About 38 Trademarks found for “KASE*”
Filters
Also try searching for:
*ASE
Mark | Details | Status | Class/Description | |
---|---|---|---|---|
Kaseya 365 EXPRESS KASEYA US LLC 2500863 30 Sept 2024 | Accepted: In opposition period | Downloadable enterprise software used to track and improve the perform... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Downloadable enterprise software used to track and improve the performance and availability of business services from an information technology operations perspective; computer software, namely, downloadable application software for use in accessing a platform featuring software for use in managing business processes; downloadable computer software for enterprise application integration (EAI); downloadable computer software for application and database integration; downloadable computer software for management of computer-based information systems and networks for businesses; downloadable computer software for developing, deploying, operating, monitoring, configuring, customizing, implementing and managing of computer systems, networks, and applications; downloadable computer software for workflow and business process automation; downloadable computer software for information technology service automation; downloadable computer software for identifying elements of information technology infrastructure; downloadable computer software for generating performance analytics; downloadable computer software for facilities management; downloadable computer software for field service automation; downloadable computer software for application integration; downloadable computer software development tools; downloadable computer software for ensuring the security and backup of electronic mail; downloadable anti-spyware software; downloadable computer software for controlling and managing access server applications; downloadable computer software for the creation of firewalls; downloadable computer anti-virus software; downloadable computer software for administration of computer local area networks; downloadable computer software for administration of computer networks; computer software for backup, restoration and storage of computer data, electronic data and endpoints locally and in remote locations; computer software for managing both local and remote automated data backup and storage; downloadable computer software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; downloadable computer software for data and file sharing, syncing and storage; downloadable computer software for vulnerability scanning and penetration testing of computers, networks and endpoints to assess information security vulnerabilities; downloadable anti-phishing computer software; downloadable computer networking software; downloadable software for providing security awareness training in the field of computers, electronic data and the internet; downloadable patch software and user authentication software; downloadable computer software for network assessements; downloadable computer software for cyber security threat detection, scanning, alerting and resolution; downloadable computer software for compliance; downloadable computer software for remotely monitoring and managing computer systems, applications and devices; downloadable computer software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto. Class 042 Class 042 Computer & Software Services & Scientific Services Software as a service (SAAS) services featuring enterprise software used to track, analyze and improve the performance and availability of applications, infrastructure and business services; infrastructure-as-service (IAAS) services featuring computer software platforms for creating, managing and deploying cloud computing infrastructure services; platform-as-a-service (PAAS) services featuring computer software platforms for use in developing, configuring, customizing and deploying software applications; software-as-a-service (SAAS) services featuring software for use in managing business processes; software as a service (SAAS) services featuring software for use in managing computer-based information systems and networks; cloud computing services, namely, cloud computing featuring online non-downloadable software for use in developing, configuring, customizing and deploying software applications, managing business processes, and managing computer-based information systems; computer services, namely, cloud hosting provider services; providing temporary use of non-downloadable software to others for information technology service management (ITSM) and information technology operations management (ITOM); application service provider (ASP) services, namely, hosting computer software applications of others; Platform as a service (PAAS) featuring a non-downloadable computer software platform for use by others to develop, configure, customize, and deploy software applications; providing temporary use of non-downloadable software to others for developing, deploying, operating, monitoring, configuring, customizing, implementing, and managing computer systems and applications; providing temporary use of non-downloadable software for managing computer-based information systems for businesses; providing temporary use of non-downloadable software to others for information technology service automation; providing temporary use of non-downloadable software for workflow and business process automation; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, remote management of the information technology (IT) systems of others; IT integration services; maintenance and updating of computer software; maintenance of computer software relating to computer security and prevention of computer risks; periodic upgrading of computer software for others; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, troubleshooting of computer software problems; technical support, namely, monitoring technological functions of computer network systems; updating of computer software relating to computer security and prevention of computer risks; remote computer backup services; remote online backup of computer data; back-up services for computer hard drive data; computer services, namely, data backup services; computer services, namely, recovery of data from remote data storage centers; providing non-downloadable software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; providing non-downloadable software for data; software as a service (SAAS) services featuring software and computer security consultancy for scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring anti-phishing software; software as a service (SAAS) services featuring networking software; Software as a service (SAAS) services featuring software for providing security awareness training in the field of computers, electronic data and the Internet; software as a service (SAAS) services featuring patch software and user authentication software; software as a service (SAAS) services featuring software for network assessements; software as a service (SAAS) services featuring software for cyber security threat detection, scanning, alerting and resolution; software as a service (SAAS) services featuring software for compliance; software as a service (SAAS) services featuring software remotely monitoring and managing computer systems, applications and devices; software as a service (SAAS) services featuring software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto. | ||
KASEYA 365 KASEYA US LLC 2500603 21 Aug 2024 | Accepted: In opposition period | Downloadable enterprise software used to track and improve the perform... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Downloadable enterprise software used to track and improve the performance and availability of business services from an information technology operations perspective; computer software, namely, downloadable application software for use in accessing a platform featuring software for use in managing business processes; downloadable computer software for enterprise application integration (EAI); downloadable computer software for application and database integration; downloadable computer software for management of computer-based information systems and networks for businesses; downloadable computer software for developing, deploying, operating, monitoring, configuring, customizing, implementing and managing of computer systems, networks, and applications; downloadable computer software for workflow and business process automation; downloadable computer software for information technology service automation; downloadable computer software for identifying elements of information technology infrastructure; downloadable computer software for generating performance analytics; downloadable computer software for facilities management; downloadable computer software for field service automation; downloadable computer software for application integration; downloadable computer software development tools; downloadable computer software for ensuring the security and backup of electronic mail; downloadable anti-spyware software; downloadable computer software for controlling and managing access server applications; downloadable computer software for the creation of firewalls; downloadable computer anti-virus software; downloadable computer software for administration of computer local area networks; downloadable computer software for administration of computer networks; computer software for backup, restoration and storage of computer data, electronic data and endpoints locally and in remote locations; computer software for managing both local and remote automated data backup and storage; downloadable computer software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; downloadable computer software for data and file sharing, syncing and storage; downloadable computer software for vulnerability scanning and penetration testing of computers, networks and endpoints to assess information security vulnerabilities; downloadable anti-phishing computer software; downloadable computer software for managed security operations, namely, for malicious website detection, for monitoring, detecting and responding to threats across computers, endpoints, networks and cloud attack vectors; downloadable computer networking software; downloadable software for providing security awareness training in the field of computers, electronic data and the internet; downloadable patch software and user authentication software; downloadable computer software for network assessements; downloadable computer software for cyber security threat detection, scanning, alerting and resolution; downloadable computer software for compliance; downloadable computer software for remotely monitoring and managing computer systems, applications and devices; downloadable computer software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto. Class 042 Class 042 Computer & Software Services & Scientific Services Software as a service (SaaS) services featuring enterprise software used to track, analyze and improve the performance and availability of applications, infrastructure and business services; infrastructure-as-service (IaaS) services featuring computer software platforms for creating, managing and deploying cloud computing infrastructure services; platform-as-a-service (PaaS) services featuring computer software platforms for use in developing, configuring, customizing and deploying software applications; software-as-a-service (SaaS) services featuring software for use in managing business processes; software as a service (SaaS) services featuring software for use in managing computer-based information systems and networks; cloud computing services, namely, cloud computing featuring online non-downloadable software for use in developing, configuring, customizing and deploying software applications, managing business processes, and managing computer-based information systems; computer services, namely, cloud hosting provider services; providing temporary use of non-downloadable software to others for information technology service management (ITSM) and information technology operations management (ITOM); application service provider (ASP) services, namely, hosting computer software applications of others; platform as a service (PaaS) featuring a non-downloadable computer software platform for use by others to develop, configure, customize, and deploy software applications; providing temporary use of non-downloadable software to others for developing, deploying, operating, monitoring, configuring, customizing, implementing, and managing computer systems and applications; providing temporary use of non-downloadable software for managing computer-based information systems for businesses; providing temporary use of non-downloadable software to others for information technology service automation; providing temporary use of non-downloadable software for workflow and business process automation; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, remote management of the information technology (IT) systems of others; IT integration services; maintenance and updating of computer software; maintenance of computer software relating to computer security and prevention of computer risks; periodic upgrading of computer software for others; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, troubleshooting of computer software problems; technical support, namely, monitoring technological functions of computer network systems; updating of computer software relating to computer security and prevention of computer risks; remote computer backup services; remote online backup of computer data; back-up services for computer hard drive data; computer services, namely, data backup services; computer services, namely, recovery of data from remote data storage centers; providing non-downloadable software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; providing non-downloadable software for data; software as a service (SaaS) services featuring software and computer security consultancy for scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SaaS) services featuring anti-phishing software; software as a service (SaaS) services featuring software for managed security operations, namely, for malicious website detection, for monitoring, detecting and responding to threats across computers, endpoints, networks and cloud attack vectors; software as a service (SaaS) services featuring networking software; software as a service (SaaS) services featuring software for providing security awareness training in the field of computers, electronic data and the internet; software as a service (SaaS) services featuring patch software and user authentication software; software as a service (SaaS) services featuring software for network assessments; software as a service (SaaS) services featuring software for cyber security threat detection, scanning, alerting and resolution; software as a service (SaaS) services featuring software for compliance; software as a service (SaaS) services featuring software remotely monitoring and managing computer systems, applications and devices; software as a service (SaaS) services featuring software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto. | ||
KASEYA DARK WEB ID Kaseya Limited 2454521 30 May 2024 | Accepted: In opposition period | Software as a service (SAAS) services featuring software for monitorin... Class 042 Class 042 Computer & Software Services & Scientific Services Software as a service (SAAS) services featuring software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cyber security breaches to facilitate the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto; computer services, namely, monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cyber security breaches to facilitate the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto. | ||
KASEYA 365 KASEYA US LLC 2476023 8 May 2024 | Accepted: In opposition period | Downloadable enterprise software used to track and improve the perform... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Downloadable enterprise software used to track and improve the performance and availability of business services from an information technology operations perspective; computer software, namely, downloadable application software for use in accessing a platform featuring software for use in managing business processes; downloadable computer software for enterprise application integration (eai); downloadable computer software for application and database integration; downloadable computer software for management of computer-based information systems and networks for businesses; downloadable computer software for developing, deploying, operating, monitoring, configuring, customizing, implementing and managing of computer systems, networks, and applications; downloadable computer software for workflow and business process automation; downloadable computer software for information technology service automation; downloadable computer software for identifying elements of information technology infrastructure; downloadable computer software for generating performance analytics; downloadable computer software for facilities management; downloadable computer software for field service automation; downloadable computer software for application integration; downloadable computer software development tools; downloadable computer software for ensuring the security and backup of electronic mail; downloadable anti-spyware software; downloadable computer software for controlling and managing access server applications; downloadable computer software for the creation of firewalls; downloadable computer anti-virus software; downloadable computer software for administration of computer local area networks; downloadable computer software for administration of computer networks; computer software for backup, restoration and storage of computer data, electronic data and endpoints locally and in remote locations; computer software for managing both local and remote automated data backup and storage; downloadable computer software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; downloadable computer software for data and file sharing, syncing and storage; downloadable computer software for vulnerability scanning and penetration testing of computers, networks and endpoints to assess information security vulnerabilities; downloadable anti-phishing computer software; downloadable computer software for managed security operations, namely, for malicious website detection, for monitoring, detecting and responding to threats across computers, endpoints, networks and cloud attack vectors; downloadable computer networking software; downloadable software for providing security awareness training in the field of computers, electronic data and the internet; downloadable patch software and user authentication software; downloadable computer software for network assessements; downloadable computer software for cyber security threat detection, scanning, alerting and resolution; downloadable computer software for compliance; downloadable computer software for remotely monitoring and managing computer systems, applications and devices; downloadable computer software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto. Class 042 Class 042 Computer & Software Services & Scientific Services Software as a service (SaaS) services featuring enterprise software used to track, analyze and improve the performance and availability of applications, infrastructure and business services; infrastructure-as-service (IAAS) services featuring computer software platforms for creating, managing and deploying cloud computing infrastructure services; platform-as-a-service (PaaS) services featuring computer software platforms for use in developing, configuring, customizing and deploying software applications; software-as-a-service (SaaS) services featuring software for use in managing business processes; software as a service (SaaS) services featuring software for use in managing computer-based information systems and networks; cloud computing services, namely, cloud computing featuring online non-downloadable software for use in developing, configuring, customizing and deploying software applications, managing business processes, and managing computer-based information systems; computer services, namely, cloud hosting provider services; providing temporary use of non-downloadable software to others for information technology service management (ITSM) and information technology operations management (ITOM); application service provider (ASP) services, namely, hosting computer software applications of others; platform as a service (PaaS) featuring a non-downloadable computer software platform for use by others to develop, configure, customize, and deploy software applications; providing temporary use of non-downloadable software to others for developing, deploying, operating, monitoring, configuring, customizing, implementing, and managing computer systems and applications; providing temporary use of non-downloadable software for managing computer-based information systems for businesses; providing temporary use of non-downloadable software to others for information technology service automation; providing temporary use of non-downloadable software for workflow and business process automation; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, remote management of the information technology (IT) systems of others; IT integration services; maintenance and updating of computer software; maintenance of computer software relating to computer security and prevention of computer risks; periodic upgrading of computer software for others; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, troubleshooting of computer software problems; technical support, namely, monitoring technological functions of computer network systems; updating of computer software relating to computer security and prevention of computer risks; remote computer backup services; remote online backup of computer data; back-up services for computer hard drive data; computer services, namely, data backup services; computer services, namely, recovery of data from remote data storage centers; providing non-downloadable software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; providing non-downloadable software for data; software as a service (SaaS) services featuring software and computer security consultancy for scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SaaS) services featuring anti-phishing software; Software as a service (SaaS) services featuring software for managed security operations, namely, for malicious website detection, for monitoring, detecting and responding to threats across computers, endpoints, networks and cloud attack vectors; software as a service (SaaS) services featuring networking software; software as a service (SaaS) services featuring software for providing security awareness training in the field of computers, electronic data and the Internet; software as a service (SaaS) services featuring patch software and user authentication software; software as a service (SaaS) services featuring software for network assessements; software as a service (SaaS) services featuring software for cyber security threat detection, scanning, alerting and resolution; software as a service (SaaS) services featuring software for compliance; software as a service (SaaS) services featuring software remotely monitoring and managing computer systems, applications and devices; software as a service (SaaS) services featuring software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto. | ||
Kasey Lee Hair Extensions Pty Ltd Kasey Lee Hair Extensions Pty Ltd 2409968 30 Nov 2023 | Lapsed: Not accepted | Hair extensions Class 026 Class 026 Lace, Ribbons & Embroidery and Fancy Goods Hair extensions | ||
Kasey Lee Blonde Specialist Kasey Lee Blonde Specialist Pty Ltd 2409958 30 Nov 2023 | Lapsed: Not accepted | Hair care products Class 003 Class 003 Cosmetics and Cleaning Products Hair care products | ||
KASE 1840551 26 Apr 2017 | Lapsed: Not accepted | Mobile phone cases; Mobile phone covers; Mobile phone straps Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Mobile phone cases; Mobile phone covers; Mobile phone straps | ||
KASET RICE Thai Ha Public Company Limited 1571281 29 Jul 2013 | Removed - Not renewed: Renewal fee not paid | Flavoured rices; Flour of rice; Foodstuffs made of rice; Fried rice; F... Class 030 Class 030 Staple Food Products Flavoured rices; Flour of rice; Foodstuffs made of rice; Fried rice; Frozen meals consisting primarily of rice; Frozen prepared rice; Meals made predominantly from rice, pasta or noodles; Natural rice flakes; Prepared meals containing (principally) rice; Prepared rice dishes; Puffed rice; Rice; Rice based snack foods; Rice biscuits; Rice cakes; Rice chips; Rice crackers; Rice crust; Rice flour; Rice mixes; Rice paper; Rice prepared for culinary purposes; Rice products for culinary purposes; Rice puddings; Rice salads; Rice sticks; Rice tapioca; Sauces for rice; Snack food products made from rice; Snack food products made from rice flour; Snack foods consisting principally of rice; Wild rice (prepared); Sushi; Tapioca; Tapioca flour for food | ||
Kase King 1338799 15 Jan 2010 | Removed - Not renewed: Renewal fee not paid | Apparel (clothing, footwear, headgear) Class 025 Class 025 Clothing Products Apparel (clothing, footwear, headgear) | ||
Kase Clothing 1338800 15 Jan 2010 | Removed - Not renewed: Renewal fee not paid | Apparel (clothing, footwear, headgear) Class 025 Class 025 Clothing Products Apparel (clothing, footwear, headgear) |
KASEYA US LLC
2500863 · 30 Sept 2024
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Downloadable enterprise software used to track and improve the performance and availability of business services from an information technology operations perspective; computer software, namely, downloadable application software for use in accessing a platform featuring software for use in managing business processes; downloadable computer software for enterprise application integration (EAI); downloadable computer software for application and database integration; downloadable computer software for management of computer-based information systems and networks for businesses; downloadable computer software for developing, deploying, operating, monitoring, configuring, customizing, implementing and managing of computer systems, networks, and applications; downloadable computer software for workflow and business process automation; downloadable computer software for information technology service automation; downloadable computer software for identifying elements of information technology infrastructure; downloadable computer software for generating performance analytics; downloadable computer software for facilities management; downloadable computer software for field service automation; downloadable computer software for application integration; downloadable computer software development tools; downloadable computer software for ensuring the security and backup of electronic mail; downloadable anti-spyware software; downloadable computer software for controlling and managing access server applications; downloadable computer software for the creation of firewalls; downloadable computer anti-virus software; downloadable computer software for administration of computer local area networks; downloadable computer software for administration of computer networks; computer software for backup, restoration and storage of computer data, electronic data and endpoints locally and in remote locations; computer software for managing both local and remote automated data backup and storage; downloadable computer software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; downloadable computer software for data and file sharing, syncing and storage; downloadable computer software for vulnerability scanning and penetration testing of computers, networks and endpoints to assess information security vulnerabilities; downloadable anti-phishing computer software; downloadable computer networking software; downloadable software for providing security awareness training in the field of computers, electronic data and the internet; downloadable patch software and user authentication software; downloadable computer software for network assessements; downloadable computer software for cyber security threat detection, scanning, alerting and resolution; downloadable computer software for compliance; downloadable computer software for remotely monitoring and managing computer systems, applications and devices; downloadable computer software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto.
042
Class 042
Computer & Software Services & Scientific Services
Software as a service (SAAS) services featuring enterprise software used to track, analyze and improve the performance and availability of applications, infrastructure and business services; infrastructure-as-service (IAAS) services featuring computer software platforms for creating, managing and deploying cloud computing infrastructure services; platform-as-a-service (PAAS) services featuring computer software platforms for use in developing, configuring, customizing and deploying software applications; software-as-a-service (SAAS) services featuring software for use in managing business processes; software as a service (SAAS) services featuring software for use in managing computer-based information systems and networks; cloud computing services, namely, cloud computing featuring online non-downloadable software for use in developing, configuring, customizing and deploying software applications, managing business processes, and managing computer-based information systems; computer services, namely, cloud hosting provider services; providing temporary use of non-downloadable software to others for information technology service management (ITSM) and information technology operations management (ITOM); application service provider (ASP) services, namely, hosting computer software applications of others; Platform as a service (PAAS) featuring a non-downloadable computer software platform for use by others to develop, configure, customize, and deploy software applications; providing temporary use of non-downloadable software to others for developing, deploying, operating, monitoring, configuring, customizing, implementing, and managing computer systems and applications; providing temporary use of non-downloadable software for managing computer-based information systems for businesses; providing temporary use of non-downloadable software to others for information technology service automation; providing temporary use of non-downloadable software for workflow and business process automation; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, remote management of the information technology (IT) systems of others; IT integration services; maintenance and updating of computer software; maintenance of computer software relating to computer security and prevention of computer risks; periodic upgrading of computer software for others; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, troubleshooting of computer software problems; technical support, namely, monitoring technological functions of computer network systems; updating of computer software relating to computer security and prevention of computer risks; remote computer backup services; remote online backup of computer data; back-up services for computer hard drive data; computer services, namely, data backup services; computer services, namely, recovery of data from remote data storage centers; providing non-downloadable software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; providing non-downloadable software for data; software as a service (SAAS) services featuring software and computer security consultancy for scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring anti-phishing software; software as a service (SAAS) services featuring networking software; Software as a service (SAAS) services featuring software for providing security awareness training in the field of computers, electronic data and the Internet; software as a service (SAAS) services featuring patch software and user authentication software; software as a service (SAAS) services featuring software for network assessements; software as a service (SAAS) services featuring software for cyber security threat detection, scanning, alerting and resolution; software as a service (SAAS) services featuring software for compliance; software as a service (SAAS) services featuring software remotely monitoring and managing computer systems, applications and devices; software as a service (SAAS) services featuring software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto.
Downloadable enterprise software used to track and improve the perform...
KASEYA US LLC
2500603 · 21 Aug 2024
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Downloadable enterprise software used to track and improve the performance and availability of business services from an information technology operations perspective; computer software, namely, downloadable application software for use in accessing a platform featuring software for use in managing business processes; downloadable computer software for enterprise application integration (EAI); downloadable computer software for application and database integration; downloadable computer software for management of computer-based information systems and networks for businesses; downloadable computer software for developing, deploying, operating, monitoring, configuring, customizing, implementing and managing of computer systems, networks, and applications; downloadable computer software for workflow and business process automation; downloadable computer software for information technology service automation; downloadable computer software for identifying elements of information technology infrastructure; downloadable computer software for generating performance analytics; downloadable computer software for facilities management; downloadable computer software for field service automation; downloadable computer software for application integration; downloadable computer software development tools; downloadable computer software for ensuring the security and backup of electronic mail; downloadable anti-spyware software; downloadable computer software for controlling and managing access server applications; downloadable computer software for the creation of firewalls; downloadable computer anti-virus software; downloadable computer software for administration of computer local area networks; downloadable computer software for administration of computer networks; computer software for backup, restoration and storage of computer data, electronic data and endpoints locally and in remote locations; computer software for managing both local and remote automated data backup and storage; downloadable computer software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; downloadable computer software for data and file sharing, syncing and storage; downloadable computer software for vulnerability scanning and penetration testing of computers, networks and endpoints to assess information security vulnerabilities; downloadable anti-phishing computer software; downloadable computer software for managed security operations, namely, for malicious website detection, for monitoring, detecting and responding to threats across computers, endpoints, networks and cloud attack vectors; downloadable computer networking software; downloadable software for providing security awareness training in the field of computers, electronic data and the internet; downloadable patch software and user authentication software; downloadable computer software for network assessements; downloadable computer software for cyber security threat detection, scanning, alerting and resolution; downloadable computer software for compliance; downloadable computer software for remotely monitoring and managing computer systems, applications and devices; downloadable computer software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto.
042
Class 042
Computer & Software Services & Scientific Services
Software as a service (SaaS) services featuring enterprise software used to track, analyze and improve the performance and availability of applications, infrastructure and business services; infrastructure-as-service (IaaS) services featuring computer software platforms for creating, managing and deploying cloud computing infrastructure services; platform-as-a-service (PaaS) services featuring computer software platforms for use in developing, configuring, customizing and deploying software applications; software-as-a-service (SaaS) services featuring software for use in managing business processes; software as a service (SaaS) services featuring software for use in managing computer-based information systems and networks; cloud computing services, namely, cloud computing featuring online non-downloadable software for use in developing, configuring, customizing and deploying software applications, managing business processes, and managing computer-based information systems; computer services, namely, cloud hosting provider services; providing temporary use of non-downloadable software to others for information technology service management (ITSM) and information technology operations management (ITOM); application service provider (ASP) services, namely, hosting computer software applications of others; platform as a service (PaaS) featuring a non-downloadable computer software platform for use by others to develop, configure, customize, and deploy software applications; providing temporary use of non-downloadable software to others for developing, deploying, operating, monitoring, configuring, customizing, implementing, and managing computer systems and applications; providing temporary use of non-downloadable software for managing computer-based information systems for businesses; providing temporary use of non-downloadable software to others for information technology service automation; providing temporary use of non-downloadable software for workflow and business process automation; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, remote management of the information technology (IT) systems of others; IT integration services; maintenance and updating of computer software; maintenance of computer software relating to computer security and prevention of computer risks; periodic upgrading of computer software for others; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, troubleshooting of computer software problems; technical support, namely, monitoring technological functions of computer network systems; updating of computer software relating to computer security and prevention of computer risks; remote computer backup services; remote online backup of computer data; back-up services for computer hard drive data; computer services, namely, data backup services; computer services, namely, recovery of data from remote data storage centers; providing non-downloadable software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; providing non-downloadable software for data; software as a service (SaaS) services featuring software and computer security consultancy for scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SaaS) services featuring anti-phishing software; software as a service (SaaS) services featuring software for managed security operations, namely, for malicious website detection, for monitoring, detecting and responding to threats across computers, endpoints, networks and cloud attack vectors; software as a service (SaaS) services featuring networking software; software as a service (SaaS) services featuring software for providing security awareness training in the field of computers, electronic data and the internet; software as a service (SaaS) services featuring patch software and user authentication software; software as a service (SaaS) services featuring software for network assessments; software as a service (SaaS) services featuring software for cyber security threat detection, scanning, alerting and resolution; software as a service (SaaS) services featuring software for compliance; software as a service (SaaS) services featuring software remotely monitoring and managing computer systems, applications and devices; software as a service (SaaS) services featuring software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto.
Downloadable enterprise software used to track and improve the perform...
Kaseya Limited
2454521 · 30 May 2024
042
Class 042
Computer & Software Services & Scientific Services
Software as a service (SAAS) services featuring software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cyber security breaches to facilitate the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto; computer services, namely, monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cyber security breaches to facilitate the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto.
Software as a service (SAAS) services featuring software for monitorin...
KASEYA US LLC
2476023 · 8 May 2024
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Downloadable enterprise software used to track and improve the performance and availability of business services from an information technology operations perspective; computer software, namely, downloadable application software for use in accessing a platform featuring software for use in managing business processes; downloadable computer software for enterprise application integration (eai); downloadable computer software for application and database integration; downloadable computer software for management of computer-based information systems and networks for businesses; downloadable computer software for developing, deploying, operating, monitoring, configuring, customizing, implementing and managing of computer systems, networks, and applications; downloadable computer software for workflow and business process automation; downloadable computer software for information technology service automation; downloadable computer software for identifying elements of information technology infrastructure; downloadable computer software for generating performance analytics; downloadable computer software for facilities management; downloadable computer software for field service automation; downloadable computer software for application integration; downloadable computer software development tools; downloadable computer software for ensuring the security and backup of electronic mail; downloadable anti-spyware software; downloadable computer software for controlling and managing access server applications; downloadable computer software for the creation of firewalls; downloadable computer anti-virus software; downloadable computer software for administration of computer local area networks; downloadable computer software for administration of computer networks; computer software for backup, restoration and storage of computer data, electronic data and endpoints locally and in remote locations; computer software for managing both local and remote automated data backup and storage; downloadable computer software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; downloadable computer software for data and file sharing, syncing and storage; downloadable computer software for vulnerability scanning and penetration testing of computers, networks and endpoints to assess information security vulnerabilities; downloadable anti-phishing computer software; downloadable computer software for managed security operations, namely, for malicious website detection, for monitoring, detecting and responding to threats across computers, endpoints, networks and cloud attack vectors; downloadable computer networking software; downloadable software for providing security awareness training in the field of computers, electronic data and the internet; downloadable patch software and user authentication software; downloadable computer software for network assessements; downloadable computer software for cyber security threat detection, scanning, alerting and resolution; downloadable computer software for compliance; downloadable computer software for remotely monitoring and managing computer systems, applications and devices; downloadable computer software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto.
042
Class 042
Computer & Software Services & Scientific Services
Software as a service (SaaS) services featuring enterprise software used to track, analyze and improve the performance and availability of applications, infrastructure and business services; infrastructure-as-service (IAAS) services featuring computer software platforms for creating, managing and deploying cloud computing infrastructure services; platform-as-a-service (PaaS) services featuring computer software platforms for use in developing, configuring, customizing and deploying software applications; software-as-a-service (SaaS) services featuring software for use in managing business processes; software as a service (SaaS) services featuring software for use in managing computer-based information systems and networks; cloud computing services, namely, cloud computing featuring online non-downloadable software for use in developing, configuring, customizing and deploying software applications, managing business processes, and managing computer-based information systems; computer services, namely, cloud hosting provider services; providing temporary use of non-downloadable software to others for information technology service management (ITSM) and information technology operations management (ITOM); application service provider (ASP) services, namely, hosting computer software applications of others; platform as a service (PaaS) featuring a non-downloadable computer software platform for use by others to develop, configure, customize, and deploy software applications; providing temporary use of non-downloadable software to others for developing, deploying, operating, monitoring, configuring, customizing, implementing, and managing computer systems and applications; providing temporary use of non-downloadable software for managing computer-based information systems for businesses; providing temporary use of non-downloadable software to others for information technology service automation; providing temporary use of non-downloadable software for workflow and business process automation; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, remote management of the information technology (IT) systems of others; IT integration services; maintenance and updating of computer software; maintenance of computer software relating to computer security and prevention of computer risks; periodic upgrading of computer software for others; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, troubleshooting of computer software problems; technical support, namely, monitoring technological functions of computer network systems; updating of computer software relating to computer security and prevention of computer risks; remote computer backup services; remote online backup of computer data; back-up services for computer hard drive data; computer services, namely, data backup services; computer services, namely, recovery of data from remote data storage centers; providing non-downloadable software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; providing non-downloadable software for data; software as a service (SaaS) services featuring software and computer security consultancy for scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SaaS) services featuring anti-phishing software; Software as a service (SaaS) services featuring software for managed security operations, namely, for malicious website detection, for monitoring, detecting and responding to threats across computers, endpoints, networks and cloud attack vectors; software as a service (SaaS) services featuring networking software; software as a service (SaaS) services featuring software for providing security awareness training in the field of computers, electronic data and the Internet; software as a service (SaaS) services featuring patch software and user authentication software; software as a service (SaaS) services featuring software for network assessements; software as a service (SaaS) services featuring software for cyber security threat detection, scanning, alerting and resolution; software as a service (SaaS) services featuring software for compliance; software as a service (SaaS) services featuring software remotely monitoring and managing computer systems, applications and devices; software as a service (SaaS) services featuring software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto.
Downloadable enterprise software used to track and improve the perform...
Kasey Lee Hair Extensions Pty Ltd
2409968 · 30 Nov 2023
026
Class 026
Lace, Ribbons & Embroidery and Fancy Goods
Hair extensions
Hair extensions
Kasey Lee Blonde Specialist Pty Ltd
2409958 · 30 Nov 2023
003
Class 003
Cosmetics and Cleaning Products
Hair care products
Hair care products
1840551 · 26 Apr 2017
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Mobile phone cases; Mobile phone covers; Mobile phone straps
Mobile phone cases; Mobile phone covers; Mobile phone straps
Thai Ha Public Company Limited
1571281 · 29 Jul 2013
030
Class 030
Staple Food Products
Flavoured rices; Flour of rice; Foodstuffs made of rice; Fried rice; Frozen meals consisting primarily of rice; Frozen prepared rice; Meals made predominantly from rice, pasta or noodles; Natural rice flakes; Prepared meals containing (principally) rice; Prepared rice dishes; Puffed rice; Rice; Rice based snack foods; Rice biscuits; Rice cakes; Rice chips; Rice crackers; Rice crust; Rice flour; Rice mixes; Rice paper; Rice prepared for culinary purposes; Rice products for culinary purposes; Rice puddings; Rice salads; Rice sticks; Rice tapioca; Sauces for rice; Snack food products made from rice; Snack food products made from rice flour; Snack foods consisting principally of rice; Wild rice (prepared); Sushi; Tapioca; Tapioca flour for food
Flavoured rices; Flour of rice; Foodstuffs made of rice; Fried rice; F...
1338799 · 15 Jan 2010
025
Class 025
Clothing Products
Apparel (clothing, footwear, headgear)
Apparel (clothing, footwear, headgear)
Owners
Kaseya us llc (5)
Kaseya limited (5)
Kase group pty ltd (4)
Thai ha public company limited (3)
Centric global pty limited (1)
F h faulding & co limited (1)
Hofmeister vermogensverwaltungs gmbh & co. kg (1)
Kase equipment corporation an ohio corporation (1)
Kaserei champignon hofmeister kg (1)
Kasey lee blonde specialist pty ltd (1)
Kasey lee hair extensions pty ltd (1)
Shandong kasentex co., ltd. (1)
Statham international pty ltd (1)
Categories
Class 9 (16)
Class 42 (9)
Class 25 (5)
Class 30 (4)
Class 5 (2)
Class 7 (2)
Class 29 (2)
Class 1 (1)
Class 3 (1)
Class 8 (1)
Class 16 (1)
Class 20 (1)
Class 24 (1)
Class 26 (1)
Class 32 (1)
Class 33 (1)
Class 35 (1)
Correspondents
Griffith hack (9)
Fb rice pty ltd (2)
Spruson & ferguson (2)
Applied marks pty ltd (1)
Allens patent & trade mark attorneys (1)
Collison & co (1)
Corrs chambers westgarth (1)
Global trademarks inc (1)
Kasey lee blonde specialist (1)
Kasey lee hair extensions pty ltd (1)
Laminar ip pty ltd (1)
Legalvision ilp pty. ltd. (1)
Mackenzie ip (1)
Mcbratney law (1)