Brands and Their Owners
CHECK POINT SOFTWARE TECHNOLOGIES LTD. contact information is shown below | |
Owner: | CHECK POINT SOFTWARE TECHNOLOGIES LTD. |
---|---|
Owner Address: | 5 Ha'solelim Street Tel Aviv 6789705 Israel |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
ABRA |
---|---|
Description: | USB hardware and operating software for network security; USB computer security key; USB computer access control key; |
Category: | USB HARDWARE OPERATING SOFTWARE |
Brand: |
CCSA |
---|---|
Description: | Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management; |
Category: | COMPUTER SOFTWARE PROTECT SYSTEMS |
Brand: |
CCSA |
---|---|
Description: | Certification of individuals who meet certain educational criteria in relationship to computer technology; |
Category: | CERTIFICATION INDIVIDUALS WHO MEET |
Brand: |
CCSE |
---|---|
Description: | Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management; |
Category: | COMPUTER SOFTWARE PROTECT SYSTEMS |
Brand: |
CCSE |
---|---|
Description: | Certification of individuals who meet certain educational criteria in relationship to computer technology; |
Category: | CERTIFICATION INDIVIDUALS WHO MEET |
Brand: |
CCSI |
---|---|
Description: | Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management; |
Category: | COMPUTER SOFTWARE PROTECT SYSTEMS |
Brand: |
CCSR |
---|---|
Description: | Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management; |
Category: | COMPUTER SOFTWARE PROTECT SYSTEMS |
Brand: |
CHECK POINT |
---|---|
Description: | software and/or applications incorporated into computers and/or network systems used in data networks to control network traffic flow, establish trusted links over the network and/or internet, prevent network attacks (as opposed to physical attacks and/or theft) and to integrate various technologies into a uniform network security policy sold primarily through value added resellers and system integrators, computer and network equipment providers, telecommunications and internet service providers;Color is not claimed as a feature of the mark.; |
Category: | SOFTWARE OR APPLICATIONS INCORPORATED |
Brand: |
CHECK POINT |
---|---|
Description: | Provision of training; provision of training courses; provision of training programs in the field of cyber security; educational services; arranging of educational conferences; conducting of educational seminars; teaching; arranging and conducting of workshops, tutorials, seminars and conferences; arranging professional workshop and training courses; consultancy relating to arranging and conducting of training workshops; arranging and conducting of workshops and seminars in the field of internet and network security; providing of training and further training; personal development training; vocational training; providing of training and education; providing online training; providing online training seminars; providing online information in the field of training;Computer hardware and computer software in the field of internet and network security; computer software and hardware with embedded technology designed to protect and secure computer systems and networks; computer software for protecting and securing computer systems and networks; computer software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware;Printed matter; instructional and technical manuals; datasheets; product documentation; training materials; catalogues; brochures;Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; providing computer and information technology security services through the cloud; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware; |
Category: | PROVISION TRAINING |
Brand: |
CHECK POINT ABRA |
---|---|
Description: | USB hardware and operating software for network security; USB computer security key; USB computer access control key; |
Category: | USB HARDWARE OPERATING SOFTWARE |
Brand: |
CHECKPOINT |
---|---|
Description: | software and/or applications incorporated into computers and/or network systems used in data networks to control network traffic flow, establish trusted links over the network and/or internet, prevent network attacks (as opposed to physical attacks and/or theft) and to integrate various technologies into a uniform network security policy sold primarily through value added resellers and system integrators, computer and network equipment providers, telecommunications and internet service providers;CHECK POINT; |
Category: | SOFTWARE OR APPLICATIONS INCORPORATED |
Brand: |
CLOUDGUARD |
---|---|
Description: | (Based on Intent to Use) Computer hardware in the field of internet and network security; recorded computer software embedded in hardware for protecting and securing computer systems and networks; technology in the nature of computer hardware embedded in hardware for protecting and securing computer systems and networks; downloadable computer software for protecting and securing computer systems and networks; downloadable computer software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware;CLOUD GUARD;(Based on Use in Commerce) Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; providing computer and information technology security services through the cloud, for protecting data and information from unauthorized access and for detecting and preventing computer and email viruses, spam, spyware, adware and malware; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware; |
Category: | BASED ON INTENT USE |
Brand: |
CYBERDOME |
---|---|
Description: | Computer hardware and computer software in the field of internet and network security; computer software and technology embedded in hardware designed to protect and secure computer systems and networks; computer software for protecting and securing computer systems and networks;Printed matter; instructional and technical manuals; catalogues; brochures;CYBER DOME;Providing online, non-downloadable software for protecting and securing computer systems and networks; providing computer and information technology security services; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and e-mail viruses, spam, spy ware, ad ware and malware; |
Category: | COMPUTER HARDWARE COMPUTER SOFTWARE |
Brand: |
DOME9 |
---|---|
Description: | (Based on Intent to Use) (Based on 44(d) Priority Application) Computer hardware in the field of internet and network security; (Based on Use in Commerce) (Based on 44(d) Priority Application) Computer software in the field of internet and network security; computer software and technology embedded in hardware designed to protect and secure computer systems and networks; computer software for protecting and securing computer systems and networks; computer software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware;DOMENINE;Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; providing computer and information technology security services through the cloud; providing online, nondownloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware; |
Category: | BASED ON INTENT USE |
Brand: |
FIREWALL-1 |
---|---|
Description: | computer software intended to protect computer systems from unauthorized access via computer networks;printed matter in the form of catalogs, brochures, instructional and technical manuals about computer software intended to protect computer systems from unauthorized access via computer networks;FIREWALL 1; |
Category: | COMPUTER SOFTWARE INTENDED PROTECT |
Brand: |
FIREWALL-FIRST |
---|---|
Description: | computer software intended to protect computer systems from unauthorized access via computer networks and instructional and technical manuals sold therewith;FIRE WALL FIRST; |
Category: | COMPUTER SOFTWARE INTENDED PROTECT |
Brand: |
IQ ENGINE |
---|---|
Description: | COMPUTER PROGRAMS FOR NETWORK MANAGEMENT;ENGINE; |
Category: | COMPUTER PROGRAMS NETWORK MANAGEMENT |
Brand: |
MULTISPECT |
---|---|
Description: | A feature of computer software for network security that inspects, classifies and correlates sensitive data and documents; |
Category: |