Trademark Overview
On Thursday, November 3, 2011, a trademark application was filed for ECHO HUNTERS with the United States Patent and Trademark Office. The USPTO has given the ECHO HUNTERS trademark a serial number of 85463550. The federal status of this trademark filing is ABANDONED - NO STATEMENT OF USE FILED as of Monday, January 14, 2013. This trademark is owned by Neustar, Inc.. The ECHO HUNTERS trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Computer & Software Services & Scientific Services, Personal, and Legal & Social Services categories with the following description:
Computer hardware devices for analyzing, monitoring, intercepting, capturing, logging, testing, troubleshooting, securing, and protecting computer networks, network systems, network data, network information, network performance, data packets, and internet protocol traffic, and for generating related reports and event notification alerts; computer hardware devices for on-line scanning, testing, intercepting, capturing, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer networks, network systems, network data, network information, network performance, data packets, and internet protocol traffic, and for providing related reports and event notification alerts
Technical support services, namely, 24x7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems involving computer networks, network systems, network data, network information, network performance, data packets; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultation in the field of computer networks, network systems, network data, network information, network performance, data packets, and internet protocol traffic, and providing related reports and event notification alerts; computer services, namely, on-line scanning and testing for viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer networks, network systems, network data, network i...
Monitoring of computer networks, network systems, network data, network information, network performance, data packets, and internet protocol traffic for security purposes, and providing related reports and event notification alerts; analyzing data in computer databases and networks for criminal activity; computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of network and system activity which typically indicate problems such as security failures, theft, wrongdoing, training issues, or customer service issues; security services, namely, providing security assessments of computer networks and network systems