Brands and Their Owners
WATCHGUARD TECHNOLOGIES, INC. contact information is shown below | |
Owner: | WATCHGUARD TECHNOLOGIES, INC. |
---|---|
Owner Address: | 505 5th Ave. S, Ste 500 Seattle WA 98104 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
AUDITSCAN |
---|---|
Description: | AUDIT SCAN;Computer services, namely providing web-based scanning and assessment of computer networks and internet servers with respect to security and security vulnerability; |
Category: | AUDIT SCAN |
Brand: |
AUTHPOINT |
---|---|
Description: | Computer software for network security and authentication in the fields of security monitoring, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks; computer software for use in the field of network management, security and authentication; computer software for use with multi-factor authentication; downloadable computer software, namely, software used for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;AUTH POINT; AUTHENTICATION POINT; |
Category: | COMPUTER SOFTWARE NETWORK SECURITY |
Brand: |
AUTHPOINT |
---|---|
Description: | AUTH POINT; AUTHENTICATION POINT;Providing temporary use of non-downloadable cloud-based software used for authentication in the fields of security monitoring, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks; technical support, namely, monitoring technological functions of computer network systems; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security services in the nature of providing authentication, issuance, and validation of security credentials of computer network users; |
Category: | AUTH POINT |
Brand: |
DATABLINK |
---|---|
Description: | DATA BLINK;authentication services and issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; |
Category: | DATA BLINK |
Brand: |
DNSWATCH |
---|---|
Description: | Computer software, namely, downloadable computer programs and computer application software for mobile phones, namely, software for network security and authentication in the fields of security monitoring, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks; computer software for use in the field of network management, security and authentication; computer software for use with multi-factor authentication; downloadable computer software, namely, software used for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;DNS WATCH; |
Category: | COMPUTER SOFTWARE |
Brand: |
DNSWATCH |
---|---|
Description: | Providing temporary use of non-downloadable computer programs for protecting cybersecurity assets, for network defense and for monitoring, assessing and implementing improvements in security of network infrastructure and data; providing online non-downloadable software providing protection to cybersecurity assets and computer networks from malware, phishing and malicious advertising; providing online non-downloadable software for gathering information from malicious computer hosts, providing alerts on malware attacks, and for reporting of phishing emails; |
Category: | PROVIDING TEMPORARY USE NON DOWNLOADABLE |
Brand: |
FIREBOX |
---|---|
Description: | COMPUTER SOFTWARE, NAMELY, PROGRAMS RECORDED ON MAGNETIC MEDIA, AND USER MANUALS SOLD THEREWITH;FIRE BOX; |
Category: | COMPUTER SOFTWARE |
Brand: |
FIREBOX |
---|---|
Description: | computer hardware in the fields of security monitoring, access control, information flow control, namely, re-directing, slowing, stopping, re-starting, or accelerating the delivery of electronic data, and facilitating computer connections for local area, wide area and global computer networks, and manuals sold as a unit;FIRE BOX; |
Category: | COMPUTER HARDWARE FIELDS |
Brand: |
FIREBOX |
---|---|
Description: | Computer hardware; computer hardware for management of computer networks, wireless networks, and endpoint security; computer servers used for network security and management; downloadable computer software for network security, namely, firewall, unified threat management and virtual private network capabilities in the fields of security monitoring, identification of malware and spam, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks, and manuals sold as a unit; recorded and downloadable computer software for management of computer networks and wireless access points; recorded and downloadable computer software for management of traffic on computer networks; recorded and downloadable computer software for management of other computer applications on a computer network; recorded and downloadable computer software providing a graphical user interface for management of networked servers; recorded and downloadable computer software for management and analysis of use of wireless networks by users; recorded and downloadable computer software used for protection and management of confidential data and personally identifiable information; recorded and downloadable computer database management software for enabling secure access to stored data, providing data storage options, and for identifying and reporting network security threats, issues, and trends; recorded and downloadable computer software enabling users to set security policies for computer networks and network administration tasks; recorded and downloadable computer software for use in providing network security alerts; recorded and downloadable computer network management software for use in providing historical reports of jitter, packet loss, and latency, allowing administrators to better troubleshoot network connections; |
Category: | COMPUTER HARDWARE |
Brand: |
FIREBOX |
---|---|
Description: | Technical support for computer system access and security services, namely, remote and on-site monitoring of technological functions of local area, wide area, and global computer network systems and providing backup computer programs and facilities in the areas of security, access control, information flow control, and computer connection; computer security services, namely, restricting unauthorized access to computer networks; providing online non-downloadable software for use in identifying malware attacks; providing online non-downloadable software for use in detecting malicious websites, botnets, and wireless access points; providing online non-downloadable software for use in managing traffic on a computer network; online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; providing online non-downloadable software for management of computer software applications on a user's network; providing online non-downloadable computer software for visualization of connected devices and wireless access points; providing online non-downloadable software for monitoring, managing, and anonymizing personally identifying information and protecting confidential data on computer networks; computer security consulting services in the field of threat detection; computer security services, namely, preventing unwanted access and identification of malware and spam; computer security services, namely, monitoring of computer systems for purposes of detecting and reporting network security threats, issues, and trends; providing online, non-downloadable cloud based software enabling users to set security policies for computer networks and network administration tasks; providing online non-downloadable software for use in providing network security alerts; providing online non-downloadable computer network management software for use in providing historical reports of jitter, packet loss, and latency, allowing administrators to better troubleshoot network connections; |
Category: | TECHNICAL SUPPORT COMPUTER SYSTEM |
Brand: |
FIRECHIP |
---|---|
Description: | Computer chip that provides the interface logic between an external processor and the internet security functions of an internet security hardware appliance;FIRE CHIP; |
Category: | COMPUTER CHIP THAT PROVIDES |
Brand: |
FIRECLIENT |
---|---|
Description: | Computer application software for mobile phones and handheld computers, namely, software for use in providing security for mobile phones and handheld computers; Downloadable mobile applications for use in providing security for mobile phones and handheld computers; Downloadable software in the nature of a mobile application for use in providing security for mobile phones and handheld computers;FIRE CLIENT; |
Category: | COMPUTER APPLICATION SOFTWARE MOBILE |
Brand: |
FIRECORE |
---|---|
Description: | computer hardware and software for Internet security monitoring and control in the fields of computers, servers, networks;FIRE CORE; |
Category: | COMPUTER HARDWARE SOFTWARE |
Brand: |
FIREWARE |
---|---|
Description: | Computer operating system software sold as a feature of computer hardware, computer networks, and Internet servers for purposes of security monitoring, security vulnerability assessment, access control, and information flow control;FIRE WARE; |
Category: | COMPUTER OPERATING SYSTEM SOFTWARE SOLD |
Brand: |
INTELLIGENTAV |
---|---|
Description: | Downloadable computer software for providing network, Internet, and computer security; downloadable software module used for scanning of electronic files, and detection and blocking of malware malicious code; downloadable software in the nature of an antivirus engine; downloadable computer software for management of computer network traffic; downloadable computer software used to provide reporting on computer network performance and activity;INTELLIGENT ANTIVIRUS; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE PROVIDING |
Brand: |
INTELLIGENTAV |
---|---|
Description: | INTELLIGENT ANTIVIRUS;Non-downloadable computer software as a service featuring software for providing network, Internet, and computer security; Providing on-line non-downloadable computer software used for scanning of electronic files, and detection and blocking of malware malicious code on a user's computer network; Providing on-line non-downloadable antivirus engine software; Providing on-line non-downloadable computer software for management of computer network traffic; non-downloadable software as a service featuring software for updating computer software virus definitions; |
Category: | INTELLIGENT ANTIVIRUS |
Brand: |
KNOW WHAT TO DO |
---|---|
Description: | PROVIDING COMPUTER NETWORK AND INTERNET SERVER SECURITY;COMPUTER SERVICES, NAMELY, PROVIDING SECURITY BROADCASTS, VIRUS ALERTS, AND INFORMATION WITH RESPECT TO COMPUTER NETWORK AND INTERNET SERVER VIRUSES AND SECURITY THREATS; PROVIDING COMPUTER NETWORK AND INTERNET SERVER SECURITY SOFTWARE UPDATES AND PATCHES; PROVIDING TECHNICAL SUPPORT WITH RESPECT TO COMPUTER NETWORK AND INTERNET SERVER VIRUSES AND SECURITY THREATS; |
Category: | PROVIDING COMPUTER NETWORK INTERNET |
Brand: |
LIVESECURITY |
---|---|
Description: | Computer software and hardware in the fields of security monitoring, access control, information flow control and facilitating computer connections for local area, wide area and global computer networks, and manuals sold as a unit;LIVE SECURITY; |
Category: | COMPUTER SOFTWARE HARDWARE |
Brand: |
OUR SECURITY, DELIVERED YOUR WAY |
---|---|
Description: | Design and development of electronic data security systems; Development of software for secure network operations; |
Category: | DESIGN DEVELOPMENT ELECTRONIC |
Brand: |
PASSPORT |
---|---|
Description: | Downloadable computer software for securing computer systems and networks from unauthorized access and malware attacks, computer and network user authentication, security monitoring, access control, information flow control, and facilitating computer connections for wide area and global computer networks; downloadable computer software for securing computer systems and networks from unauthorized access and malware attacks, and for computer and network user authentication; downloadable computer software for enabling and allowing users to use multi-factor authentication to access websites, computer systems, and networks; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE SECURING |
Brand: |
PASSPORT |
---|---|
Description: | Computer security services in the nature of providing authentication, issuance, and validation of computer users; online cloud-based services used for providing authentication in the fields of security monitoring, access control, information flow control, and facilitating computer connections for wide area and global computer networks; computer security services, namely, online monitoring computer networks for securing and protecting data and information from unauthorized access and malware attacks; technical support, namely, online monitoring the technological functions of computer network systems; providing temporary use of non-downloadable computer programs for protecting cybersecurity assets, for computer infrastructure defense and for monitoring, assessing and implementing improvements in security of computer infrastructure and data; providing online non-downloadable software providing protection to cybersecurity assets and computers from malware, phishing and malicious advertising; providing online non-downloadable software for gathering information from malicious computer hosts, providing alerts on malware attacks, and for reporting of phishing emails; |
Category: | COMPUTER SECURITY SERVICES |
Brand: |
SECPLICITY |
---|---|
Description: | Providing a web site that features information on computer technology and programming; providing a web site that features information on computer network security; |
Category: | PROVIDING WEB SITE THAT |
Brand: |
SECPLICITY |
---|---|
Description: | Computer anti-virus software; Computer hardware, namely, firewalls; Computer software for the creation of firewalls; Software for ensuring the security of electronic mail; |
Category: | COMPUTER ANTI VIRUS SOFTWARE |
Brand: |
SERVERLOCK |
---|---|
Description: | Internet security computer software and user documentation all sold as a unit;SERVER LOCK; |
Category: | INTERNET SECURITY COMPUTER SOFTWARE |
Brand: |
SPAMSCREEN |
---|---|
Description: | Computer software used to filter email from global computer networks or other publicly accessible computer networks;SPAM SCREEN; |
Category: | COMPUTER SOFTWARE USED FILTER |
Brand: |
STRONGARM |
---|---|
Description: | Providing temporary use of non-downloadable computer programs for protecting cybersecurity assets, for network defense and for monitoring, assessing and implementing improvements in security of network infrastructure and data; |
Category: | PROVIDING TEMPORARY USE NON DOWNLOADABLE |
Brand: |
THREATSYNC |
---|---|
Description: | Downloadable software used to analyze computer networks and identify malware attacks; downloadable software providing the ability to manage traffic on a computer network; downloadable software used to protect computer networks and online applications from computer virus, malware and ransomware attacks; downloadable software for management of computer software applications and user endpoints on a user's network; downloadable computer software used for notification of and prioritization of network security threats; downloadable software used to collect, correlate, and analyze data from a computer network; downloadable software used for computer security, network security, information technology security and data security, and prevention of computer risks, including hacking, cyber-attacks, computer crimes and computer viruses; Downloadable computer software for providing intrusion detection and prevention; Downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software;THREAT SYNC;Online non-downloadable software used to analyze computer networks and identify malware attacks; online non-downloadable software providing the ability to manage traffic for management of computer networks; online computer services, namely, computer services used to protect computer networks and online applications from computer virus, malware and ransomware attacks; online non-downloadable software for management of computer software applications and user endpoints on a user's network; online non-downloadable computer software used for notification of and prioritization of network security threats; online non-downloadable software used to collect, correlate, and analyze data from a computer network; online non-downloadable software used for computer security, network security, information technology security and data security, and prevention of computer risks, including hacking, cyber-attacks, computer crimes and computer viruses; |
Category: | DOWNLOADABLE SOFTWARE USED ANALYZE |
Brand: |
UNIFIED SECURITY PLATFORM |
---|---|
Description: | Downloadable computer software and hardware for network security, namely, firewall, unified threat management and virtual private network capabilities in the fields of security monitoring, identification of malware and spam, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks, and manuals sold as a unit; Downloadable computer software for management of computer networks and wireless access points; Downloadable computer software for management of traffic on computer networks; Downloadable computer software for management of other computer applications on a computer network; Downloadable computer software providing a graphical user interface for management of networked servers; Downloadable computer software for management and analysis of use of wireless networks by users; Downloadable computer software used for protection and management of confidential data and personally identifiable information;SECURITY PLATFORM; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE HARDWARE |
Brand: |
UNIFIED SECURITY PLATFORM |
---|---|
Description: | SECURITY PLATFORM;Providing online non-downloadable software for identifying malware attacks; Providing online non-downloadable software used for detection of malicious websites, botnets, and wireless access points; Providing online non-downloadable software providing the ability to manage traffic on a computer network; online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Providing online non-downloadable software for management of computer software applications on a user's network; Providing online non-downloadable computer software for visualization of connected devices and wireless access points; Providing online non-downloadable software for monitoring, managing, and anonymizing personally identifying information and protecting confidential data on computer networks; computer security services in the nature of providing authentication, issuance, and validation of network users; online cloud-based services used for authentication in the fields of security monitoring, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks; Computer security services, namely, online monitoring computer networks for securing and protecting data and information from unauthorized access and malware attacks; Technical support, namely, online monitoring the technological functions of computer network systems; |
Category: | SECURITY PLATFORM |
Brand: |
UNIQUELY SIMPLE. POWERFULLY SECURE. |
---|---|
Description: | authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; |
Category: | AUTHENTICATION |
Brand: |
USP |
---|---|
Description: | Downloadable computer software and hardware for network security, namely, firewall, unified threat management and virtual private network capabilities in the fields of security monitoring, identification of malware and spam, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks, and manuals sold as a unit; Downloadable computer software for management of computer networks and wireless access points; Downloadable computer software for management of traffic on computer networks; Downloadable computer software for management of other computer applications on a computer network; Downloadable computer software providing a graphical user interface for management of networked servers; Downloadable computer software for management and analysis of use of wireless networks by users; Downloadable computer software used for protection and management of confidential data and personally identifiable information; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE HARDWARE |
Brand: |
USP |
---|---|
Description: | Providing online non-downloadable software for identifying malware attacks; Providing online non-downloadable software used for detection of malicious websites, botnets, and wireless access points; Providing online non-downloadable software providing the ability to manage traffic on a computer network; online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; providing online non-downloadable software for management of computer software applications on a user's network; Providing online non-downloadable computer software for visualization of connected devices and wireless access points; Providing online non-downloadable software for monitoring, managing, and anonymizing personally identifying information and protecting confidential data on computer networks; computer security services in the nature of providing authentication, issuance, and validation of network users; online cloud-based services used for authentication in the fields of security monitoring, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks; Computer security services, namely, online monitoring computer networks for securing and protecting data and information from unauthorized access and malware attacks; Technical support, namely, online monitoring the technological functions of computer network systems; |
Category: | PROVIDING ONLINE NON DOWNLOADABLE SOFTWARE |
Brand: |
W |
---|---|
Description: | The mark consists of the letter W magnified in a magnifying glass.;WATCHGUARD;Color is not claimed as a feature of the mark.;Technical support for computer system access and security services, namely, remote and on-site monitoring of local area, wide area, and global computer network systems for technical support and back up purposes regarding security, access control, information flow control, and computer connection; computer security services, namely, restricting unauthorized access to computer networks; online non-downloadable software used identify malware attacks; online non-downloadable software used for detection of malicious websites, botnets, and wireless access points; online non-downloadable software providing the ability to manage traffic on a computer network; online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; online non-downloadable software for management of computer software applications on a user's network; online non-downloadable computer software for visualization of connected devices and wireless access points; online non-downloadable software for monitoring, managing, and anonymizing personally identifying information and protecting confidential data on computer networks; computer security consulting services in the field of threat detection; computer security services, namely, preventing unwanted access and identification of malware and spam; |
Category: |