FireEye, Inc.

États‑Unis d’Amérique

Retour au propriétaire

1-3 de 3 pour FireEye, Inc. Trier par
Recheche Texte
Marque
Canada - CIPO
Excluant les filiales
Affiner par Reset Report
Date
2020 1
Avant 2019 2
Classe NICE
09 - Appareils et instruments scientifiques et électriques 3
42 - Services scientifiques, technologiques et industriels, recherche et conception 3
37 - Services de construction; extraction minière; installation et réparation 1
38 - Services de télécommunications 1
Résultats pour  marques

1.

CLOUDVISORY

      
Numéro d'application 208049500
Statut Enregistrée
Date de dépôt 2020-12-16
Date d'enregistrement 2022-09-14
Propriétaire FireEye, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Downloadable enterprise software for monitoring the security of cloud environments. (1) Software as a service (SAAS) services featuring software for monitoring the security of cloud environments.

2.

FIREEYE

      
Numéro d'application 174753600
Statut Enregistrée
Date de dépôt 2015-09-24
Date d'enregistrement 2017-03-30
Propriétaire FireEye, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Computer software and hardware for digital security; computer software and computer hardware for detection, blocking and removal of computer viruses, rootkits, advanced persistent threats, malware, and malicious attacks; computer software and computer hardware for real-time detection, blocking, removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks; computer software for identifying and preventing malicious attacks on computers, computer systems, and digital devices (1) Technical support services, namely, troubleshooting and support services in the nature of diagnosing computer hardware and software problems, providing back-up computer programs and facilities, virus removal, maintenance of computer software relating to computer security and prevention of computer risks, updating and maintenance of computer software, and software installation for computers, peripherals, USB devices, computer networks and mobile devices

3.

FIREEYE

      
Numéro d'application 163842100
Statut Enregistrée
Date de dépôt 2013-08-06
Date d'enregistrement 2015-10-15
Propriétaire FireEye, Inc., a legal entity, (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Computer software and hardware for digital security; computer software, namely, security software applications; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware that provides virtual computer systems and virtual computer environments for the purpose of providing network security; computer hardware providing secure networks, virtual computer systems and virtual computer environments; computer hardware; computer software for monitoring, filtering, and recording network traffic; computer software for detecting, reporting, blocking and eliminating viruses, worms, malware, spyware, unauthorized software and network attacks. (2) Computer hardware; computer software for monitoring, filtering and reporting network traffic; computer software for detecting, reporting, blocking and eliminating viruses, worms, malware, spyware, unauthorized software and network attacks. (1) Technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; updating and maintaining computer software for others; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer consultation and research in the field of computer hardware, computer software and network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; information technology security services in the nature of analyzing network traffic, emails, computer files, computer software media, and mobile applications for the presence of malware or other evidence of cyber attacks; application service provider (ASP) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider that provides access to software that houses virtual computer systems and virtual computing environments to analyze network traffic, emails, computer files, computer software media, and mobile applications for the presence of malware or other evidence of cyber attacks; information technology security services in the nature of providing access to information about cyber-threats; information technology security services in the nature of verifying the existence of cyber attacks; technical support services, namely, troubleshooting of computer hardware and software problems. (2) Technical support services, namely, troubleshooting of computer hardware and software problems.