Brands and Their Owners
WEBROOT INC. contact information is shown below | |
Owner: | WEBROOT INC. |
---|---|
Owner Address: | 385 Interlocken Crescent, Suite 800 Broomfield CO 80021 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
ANOMALYTICS |
---|---|
Description: | Computer software for analytics for cyber security for the detection and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat (APT) attacks to steal intellectual property from corporations or disrupt operations;Software as a service (SAAS) services featuring software for analytics and use in cyber security for the detection and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat (APT) attacks to steal intellectual property from corporations or disrupt operations; |
Category: | COMPUTER SOFTWARE ANALYTICS |
Brand: |
BINOCULAR FUSION ANALYTICS |
---|---|
Description: | Computer anti-virus software;ANALYTICS;Software as a service (SAAS) services featuring software for security analytics software that enables companies to rapidly detect unknown cyber threats in their network; |
Category: | COMPUTER ANTI VIRUS SOFTWARE |
Brand: |
BREACHLOGIC |
---|---|
Description: | computer software for collecting, analyzing and displaying information and data generated by software applications, servers, network devices, security devices, firewalls and remote infrastructure; computer software for collecting, analyzing and displaying information and data regarding process events, registry events and network events on a network endpoint; computer security software for the security of data, computers and computer networks; computer software, namely, security information and event management software for protecting and securing the integrity of computing devices, mobile phones and network systems; computer antivirus software for identifying security risks and security threats;BREACH LOGIC;Computer services, namely, collection, analysis and display of information and data generated by software applications, servers, network devices, security devices, firewalls and remote infrastructure; computer services, namely, collection, analysis and display of information and data regarding process events, registry events and network events on a network endpoint; computer security services, namely, computer consultation in the field of computer security; computer security consultancy, namely, security information and event management services; computer security services, namely, identification of security risks and security threats; |
Category: | COMPUTER SOFTWARE COLLECTING |
Brand: |
BRIGHTCLOUD |
---|---|
Description: | BRIGHT CLOUD;Computer services, namely, web filtering services; |
Category: | BRIGHT CLOUD |
Brand: |
BRIGHTCLOUD |
---|---|
Description: | Downloadable software, namely, for providing access to a cloud computing system for protecting and securing the integrity of computing devices, network systems, and other electronic devices configurable to connect to the internet against viruses, malware and other threats; Downloadable software for restricting access to and from undesired computers networks and websites by and to computing devices, network systems, and other electronic devices configurable to connect to the internet;BRIGHT CLOUD;Computer services, namely, providing access to a cloud computing system for protecting and securing the integrity of computing devices, network systems. and other electronic devices configurable to connect to the internet against viruses, malware and other threats; Computer security services, namely, restricting access to and from undesired computers networks and websites by and to computing devices, network systems, and other electronic devices configurable to connect to the internet; |
Category: | DOWNLOADABLE SOFTWARE |
Brand: |
BRIGHTCLOUD |
---|---|
Description: | Downloadable computer software for providing privacy protection;Providing access to computer networks over telecommunications networks; providing access between computers and computer networks over telecommunications networks; providing access between computer networks and servers over telecommunications networks; providing access between computers and servers over telecommunications networks; electronic transmission of data over telecommunications networks; advisory and consultancy services relating to communications between computers over telecommunications networks; advisory services relating to providing remote access of computer hardware over telecommunications networks; advisory services relating to providing remote access of computer software over telecommunication networks; advisory, information and consultancy services relating to all the aforesaid services;BRIGHT CLOUD;management of computer networks for business purposes, namely, optimising use of computer hardware, computer software, information technology applications, and computer networks; outsourcing; on-line data processing services; database management; advisory, information and consultancy services relating to all the aforesaid services;Computer services, namely, monitoring of computer systems and computer networks for security purposes that involves analyzing and classifying IT information including data, applications, and networks all being part of the process of monitoring of computer systems for security purposes; Computer services, namely, facilitating provision of secure web browsers by monitoring and analyzing threats for security purposes;Computer services, namely, providing privacy protection by identifying and blocking threats to privacy by restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE PROVIDING |
Brand: |
CHANNEL EDGE |
---|---|
Description: | Business services, namely, distributorship services in the field of computer software, telephone order-taking services for others, business lead generation services, order fulfillment, business sales projections consultation, supply chain management, work-in-process management, inventory management, strategic planning management, sales promotions, customer service in the field of computer software, return management, namely, management of returned merchandise, credit card registration, accounting and managing telecommunications networks for others, namely, managing telephone service for other carriers, all of the aforementioned services for distributors, resellers, partners, suppliers, intermediaries, third-party service providers, and customers; |
Category: | BUSINESS SERVICES |
Brand: |
CONTINUOUS THREAT DEFENSE |
---|---|
Description: | Computer software for use in cyber security for the detection and mitigation of Advanced Persistent Threat (APT) attacks to steal intellectual property from corporations;Software as a service (SAAS) services featuring software for use in cyber security for the detection and mitigation of Advanced Persistent Threat (APT) attacks to steal intellectual property from corporations; |
Category: | COMPUTER SOFTWARE USE |
Brand: |
CYBERFLOW ANALYTICS |
---|---|
Description: | Computer software for cyber security for the detection and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat (APT) attacks to steal intellectual property from corporations or disrupt operations;CYBER FLOW ANALYTICS;ANALYTICS;Software as a service (SAAS) services featuring software for use in cyber security for the detection and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat (APT) attacks to steal intellectual property from corporations or disrupt operations; |
Category: | COMPUTER SOFTWARE CYBER SECURITY |
Brand: |
CYBERHOOKS |
---|---|
Description: | Computer integration software for cyber security for the detection and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat (APT) attacks to steal intellectual property from corporations or disrupt operations;CYBER HOOKS; |
Category: | COMPUTER INTEGRATION SOFTWARE CYBER |
Brand: |
FLOWSCAPE |
---|---|
Description: | Computer software for use in cyber security for the detection and mitigation of Advanced Persistent Threat (APT) attacks to steal intellectual property from corporations;FLOW ESCAPE;Software as a service (SAAS) services featuring software for use in cyber security for the detection and mitigation of Advanced Persistent Threat (APT) attacks to steal intellectual property from corporations; |
Category: | COMPUTER SOFTWARE USE |
Brand: |
INFRARED |
---|---|
Description: | Software for protecting and securing the integrity of computing devices, mobile phones and network systems; security software for protecting computers from malicious software;Computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities, detecting and assessing threats to computing devices; computer services, namely, providing information regarding risks and vulnerabilities for computers, networks and mobile electronic devices; computer services for protecting and securing the integrity of computing devices, mobile phones and network systems, namely, providing temporary use of on-line non-downloadable software for protecting and securing the integrity of mobile phones, computing devices, and network systems; |
Category: | SOFTWARE PROTECTING SECURING |
Brand: |
PERFECTKNOWLEDGE |
---|---|
Description: | PERFECT KNOWLEDGE;Providing security threat management services, namely, monitoring and tracking of security vulnerabilities and problems in computer software products and computer networks; |
Category: | PERFECT KNOWLEDGE |
Brand: |
PERFECTKNOWLEDGE |
---|---|
Description: | computer services, namely, providing newsletters on-line and via email for the purpose of providing advisories, bulletins, and news summaries in the field of computer and information security;PERFECT KNOWLEDGE;Providing security threat management services, namely, providing computer systems analysis for resolving computer security threats; temporary use of non-downloadable software for computer and information security and user manuals sold therewith; computer and information security consulting services; providing databases featuring information in the field of computer and information security; providing a website featuring information in the field of computer and information security; |
Category: | COMPUTER SERVICES |
Brand: |
PERFECTKNOWLEDGE |
---|---|
Description: | Computer software for computer and information security and user manuals sold therewith;PERFECT KNOWLEDGE; |
Category: | COMPUTER SOFTWARE COMPUTER |
Brand: |
PREVX |
---|---|
Description: | Computer software for the protection of computers, computer systems and networks, telecommunication and information technology systems and networks against unauthorized access and/or operation; |
Category: | COMPUTER SOFTWARE PROTECTION |
Brand: |
ROCKSAFE |
---|---|
Description: | Computer software in the field of security to enable monitoring, securing and protection of computer networks, namely, software that scans for online threats to monitor, secure and protect computer networks and applications by restricting access to and by computer networks to and of undesired viruses, threats, spyware downloads and communication, phishing, worms and other potentially threatening computer code;ROCK SAFE; |
Category: | COMPUTER SOFTWARE FIELD |
Brand: |
SECUREANYWHERE |
---|---|
Description: | Software for protecting and securing the integrity of computing devices, mobile phones and network systems;SECURE ANYWHERE;Computer services, namely, providing a cloud computing system comprising servers and software for protecting and securing the integrity of computing devices, mobile phones and network systems against viruses, malware and other threats; |
Category: | SOFTWARE PROTECTING SECURING |
Brand: |
SMARTER CYBERSECURITY |
---|---|
Description: | Software for protecting and securing the integrity of computing devices, mobile phones and network systems;SMARTER CYBER SECURITY;Computer services, namely, providing a cloud computing system comprising servers and software for protecting and securing the integrity of computing devices, mobile phones and network systems against viruses, malware and other threats; |
Category: | SOFTWARE PROTECTING SECURING |
Brand: |
SPY SWEEPER |
---|---|
Description: | Computer software, namely, computer software for providing security features to detect, identify, block and delete trojan horse programs, adware programs, system monitor and other spyware programs; |
Category: | COMPUTER SOFTWARE |
Brand: |
THE BEST SECURITY IN AN UNSECURED WORLD |
---|---|
Description: | Computer software for monitoring the activities of a computer user, preventing the execution of unauthorized programs, and deterring access to offensive content on the Internet; computer software in the field of security to enable monitoring, securing and protection of computer networks, namely, software that scans for online threats to monitor, secure and protect computer networks and applications by restricting access to and by computer networks to and of undesired viruses, threats, spyware downloads and communication, phishing, worms and other potentially threatening computer code; computer software for providing security features to detect, identify, block and delete Trojan horse programs, adware programs, system monitor and other spyware programs; computer software designed to remove by-products inherently created from 'surfing' the Internet; anti-virus software; |
Category: | COMPUTER SOFTWARE MONITORING |
Brand: |
VERSIONGUARD |
---|---|
Description: | feature of computer software that checks for updates and automatically updates other computer software;VERSION GUARD; |
Category: | FEATURE COMPUTER SOFTWARE THAT |
Brand: |
WEBROOT |
---|---|
Description: | COMPUTER SOFTWARE FOR USE IN PROTECTING THE PRIVACY AND SECURITY OF PERSONAL COMPUTERS, namely, ENCRYPTION, MONITORING, AND ACCESS RESTRICTION SOFTWARE, AND COMPUTER SOFTWARE FOR USE IN ENHANCING THE USE OF A GLOBAL COMPUTER NETWORK, namely, [ MODEM CONNECTION ACCELERATION AND] FILE MANAGEMENT SOFTWARE; |
Category: | COMPUTER SOFTWARE USE |
Brand: |
WEBROOT |
---|---|
Description: | WEB ROOT;Computer security services, namely, restricting access to and from undesired computers, networks and websites by and to computers, networks and mobile electronic devices; Computer services, namely, scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks and mobile electronic devices; Computer virus, malware and spyware protection services; Computer security services, namely, scanning and testing of computers, networks and mobile electronic devices to assess information security vulnerability; Computer services, namely, providing information regarding risks and vulnerabilities for computers, networks and mobile electronic devices; Computer services, namely, providing online non-downloadable management and reporting tools for computers, networks and mobile electronic devices; Remote online backup of computer data; Technical support services, namely, troubleshooting of computer software and network problems; |
Category: | WEB ROOT |
Brand: |
WEBROOT |
---|---|
Description: | Downloadable software, namely, for providing access to a cloud computing system for protecting and securing the integrity of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, GPS systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet against viruses, malware and other threats; Downloadable software, for facilitating provision of secure web browsers; Downloadable software for restricting access to and from undesired computers networks and websites by and to computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, GPS systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet; Downloadable software for providing restoration of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, GPS systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet to a prior state; Downloadable software for providing administrative services over policy and updates; Downloadable software for providing privacy protection; Downloadable computer software for providing privacy protection;Providing access to computer networks over telecommunications networks; providing access between computers and computer networks over telecommunications networks; providing access between computer networks and servers over telecommunications networks; providing access between computers and servers over telecommunications networks; electronic transmission of data over telecommunications networks; advisory and consultancy services relating to communications between computers over telecommunications networks; advisory services relating to providing remote access of computer hardware over telecommunications networks; advisory services relating to providing remote access of computer software over telecommunication networks; advisory, information and consultancy services relating to all the aforesaid services;management of computer networks for business purposes, namely, optimising use of computer hardware, computer software, information technology applications, and computer networks; outsourcing; on-line data processing services; database management; advisory, information and consultancy services relating to all the aforesaid services;Computer services, namely, monitoring of computer systems and computer networks for security purposes that involves analyzing and classifying IT information including data, applications, and networks all being part of the process of monitoring of computer systems for security purposes; Computer services, namely, facilitating provision of secure web browsers by monitoring and analyzing threats for security purposes;Computer services, namely, providing a virtual cloud computing system through cloud computing for others comprising virtual application servers and software for protecting and securing the integrity of computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, GPS systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet against viruses, malware and other threats; telecommunications disaster recovery services in the nature of computer disaster recover planning and data recovery; recovery of computer data; on-line back-up of computer services; Computer security services, namely, restricting access to and from undesired computers networks and websites by and to computing devices, mobile phones, tablets, gaming consoles, network systems, smart watches, smart cars, smart household appliances, GPS systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet; Computer services, namely, provision of administrative services over policy and updates; Computer services, namely, providing privacy protection by identifying and blocking threats to privacy by restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, providing security services in the nature of recovery of data from computing devices, mobile phones, tablets, gaming consoles, network systems hardware, smart watches, smart cars, smart household appliances, GPS systems, in home security systems, thermostats, smart washers, smart driers, smart dishwashers, smart refrigerators, and other electronic devices configurable to connect to the internet to a prior state; |
Category: | DOWNLOADABLE SOFTWARE |
Brand: |
WEBROOT SECUREANYWHERE |
---|---|
Description: | WEB ROOT SECURE ANYWHERE;providing temporary use of on-line non-downloadable software for protecting and securing the integrity of computing devices and network systems; |
Category: | WEB ROOT SECURE ANYWHERE |
Brand: |
WEBROOT SECUREANYWHERE |
---|---|
Description: | The mark consists of the term WEBROOT in light and dark green stylized letters above the term SECUREANYWHERE in light and dark green stylized letters, placed to the right of a design containing interlocking light and dark green squares and lines superimposed on a globe.;computer software for protecting and securing the integrity of computing devices and network systems;WEB ROOT SECURE ANYWHERE;The color(s) light green and dark green is/are claimed as a feature of the mark.; |
Category: |