Find Laws Find Lawyers Free Legal Forms USA State Laws
Laws-info.com » Trademark » Trademarks Search » (APPLICANT) Aurora Information Security & Risk, LLC CORPORATION NEW YORK 20th Floor 45 Rockefeller Center, 630 Fifth Avenue New York NEW YORK 10111 | AURORA INFORMATION SECURITY & RISK - 85918351 - Trademark Search | Registered by Nancy J. Flint, Esq.
AURORA INFORMATION SECURITY & RISK
Serial Number: 85918351
Word Mark: AURORA INFORMATION SECURITY & RISK
Goods and Services: IC 009. US 021 023 026 036 038. G & S: Computer software for recovery and organization of computer files for use in computer forensic investigations to obtain and secure relevant electronic evidence; computer software for identification, collection, and preservation of electronically stored information (ESI); e-Discovery and cyber forensics computer program; computer hardware and computer software for information management, identification, collection, preservation, processing, analysis, review, production and presentation of all electronically stored documents and data; computer software, namely, software for accessing, collecting, storing, organizing, aggregating, managing, and analyzing electronic documents and data; computer software, namely, litigation-support software for use in the legal field; computer software, namely, software for regulatory compliance management; computer software, namely, software to create charts, graphs, statistical summaries and diagrams to visualize sequences of events; computer software, namely, software to reconstruct complex evidence and sequences of events; database management software; database management software for use in document management and knowledge management; computer programs for use in online analytic processing, data analysis, reporting, and information delivery; Computer program for assessing critical infrastructure; Computer network security, system security, file security, and data security software; computer software for management and monitoring of computer networks, systems, files, and data; computer software for detection, analysis, reporting, and restoration of changes to computer networks, systems, applications, files, and data; computer software for data and file security; computer software for managing hardware and software in an information technology environment; computer software for providing compliance monitoring and configuration control of hardware and software. computer security software in relation to the security of data, computers and computer networks; anti-virus and anti-spyware software; firewall software; encryption software; diagnostic software for identifying data security issues; computer software for monitoring and reporting on internet usage and network traffic flows; computer software in relation to virtual private networks, namely, virtual private network operating software; computers and computer hardware; electronic apparatus and equipment, namely, network routers; computer hardware and software for providing computer network security and computer network management; accessories, components and peripheral devices for computers and computer networks and systems, namely, network routers and electronic display boards; Cyber attack, threat management, threat management, namely, threat knowledge management, intrusion detection and intrusion prevention systems, namely, analyst support systems comprised of computer software and hardware to prevent remote cyber attacks by analyzing, cataloguing and reporting cyber attacks of computer networks, excluding physical area security monitoring systems, physical intrusion and physical threat detection equipment, physical security and physical surveillance sensors for physical area and border monitoring. FIRST USE: 20090529. FIRST USE IN COMMERCE: 20090529

IC 035. US 100 101 102. G & S: Providing business intelligence services; Business consulting services; business management consulting services in the field of critical infrastructure protection, namely, protection of high value manufacturing facilities, roadways and railways, power grids and telecommunications grids through the integration of existing and new security networks among different targets and different protective systems; government relations and advocacy, namely, helping companies and other business ventures with procurement strategy, identification, selection, and promotion of technological standards; business consulting and advisory services on matters of homeland security and critical infrastructure protection to maritime, mass transit, aviation, railway, pipeline, technology, and defense companies; Data processing services; business investigations; providing online business services in the nature of setting process-specific and industry-specific methodologies, processes and standards related to records and information management, and the management of privacy-related and corporate sensitive information; business management services, namely, assisting companies in the development, implementation and enforcement of corporate records management and privacy programs; Business risk management consultation. FIRST USE: 20090529. FIRST USE IN COMMERCE: 20090529

IC 042. US 100 101. G & S: Recovery of computer data; technology consultation in the field of computer forensics investigation; technology consultation in the field of the identification, collection and preservation of electronically-stored information (ESI); litigation consulting services; evidence evaluation and analysis services; electronic discovery and investigation services; providing temporary use of non-downloadable computer software for accessing, collecting, storing, organizing, aggregating, managing, and analyzing electronic documents and data; providing temporary use of non-downloadable computer software and computer software for regulatory compliance management; providing temporary use of non-downloadable computer software to create charts, graphs, statistical summaries and diagrams to visualize sequences of events; providing temporary use of non-downloadable computer software to reconstruct complex evidence and sequences of events; providing temporary use of non-downloadable database management software; providing temporary use of non-downloadable computer software for document management and knowledge management; database development services; providing a database accessible over electronic or optical communications networks; document management and knowledge management services, namely using proprietary software to access, collect, store, organize, aggregate, manage, and analyze electronic documents and data; data automation and collection services using proprietary software to access, collect, store, organize, aggregate, manage, and analyze electronic documents and data; Development of computer software; engineering and technical analysis of buildings, material, equipment and processes for the performance of threat and vulnerability assessments for critical infrastructure protection, international commerce security, and enhancement of critical communication between incident manager at operations centers and the first responders at the incident scene for our nation's defense, intelligence and response communities. data mining services for our nation's defense, intelligence and response communities; providing computer consultation services, namely computer security assessment, risk management and critical infrastructure for others; Computer security service, namely, hard drive erasure; Design and development of electronic data security systems; computer software consulting; computer software installation and maintenance; customizing computer software; design and development of electronic data security systems; development of security systems and contingency planning for information systems; Consultation and services in the field of forensics, namely, data and computer security services, namely, hard drive erasure, restricting access to and by computer networks; recovery of computer data; recovery of electronic data; computer programming; design and development of electronic data security systems; computer security consultancy; computer forensic services; electronic data forensic services; testing of security systems; information, advice and consultancy relating to all the aforesaid services; computer disaster recovery planning; Custom design and development of computer software; Software as a service (SAAS) services featuring software for streaming data processing and analytics; Software as a service (SAAS) services featuring software for big data processing and analytics; Software as a service (SAAS) services, namely, hosting software for use by others for use big data processing and analytics; Platform as a service (PAAS) featuring computer software platforms for use in analysis of streaming data. Computer consultation in the field of computer security, namely, providing computer security technical support in the nature of assessing, identifying and correcting threats to a computer network, incident responses in the nature of a 24/7 service to address compromises in computer networks, and policy development; computer security services, namely, computer firewall security programming services, computer virus protection services, anti-phishing incident response services, intrusion prevention services, web content filtering services, computer security testing; consultation in the field of computer security and assessment of computer security needs; technical support, namely, monitoring of network systems; computer network design; penetration testing in the field of computer security and risk assessment, namely, providing a detailed analysis of risks to a business and recommendations to reduce or eliminate such risks; IT consulting services; IT consulting and integration services, namely, designing information technology systems, implementing computer technologies, diagnosing IT assets, computer security consultation and testing, analysis and evaluation of information technology systems to assure compliance with industry standards; Software as a service (SaaS) featuring online software for use in project management, namely, site-specific document management, schedule management, project and program reporting, budgeting and contract management, action items, and capital planning and forecasting; Consulting services in the area of computer technology, namely, in the fields of system selection, system design, system implementation, system migration, system management, project management for cloud systems, non-cloud systems, client server systems, traditional systems, host based systems, legacy systems, software-as-a-service, hosted system, colocation systems, infrastructure, application, support, programming and repair. Back-up services for computer hard drive data. FIRST USE: 20090529. FIRST USE IN COMMERCE: 20090529

IC 045. US 100 101. G & S: Forensic analysis of computer data; forensic analysis of electronically stored information (ESI); litigation support services; evidence evaluation and analysis services; electronic legal discovery and investigation services; providing temporary use of non-downloadable computer software for accessing, collecting, storing, organizing, aggregating, managing, and analyzing electronic documents and data for use in the legal field; providing temporary use of non-downloadable litigation-support computer software and computer software for regulatory compliance management; providing temporary use of non-downloadable computer software to create charts, graphs, statistical summaries and diagrams to visualize sequences of events for use in the legal field; providing temporary use of non-downloadable computer software to reconstruct complex evidence and sequences of events for use in the legal field; providing temporary use of non-downloadable database management software; providing temporary use of non-downloadable computer software for document management and knowledge management; database development services; providing a database in the legal field accessible over electronic or optical communications networks; document management and knowledge management services, namely using proprietary software to access, collect, store, organize, aggregate, manage, and analyze electronic documents and data; legal research and services; data automation and collection services using proprietary software to access, collect, store, organize, aggregate, manage, and analyze electronic documents and data; Security services, namely, providing security assessments of physical locations, information systems, and working environments; Security services, namely, providing security assessments for businesses and governmental agencies; Consulting services in the field of state and federal regulatory compliance requirements for personnel safety. security consulting services, namely, security risk evaluations in the field of civil infrastructures; security consultation services, namely threat and vulnerability assessments in the field of physical security, disaster recovery, weapons of mass destruction, chemical, biological, radiological, nuclear and explosive (cbrne) threats; building security services, namely control of building environmental and security systems; infrastructure security services, namely physical protection of critical infrastructure and assets; emergency and interoperable communication systems consulting, namely the use of communication systems to facilitate access to and use of emergency information by the administrative personnel and public services access providers; providing security services and consultation and information in the field of emergency and crisis response plans, continuity of government (coog) and continuity of operations plans (coop) design and development; Security services for the protection of property and individuals provided on-line through the internet and other communications media, namely, providing user authorization and fraud detection services for monitoring of security systems; monitoring and surveillance services in relation to computer networks and systems, namely, monitoring of systems for security purposes; monitoring and surveillance services in relation to computers and computer networks and systems, namely computer monitoring service which tracks network performance and processes for security purposes and provides reports and alerts concerning such activities; security services for the protection of property and individuals; consultation and services in the field of security, namely, security guard services, security patrol services, security equipment leasing and security alarm monitoring; monitoring of computer systems for security purposes. fraud prevention services, namely, fraud and identity theft protection; fraud investigations; fraud detection services, namely, anti-corruption, anti-counterfeiting and anti-money laundering services; crime prevention consultancy; risk analysis, namely, security threat analysis for personal and business protection purposes; international asset protection, namely, investigation of assets for security purposes; security services, namely, industrial espionage detection and prevention; private investigative services; identity theft and fraud protection services; crisis management planning, namely, threat simulation vulnerability analysis and mitigation and emergency and crisis response; computerized security services for business establishments, namely, electronically monitoring, detecting and reporting on suspicious or abnormal activity indicating theft, fraud, or other criminal activity; monitoring of security systems; provision of on-site security facilities for personal protection and for protecting property; consultation services concerning homeland safety and security issues, namely, government advisory and consultancy services relating to security sector reform and law enforcement; information services, namely, provision of a website featuring non-downloadable on-line reports relating to security, travel security and other security risks; litigation support services; litigation support services, namely electronic legal discovery; providing a website featuring information in the field of security; security services, namely, security clearance services. security due diligence services; security assessment of risks; security integrity risk assessment and management; consultancy services in the field of preventing crime, including counter-terrorism, piracy, kidnap, extortion, threat, bribery and illegal detention; providing information regarding understanding and preventing crime, including terrorism, piracy, kidnap, extortion, threat, bribery and illegal detention; security services, namely, executive protection; personal background investigations; information, advice and consultancy relating to all the aforesaid services; pre-employment investigation and screening; computer crime investigations; monitoring and reporting of computer systems for security purposes; computer firewall security monitoring services; Background investigation and research services; Background investigation services; Personal background investigations; Pre-employment background investigation services; Pre-employment background screening; Information technology security, audit and assurance services, namely providing assessment, evaluation, auditing and analysis of computer and network systems for security purposes for others; evaluation of computer systems for security purposes; investigation services, namely computer security, network security, penetration testing, and computer forensic investigation services; Information security consulting services in the fields of computer and network incident response and digital forensics, vulnerability tracking and patch management, risk assessment certification and accreditation, application security assessment, network security assessment, wireless network security assessment, and security program development; Day and night guards; Emergency response alarm monitoring services, namely, monitoring of alert devices by a remote monitoring center for the dispatch of emergency public health and security services and notification to third parties; Monitoring burglar and security alarms; Monitoring of security systems; Personal body guarding; Personal security consultation; Providing information in the field of personal physical security. Security consultancy; Security due diligence services for individuals or businesses traveling or opening an office overseas, in the nature of detailed foreign country briefings, vetting of local personnel, establishing host country government contacts, and providing information on sustainable security measures overseas; Security guard services; Security guarding for facilities; Security services for individuals and business persons traveling internationally and domestically, namely, providing foreign country security briefings, embassy information for security purposes and security reports; Security services, namely, armed escorts and security personnel for celebrities, executives, families, production crews, men women and children, dignitaries, and other various persons; Security services, namely, conducting recovery operations for the recovery of property and personnel; Security services, namely, providing executive protection; Security services, namely, providing security assessments for businesses and governmental agencies; Security services, namely, providing security assessments of physical locations, information systems, and working environments; Security services, namely, sexual offender registry and locator service; Security services, namely, threat simulation vulnerability analysis and mitigation and emergency and crisis response; Security services, namely, water vulnerability assessment services. Verifying and monitoring the security credentials of event staff for various private and public sports or entertainment events; Security consultancy. FIRST USE: 20090529. FIRST USE IN COMMERCE: 20090529

Mark Drawing Code: (4) STANDARD CHARACTER MARK
Filing Date: 04/30/2013
Current Basis: 1A
Original Filing Basis: 1A
Owner: (APPLICANT) Aurora Information Security & Risk, LLC CORPORATION NEW YORK 20th Floor 45 Rockefeller Center, 630 Fifth Avenue New York NEW YORK 10111
Attorney of Record: Nancy J. Flint, Esq.
Type of Mark: TRADEMARK. SERVICE MARK
Register: PRINCIPAL
Live/Dead Indicator: LIVE
SiteNo: 14364

Comments

Related Articles

Copyright Infringements In Depth Copyright Infringements In Depth
Copyright is a form of intellectual property law designed to protect authors of creative work from unauthorized reproduction, copying, and selling.
10 Copyright Laws You Have To Know 10 Copyright Laws You Have To Know
  Copyrighting creative works is a legal process that is subject to specific laws and regulations.
5 Facts To Know About Copyright 5 Facts To Know About Copyright
Copyright infringement is considered to be punishable by law in the United States.
A Brief Overview of Trademark Registration A Brief Overview of Trademark Registration
Trademark registration is required if someone or a company wants to be protected by the exclusive bundle of rights granted to a registered trademark owner.
What are the Legal Consequences Of Plagiarism What are the Legal Consequences Of Plagiarism
Individuals caught plagiarizing can face serious consequences.
3 Steps to Find & Use Copyright Free Images 3 Steps to Find & Use Copyright Free Images
Using images as part of a business venture, such as a website, can certainly increase the viability for success of the project.
Tips