TRELLIX
By: Musarubra Us Llc
[class : 9] Downloadable And Recorded Computer Utility Software; Computer Anti-virus Software; Downloadable And Recorded Computer Software And Computer Hardware For Providing Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computer Security; Downloadable And Recorded Computer Software And Computer Hardware For Use In Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Downloadable And Recorded Computer Software For The Detection, Blocking And Removal Of Computer Viruses, Malware And Other Threats; Downloadable And Recorded Computer Communications Software For Monitoring, Managing, Filtering, And Regulating Electronic And Wireless Communications; Downloadable And Recorded Computer Software For Protecting And Securing Computer Networks And Applications; Downloadable And Recorded Computer Software For Encrypting And Authenticating Data; Downloadable And Recorded Computer Software For Detecting And Repairing Computer Software And Hardware; Downloadable And Recorded Computer Software And Computer Hardware For Automatically Confirming And Enforcing Computer Security Policies, For Identifying Computer Security Policy Violations, And For Generating Computer Security Policy Compliance Reports; Downloadable And Recorded Computer Software And Computer Hardware For The Management, Administration And Optimization Of Computer Networks And Applications; Downloadable And Recorded Computer Software And Computer Hardware For Use In The Monitoring And Control Of, And Generating Reports On, Computer And Online Activity; Downloadable And Recorded Computer Software For Creating And Maintaining Firewalls; Computer Hardware And Downloadable And Recorded Computer Software For Protecting And Securing Computer Systems, And Computer Networks And Applications; Intrusion Detection, Prevention And Repair Software; Downloadable And Recorded Computer Software And Computer Hardware For Encrypting And Authenticating Data; Downloadable And Recorded Computer Software For Identity Protection, Authentication Of Users, And Privacy Control; Downloadable And Recorded Computer Software For Secure Storage And Management Of Usernames And Passwords; Content Filtering Software; Computer Hardware And Downloadable And Recorded Computer Software For Automatically Updating Computer Utility And Security Software; Computer Hardware And Downloadable And Recorded Computer Software For Rating The Security Level Of Internet Sites; Downloadable And Recorded Computer Software For Extended Detection And Response Technology For Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Scientific, Research, Navigation, Surveying, Photographic, Cinematographic, Audiovisual, Optical, Weighing, Measuring, Signalling, Detecting, Testing, Inspecting, Life-saving And Teaching Apparatus And Instruments; Apparatus And Instruments For Conducting, Switching, Transforming, Accumulating, Regulating Or Controlling The Distribution Or Use Of Electricity; Apparatus And Instruments For Recording, Transmitting, Reproducing Or Processing Sound, Images Or Data; Recorded And Downloadable Media, Computer Software, Blank Digital Or Analogue Recording And Storage Media; Mechanisms For Coin-operated Apparatus; Cash Registers, Calculating Devices; Computers And Computer Peripheral Devices; Diving Suits, Divers' Masks, Ear Plugs For Divers, Nose Clips For Divers And Swimmers, Gloves For Divers, Breathing Apparatus For Underwater Swimming; Fire-extinguishing Apparatus[class : 42] Providing Temporary Use Of Non-downloadable Security Software; Providing Temporary Use Of Non-downloadable Software For Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computer Security; Providing Temporary Use Of Non-downloadable Software For Detecting, Blocking And Removing Computer Viruses, Malware And Threats, Encrypting And Authenticating Data, Managing And Filtering Electronic Communications, And Detecting And Repairing Computer Software And Hardware Problems; Providing Temporary Use Of Non-downloadable Software For Computer Software And Hardware For Use In Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Technology Consultation In The Field Of Cybersecurity; Providing Temporary Use Of Non-downloadable Software For Extended Detection And Response Technology For Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Security As A Service (secaas) Featuring Computer Software Platforms For Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computer Security; Security As A Service (secaas) Featuring Computer Software Platforms For Detecting, Blocking And Removing Computer Viruses, Malware And Threats, Encrypting And Authenticating Data, Managing And Filtering Electronic Communications, And Detecting And Repairing Computer Software And Hardware Problems; Security As A Service (secaas) Featuring Computer Software Platforms For Use In Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Technology Consultation In The Field Of Cybersecurity; Security As A Service (secaas) Featuring Computer Software Platforms For Extended Detection And Response Technology For Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Software As A Service (saas) Services Featuring Computer Software Platforms For Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computer Security; Software As A Service (saas) Services Featuring Computer Software Platforms For Detecting, Blocking And Removing Computer Viruses, Malware And Threats, Encrypting And Authenticating Data, Managing And Filtering Electronic Communications, And Detecting And Repairing Computer Software And Hardware Problems; Software As A Service (saas) Services Featuring Computer Software Platforms For Use In Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Technology Consultation In The Field Of Cybersecurity; Software As A Service (saas) Services Featuring Computer Software Platforms For Extended Detection And Response Technology For Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Platform As A Service (paas) Featuring Computer Software Platforms For Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computer Security; Platform As A Service (paas) Featuring Computer Software Platforms For Detecting, Blocking And Removing Computer Viruses, Malware And Threats, Encrypting And Authenticating Data, Managing And Filtering Electronic Communications, And Detecting And Repairing Computer Software And Hardware Problems; Platform As A Service (paas) Featuring Computer Software Platforms For Use In Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Technology Consultation In The Field Of Cybersecurity; Platform As A Service (paas) Featuring Computer Software Platforms For Extended Detection And Response Technology For Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Infrastructure As A Service (iaas) Services, Namely, Hosting Software For Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computer Security; Infrastructure As A Service (iaas) Services, Namely, Hosting Software For Detecting, Blocking And Removing Computer Viruses, Malware And Threats, Encrypting And Authenticating Data, Managing And Filtering Electronic Communications, And Detecting And Repairing Computer Software And Hardware Problems; Infrastructure As A Service (iaas) Services, Namely, Hosting Software For Use In Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Technology Consultation In The Field Of Cybersecurity; Infrastructure As A Service (iaas) Services, Namely, Hosting Software For Extended Detection And Response Technology For Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Consulting, Testing, Research And Advisory Services In The Field Of Computer, Data, And Network Security; Research, Development And Design Of Computer Hardware And Software; Technical Support Services For Others In The Fields Of Computer, Data, And Network Security, Namely, Troubleshooting In The Nature Of Diagnosing Computer Hardware And Software Problems; Automatic Updating Of Computer Software; Troubleshooting In The Nature Of Diagnosing Computer Hardware Problems; Computer Security Threat Analysis For Protecting Data In The Nature Of Collecting, Compiling, And Analyzing Data For The Purpose Of Generating And Transmitting Reports On And Ratings Of The Level Of Security Of Third Party Software Residing On The Computers Of Others; Computer Programming Services For Others In The Fields Of Computer, Data, And Network Security; Computer Forensics Services; Providing Information In The Fields Of Network, Data, And Computer Security; Maintenance Of Computer Software; Monitoring Of Computer Systems For Security Purposes To Protect Data And Information From Unauthorized Access; Security Services, Namely, Intrusion Detection Services, Intrusion Prevention Services, Vulnerability Assessment Services, And Services In The Nature Of Detecting And Removing Computer Viruses And Threats; Cybersecurity Services In The Nature Of Restricting Unauthorized Access To Computer Systems; Scientific And Technological Services And Research And Design Relating Thereto; Industrial Analysis And Industrial Research Services; Design And Development Of Computer Hardware And Software

Trademark Details
This Brand Name TRELLIX is applied by Musarubra Us Llc
This Trademark was applied on date 19 January 2022
This Application has been filed by their agent RNA, IP ATTORNEYS
Trademark | TRELLIX |
Application No | 5290811 |
Filing Dte | 19-01-2022 |
User Detail | Proposed to be used |
Certificate Number | 3060306 |
Valid Until | 19-01-2032 |
Goods and Service | [class : 9] Downloadable And Recorded Computer Utility Software; Computer Anti-virus Software; Downloadable And Recorded Computer Software And Computer Hardware For Providing Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computer Security; Downloadable And Recorded Computer Software And Computer Hardware For Use In Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Downloadable And Recorded Computer Software For The Detection, Blocking And Removal Of Computer Viruses, Malware And Other Threats; Downloadable And Recorded Computer Communications Software For Monitoring, Managing, Filtering, And Regulating Electronic And Wireless Communications; Downloadable And Recorded Computer Software For Protecting And Securing Computer Networks And Applications; Downloadable And Recorded Computer Software For Encrypting And Authenticating Data; Downloadable And Recorded Computer Software For Detecting And Repairing Computer Software And Hardware; Downloadable And Recorded Computer Software And Computer Hardware For Automatically Confirming And Enforcing Computer Security Policies, For Identifying Computer Security Policy Violations, And For Generating Computer Security Policy Compliance Reports; Downloadable And Recorded Computer Software And Computer Hardware For The Management, Administration And Optimization Of Computer Networks And Applications; Downloadable And Recorded Computer Software And Computer Hardware For Use In The Monitoring And Control Of, And Generating Reports On, Computer And Online Activity; Downloadable And Recorded Computer Software For Creating And Maintaining Firewalls; Computer Hardware And Downloadable And Recorded Computer Software For Protecting And Securing Computer Systems, And Computer Networks And Applications; Intrusion Detection, Prevention And Repair Software; Downloadable And Recorded Computer Software And Computer Hardware For Encrypting And Authenticating Data; Downloadable And Recorded Computer Software For Identity Protection, Authentication Of Users, And Privacy Control; Downloadable And Recorded Computer Software For Secure Storage And Management Of Usernames And Passwords; Content Filtering Software; Computer Hardware And Downloadable And Recorded Computer Software For Automatically Updating Computer Utility And Security Software; Computer Hardware And Downloadable And Recorded Computer Software For Rating The Security Level Of Internet Sites; Downloadable And Recorded Computer Software For Extended Detection And Response Technology For Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Scientific, Research, Navigation, Surveying, Photographic, Cinematographic, Audiovisual, Optical, Weighing, Measuring, Signalling, Detecting, Testing, Inspecting, Life-saving And Teaching Apparatus And Instruments; Apparatus And Instruments For Conducting, Switching, Transforming, Accumulating, Regulating Or Controlling The Distribution Or Use Of Electricity; Apparatus And Instruments For Recording, Transmitting, Reproducing Or Processing Sound, Images Or Data; Recorded And Downloadable Media, Computer Software, Blank Digital Or Analogue Recording And Storage Media; Mechanisms For Coin-operated Apparatus; Cash Registers, Calculating Devices; Computers And Computer Peripheral Devices; Diving Suits, Divers' Masks, Ear Plugs For Divers, Nose Clips For Divers And Swimmers, Gloves For Divers, Breathing Apparatus For Underwater Swimming; Fire-extinguishing Apparatus[class : 42] Providing Temporary Use Of Non-downloadable Security Software; Providing Temporary Use Of Non-downloadable Software For Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computer Security; Providing Temporary Use Of Non-downloadable Software For Detecting, Blocking And Removing Computer Viruses, Malware And Threats, Encrypting And Authenticating Data, Managing And Filtering Electronic Communications, And Detecting And Repairing Computer Software And Hardware Problems; Providing Temporary Use Of Non-downloadable Software For Computer Software And Hardware For Use In Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Technology Consultation In The Field Of Cybersecurity; Providing Temporary Use Of Non-downloadable Software For Extended Detection And Response Technology For Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Security As A Service (secaas) Featuring Computer Software Platforms For Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computer Security; Security As A Service (secaas) Featuring Computer Software Platforms For Detecting, Blocking And Removing Computer Viruses, Malware And Threats, Encrypting And Authenticating Data, Managing And Filtering Electronic Communications, And Detecting And Repairing Computer Software And Hardware Problems; Security As A Service (secaas) Featuring Computer Software Platforms For Use In Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Technology Consultation In The Field Of Cybersecurity; Security As A Service (secaas) Featuring Computer Software Platforms For Extended Detection And Response Technology For Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Software As A Service (saas) Services Featuring Computer Software Platforms For Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computer Security; Software As A Service (saas) Services Featuring Computer Software Platforms For Detecting, Blocking And Removing Computer Viruses, Malware And Threats, Encrypting And Authenticating Data, Managing And Filtering Electronic Communications, And Detecting And Repairing Computer Software And Hardware Problems; Software As A Service (saas) Services Featuring Computer Software Platforms For Use In Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Technology Consultation In The Field Of Cybersecurity; Software As A Service (saas) Services Featuring Computer Software Platforms For Extended Detection And Response Technology For Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Platform As A Service (paas) Featuring Computer Software Platforms For Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computer Security; Platform As A Service (paas) Featuring Computer Software Platforms For Detecting, Blocking And Removing Computer Viruses, Malware And Threats, Encrypting And Authenticating Data, Managing And Filtering Electronic Communications, And Detecting And Repairing Computer Software And Hardware Problems; Platform As A Service (paas) Featuring Computer Software Platforms For Use In Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Technology Consultation In The Field Of Cybersecurity; Platform As A Service (paas) Featuring Computer Software Platforms For Extended Detection And Response Technology For Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Infrastructure As A Service (iaas) Services, Namely, Hosting Software For Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computer Security; Infrastructure As A Service (iaas) Services, Namely, Hosting Software For Detecting, Blocking And Removing Computer Viruses, Malware And Threats, Encrypting And Authenticating Data, Managing And Filtering Electronic Communications, And Detecting And Repairing Computer Software And Hardware Problems; Infrastructure As A Service (iaas) Services, Namely, Hosting Software For Use In Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Technology Consultation In The Field Of Cybersecurity; Infrastructure As A Service (iaas) Services, Namely, Hosting Software For Extended Detection And Response Technology For Securing, Monitoring And Protecting Enterprise Systems, Endpoints, Servers, Communication Networks, Computer Networks, Data, Network, Internet, And Computers; Consulting, Testing, Research And Advisory Services In The Field Of Computer, Data, And Network Security; Research, Development And Design Of Computer Hardware And Software; Technical Support Services For Others In The Fields Of Computer, Data, And Network Security, Namely, Troubleshooting In The Nature Of Diagnosing Computer Hardware And Software Problems; Automatic Updating Of Computer Software; Troubleshooting In The Nature Of Diagnosing Computer Hardware Problems; Computer Security Threat Analysis For Protecting Data In The Nature Of Collecting, Compiling, And Analyzing Data For The Purpose Of Generating And Transmitting Reports On And Ratings Of The Level Of Security Of Third Party Software Residing On The Computers Of Others; Computer Programming Services For Others In The Fields Of Computer, Data, And Network Security; Computer Forensics Services; Providing Information In The Fields Of Network, Data, And Computer Security; Maintenance Of Computer Software; Monitoring Of Computer Systems For Security Purposes To Protect Data And Information From Unauthorized Access; Security Services, Namely, Intrusion Detection Services, Intrusion Prevention Services, Vulnerability Assessment Services, And Services In The Nature Of Detecting And Removing Computer Viruses And Threats; Cybersecurity Services In The Nature Of Restricting Unauthorized Access To Computer Systems; Scientific And Technological Services And Research And Design Relating Thereto; Industrial Analysis And Industrial Research Services; Design And Development Of Computer Hardware And Software |
Business Name | Musarubra Us Llc |
Business Type | Private Limited Company |
Business Sector | Service |

What trademarKing.in Does
TrademarKing help you to register trademark in India. Every year many business use TrademarKing.in to register & protect their brands with smooth filing process. TrademarKing also monitors your Brand name if TrademarK Registration is done through TrademarKing.in. Now you can Register TrademarK Through TrademarKing.in.
In India we have filed 100000+ Trademark Registration , so start now! to register your trademark.
TrademarKing is a free trademark search engine developend by PCNR Trademarks Management Pvt Ltd, India.
Trademark Monitoring