Consult an Expert
Trademark
Design Registration
Consult an Expert
Trademark
Copyright
Patent
Infringement
Design Registration
More
Consult an Expert
Consult an Expert
Trademark
Design Registration
Login
3842289
May 24, 2018
AMAZON GUARDDUTY is a Trademark filed on May 24, 2018 in through IP Office.The Trademark is registered to (1) AMAZON TECHNOLOGIES, INC.Body Incorporate and was filed by attorney.
Application ID
3842289
Status
Registered
Date of Application
May 24, 2018
Classes
9, 38, 42, 45
Proprietor(s)
(1) AMAZON TECHNOLOGIES, INC.Body Incorporate
Valid/Upto
24/05/2028
Details
[Class - 45]
Monitoring of computer systems and databases for security purposes; computerized security services, namely, electronically monitoring, identifying, detecting and reporting on unauthorized, malicious or unexpected activity related to user accounts, applications or services
[Class - 9]
Computer software, namely, software for monitoring, detecting, identifying, tracking, logging, analyzing and reporting in the field security monitoring and threat and intrusion detection; computer software for continuous security monitoring and threat and intrusion detection for cloud-based applications and services; network threat detection software; computer network security software; network access management and monitoring software; computer software development tools; computer software for allowing users to access, query, analyze, and quarantine cloud-based information and applications; computer software for data processing; computer hardware; computer software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information; computer software for IT security; computer software for data protection; computer software for data security; computer software for preventing attacks on networks, data, applications and services; computer software for insider threat detection and prevention; computer software for security and threat detection, monitoring, prevention and remediation; computer software for protecting user accounts, networks and applications from compromise; computer software for reading and analyzing computer event logs; computer software for monitoring computer network access and activity; computer software for detecting third party reconnaissance actions by potential attackers; computer software for automated remediation of security threats; computer software for identifying unauthorized, malicious or unexpected activity that present threats to user accounts, applications and services running in the cloud; computer software that uses machine learning for threat detection, threat intelligence and anomaly detection to proactively identify, alert and remediate malicious or unauthorized activity; computer software that provides detailed security findings on potential and actual unauthorized, malicious, or unexpected activity related to user accounts, applications or services
[Class - 38]
Providing access to hosted operating systems and computer applications through the Internet; providing access to databases; providing multiple-user access to data on the Internet in the fields of computer network security, security monitoring, threat detection and remediation; providing temporary access to remote computers for the purpose of running software programs