compromised Computer Software And Hardware, Downloadable Computer Software Using Artificial Intelligence (ai) Processing And Machine Learning For Computer, Applications, Cloud, And Computer Network Security, Downloadable Computer Anti-virus, Anti-malware, And Privacy Control Software, Downloadable Computer Software For Developing Custom Security Threat Detection, Investigation, And Response Tools, Downloadable Computer Software For Monitoring Applications Installed And Running On A Computer, Computer Security Audits And Performance Diagnostics, And For Scanning, Removing And Blocking Computer Applications And Files, Downloadable Computer Software For Securing, Scanning, Authenticating, And Encrypting Email, Documents, Website Links, And Data, And Controlled Folder Access, Downloadable Computer Software For Securing, Scanning, Regulating Access, And Authenticating Software Tools, Role-based Access, Ip Addresses, Domains, Computer Peripherals, And Endpoints, Downloadable Computer Security Software For The Collection, Editing, Organizing, Modifying, Transmission, Processing, Storage, Analysis, And Sharing Of Data And Information, Downloadable Computer Security Software For The Creation, Monitoring, And Enforcement Of Security Protocols, Credentials, And Policies, Downloadable Computer Software For Detecting, Analyzing, Monitoring, Displaying, And Countering Computer Security Threats, Generating Security Reports, Providing Security Alerts, And For Security Compliance, Downloadable Computer Software For Identity And Access Management, Privilege And Permissions Access Management, Cloud Infrastructure Entitlements Management, Cloud Security, Internet Of Things (iot) Security, Protection Of Cloud-based Information And Access, Database Management, Data Security, And Risk Assessment And Monitoring Of Cloud Systems, Downloadable Computer Software For Cloud Security Posture Management, Cloud And Hybrid Environment Security Assessment And Management, And Cloud Workload Protection, Downloadable Computer Software For Monitoring And Identifying Cloud Configuration Vulnerabilities And Strengthening Cloud Security Posture, Downloadable Computer Software For Automating Security Administration For Cloud And Hybrid Environments, Downloadable Computer Software For Collecting And Processing User Behavioral Signals And Providing Insights, Analyzing Network Traffic, Endpoint Detections And Remediation, Attack Surfaces Reduction, Firewall Creation, And Responses To Security Threats, Downloadable Computer Software For Online Scanning, Detecting, Quarantining, And Eliminating Of Viruses, Worms, Trojans, Spyware, Adware, Malware, Ransomware, Grayware, Phishing Attempts, And Unauthorized Data And Programs On Computers, Networks, And Electronic Devices; None Of The Aforementioned Goods For Use In Or In Relation To Vehicles, Residential And Commercial Security Systems, Home Automation Systems, And Security For Physical Premises, And Protective Covers, Cases, Casings, Carrying Cases, And Chargers For Electronic Devices.
Trademark Details
This Brand Name LOGISYNC is applied by Ashish Kasbekar
This Trademark was applied on date 17 January 2024
This Application has been filed by their agent MOTKARI & ASSOCIATES
Trademark | LOGISYNC |
Application No | 6262787 |
Filing Dte | 17-01-2024 |
User Detail | Proposed to be used |
Certificate Number | 3678947 |
Valid Until | 17-01-2034 |
Goods and Service | Downloadable Computer Software, Namely, Downloadable Computer Security Software For Computer, Applications, Cloud, And Computer Network Security, Automated Domain Threat Protection And Prevention, Analysis, Management And Integration Of Threat Data, Security Information And Event Management, Detection, Investigation And Elimination Of Computer Threats, Cyberattacks And Data Breaches, Threat And Intrusion Detection And Prevention, Exploit Protection And Prevention, And Automated Remediation And Restoration Of Compromised Computer Software And Hardware, Downloadable Computer Software Using Artificial Intelligence (ai) Processing And Machine Learning For Computer, Applications, Cloud, And Computer Network Security, Downloadable Computer Anti-virus, Anti-malware, And Privacy Control Software, Downloadable Computer Software For Developing Custom Security Threat Detection, Investigation, And Response Tools, Downloadable Computer Software For Monitoring Applications Installed And Running On A Computer, Computer Security Audits And Performance Diagnostics, And For Scanning, Removing And Blocking Computer Applications And Files, Downloadable Computer Software For Securing, Scanning, Authenticating, And Encrypting Email, Documents, Website Links, And Data, And Controlled Folder Access, Downloadable Computer Software For Securing, Scanning, Regulating Access, And Authenticating Software Tools, Role-based Access, Ip Addresses, Domains, Computer Peripherals, And Endpoints, Downloadable Computer Security Software For The Collection, Editing, Organizing, Modifying, Transmission, Processing, Storage, Analysis, And Sharing Of Data And Information, Downloadable Computer Security Software For The Creation, Monitoring, And Enforcement Of Security Protocols, Credentials, And Policies, Downloadable Computer Software For Detecting, Analyzing, Monitoring, Displaying, And Countering Computer Security Threats, Generating Security Reports, Providing Security Alerts, And For Security Compliance, Downloadable Computer Software For Identity And Access Management, Privilege And Permissions Access Management, Cloud Infrastructure Entitlements Management, Cloud Security, Internet Of Things (iot) Security, Protection Of Cloud-based Information And Access, Database Management, Data Security, And Risk Assessment And Monitoring Of Cloud Systems, Downloadable Computer Software For Cloud Security Posture Management, Cloud And Hybrid Environment Security Assessment And Management, And Cloud Workload Protection, Downloadable Computer Software For Monitoring And Identifying Cloud Configuration Vulnerabilities And Strengthening Cloud Security Posture, Downloadable Computer Software For Automating Security Administration For Cloud And Hybrid Environments, Downloadable Computer Software For Collecting And Processing User Behavioral Signals And Providing Insights, Analyzing Network Traffic, Endpoint Detections And Remediation, Attack Surfaces Reduction, Firewall Creation, And Responses To Security Threats, Downloadable Computer Software For Online Scanning, Detecting, Quarantining, And Eliminating Of Viruses, Worms, Trojans, Spyware, Adware, Malware, Ransomware, Grayware, Phishing Attempts, And Unauthorized Data And Programs On Computers, Networks, And Electronic Devices; None Of The Aforementioned Goods For Use In Or In Relation To Vehicles, Residential And Commercial Security Systems, Home Automation Systems, And Security For Physical Premises, And Protective Covers, Cases, Casings, Carrying Cases, And Chargers For Electronic Devices. |
Business Name | Ashish Kasbekar |
Business Type | Proprietor |
Business Sector | Manufacturing |
What trademarKing.in Does
TrademarKing help you to register trademark in India. Every year many business use TrademarKing.in to register & protect their brands with smooth filing process. TrademarKing also monitors your Brand name if TrademarK Registration is done through TrademarKing.in. Now you can Register TrademarK Through TrademarKing.in.
In India we have filed 100000+ Trademark Registration , so start now! to register your trademark.
TrademarKing is a free trademark search engine developend by PCNR Trademarks Management Pvt Ltd, India.
Trademark Monitoring