Signup
Login
Brea Trademarks
BREACH
Computer network and software application security software for providing increased network and content security and improved software application integrity; computer hardware for providing increased network security and improved software application content inspection integrity
Cancelled
·
September 3, 2009
·
77819837
·
BREACH
Providing online, non-downloadable computer network and software application security software for providing increased network and content security and improved software application content inspection integrity; computer security consultancy services with respect to network security and software application integrity; technical support services, namely, troubleshooting in the nature of diagnosing problems relating to computer hardware and software used to increase network security and improve...
Cancelled
·
September 3, 2009
·
77819824
·
BREACH
CHLORINATED DETERGENT FOR DISHWASHING MACHINES
Cancelled
·
December 27, 1976
·
73110739
·
BREACH & STILL
Beanies; Bikinis; Blouses; Bras; Camisoles; Coats; Dresses; Earmuffs; Footwear; Gloves; Hats; Headwear; Hoodies; Jeans; Panties; Pants; Sandals; Scarves; Shirts; Shoes; Shorts; Skirts; Socks; Sweatbands; Sweatshirts; Swimwear; T-shirts; Underwear; Apparel for dancers, namely, tee shirts, sweatshirts, pants, leggings, shorts and jackets; Bathing suits; Belts for clothing; Boxer shorts; Boxing shorts; Caps being headwear; Caps with visors; Coats for men; Coats for men and women; Coats for women...
Abandoned
·
September 21, 2022
·
97600356
·
BREACH 16
education and entertainment services, namely, a Christian music ministry providing live educational and musical performances
Cancelled
·
January 15, 1997
·
75226652
·
BREACH ALERT
A feature of disposable latex gloves for laboratory use, disposable plastic gloves for laboratory use, gloves for laboratory purposes, protective gloves for industrial use and protective work gloves
Registered
·
September 9, 2019
·
88609079
·
BREACH ANALYSIS SERVICES
Consulting services in the field of identity fraud; identity theft protection services that provide fraud prevention and protection by monitoring financial data based upon identity information; assisting companies, organizations, academic institutions, and government agencies to recognize, assess, screen, monitor, validate and prevent the misuse or theft of personal identity information and financial information
Abandoned
·
June 5, 2007
·
77197538
·
BREACH ANALYSIS SERVICES
Application service provider (ASP) featuring software in the field of identity fraud and protection therefrom; designing and developing software and related technology that provides solutions for identity fraud prevention and identity risk management
Abandoned
·
June 5, 2007
·
77197534
·
BREACH AND CLEAR
Computer game software for use on mobile and cellular phones
Cancelled
·
October 22, 2012
·
85759982
·
BREACH BAIT
Fishing tackle, namely, artificial fishing lures
Registered
·
November 7, 2019
·
88683314
·
BREACH BALLISTIC
Dietary supplements
Abandoned
·
April 17, 2017
·
87414133
·
BREACH BAROMETER
Downloadable electronic publications in the nature of a report in the field of healthcare data breaches
Registered
·
October 20, 2017
·
87653260
·
BREACH CHECK
Computer services, namely, providing search engines for obtaining data breach and identity theft and exposure on a global computer network; Electronic monitoring of personally identifying information to detect identity theft via the internet
Abandoned
·
January 18, 2021
·
90471323
·
BREACH CLARITY
Computer software for the assessment and mitigation of risk and harm resulting from a data breach; computer software for assessing risk of identity theft and potential harm resulting from a data breach; computer software for compiling indicators of risk related to a data breach; computer software for assigning a risk score and identifying and ranking mitigation actions relative to a data breach
Registered
·
May 8, 2018
·
87911719
·
BREACH CLARITY SCORE
Downloadable computer software for assigning a risk score and identifying and ranking mitigation actions relative to a data breach; downloadable computer software for compiling indicators of risk related to a data breach; downloadable computer software for the assessment and mitigation of risk and harm resulting from a data breach
Registered
·
November 20, 2019
·
88699684
·
BREACH COACH
business consulting services relating to the accidental or intentional/malicious events involving the release or leak of private information and/or computer data
Registered
·
December 8, 2009
·
77888436
·
BREACH DEFENDER
Software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer security software for Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability
Registered
·
March 31, 2023
·
97867312
·
BREACH DETECTION ANALYTICS
Computer software platforms for locating, assessing, measuring and remediation suspected malware and providing network security; Computer software for computer and network security, anti-virus protection, for the detection of internet threats and attacks, and for providing secure transmission of communications, data, sound and images via computer networks that may be downloaded from a global computer network
Abandoned
·
April 12, 2016
·
86973267
·
BREACH EMERGENCY RESPONSE TEAM
Computer consultation in the field of computer security; Consulting in the field of information technology; Consulting in the field of telecommunications technology; Consulting services in the field of computer-based information systems for businesses; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Technology consultation in the field of data privacy and information security
Cancelled
·
October 29, 2008
·
77603613
·
BREACH FINDER FIND YOUR BREACH
Computer software for administration of computer local area networks; Computer software for creating searchable databases of information and data
Abandoned
·
November 11, 2014
·
86450774
·
BREACH HAPPENS
Data processing services; Mail services, namely, receiving and processing international and domestic mail for infusion into established postal services
Abandoned
·
October 29, 2015
·
86803653
·
BREACH HEALTHCHECK
Analysis and consultation in the field of data theft and identity theft; assessment of an organization's level of exposure to and protection from data breach incidents; Providing information in the field of data theft and identity theft and exposure to and protection from data breach incidents
Cancelled
·
July 21, 2009
·
77786284
·
BREACH INTELLIGENCE NETWORK
Downloadable computer software for the assessment and mitigation of risk and harm resulting from a data breach; downloadable computer software for assessing risk of identity theft and potential harm resulting from a data breach; downloadable computer software for compiling indicators of risk related to a data breach; downloadable computer software for assigning a risk score and identifying and ranking mitigation actions relative to a data breach; downloadable computer software designed to per...
Abandoned
·
October 28, 2019
·
88670940
·
BREACH LOCK
Computer security consultancy; Computer security and information risk management consultancy in the field of risk and compliance, scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software development; Software as a service (SAAS) services, namely, hosting software for use by others in the field of computer security and cyber breach prediction and prevention; Monitoring of computer systems for detecting unauthorized access or dat...
Registered
·
November 13, 2018
·
88191478
·
BREACH OR E BYPASS
Clothing, namely, shirts, pants, shorts, outerwear, bandanas, masks, socks, shoes, jackets and coats, sweatshirts, and beanies and hats
Registered
·
January 5, 2023
·
97742328
·
BREACH PLAN CONNECT
Application service provider featuring software for use to plan for and respond to data breaches and for providing links and information relating to cyber security management, compliance and privacy; providing links to the websites of others and information about computer technology in the field of cyber security management, compliance and privacy
Registered
·
May 2, 2016
·
87021081
·
BREACH PREVENTION AUDIT
Cybersecurity audit services, tailored to prevent data breaches
Abandoned
·
September 10, 2019
·
88611469
·
BREACH RADAR
Downloadable software that protects businesses and customer data from viruses and hackers; downloadable software for internet security, security vulnerability assessment, compliance monitoring, compliance tracking, and managed security solutions
Registered
·
March 7, 2018
·
87824173
·
BREACH RESILIENCE
OREV Breach Resilience helps networks recover from cyber compromises and breachs reducing down time, impacted devices and files identified, isolated and ready for restoration from back-up processes, Deliver Root Cause analysis and triage completed in under an hour
Abandoned
·
September 9, 2021
·
97019926
·
BREACH RESPONDERS
Providing an online, non-downloadable, interactive computer application that provides reference information about U.S. state-level breach notification laws
Registered
·
July 18, 2017
·
87532193
·
BREACH RESPONDERS
Downloadable software in the nature of an interactive mobile application that provides reference information about U.S. state-level breach notification laws
Abandoned
·
July 18, 2017
·
87532161
·
BREACH SECURITY
Providing online, non-downloadable computer network and software application security software for providing increased network and content security and improved software application content inspection integrity; computer security consultancy services with respect to network security and software application integrity; technical support services, namely, troubleshooting in the nature of diagnosing problems relating to computer hardware and software used to increase network security and improve...
Cancelled
·
September 3, 2009
·
77819849
·
BREACH SECURITY
Computer network and software application security software for providing increased network and content security and improved software application integrity; computer hardware for providing increased network security and improved software application content inspection integrity
Cancelled
·
September 3, 2009
·
77819846
·
BREACH SHEET
Publication of an e-zine; Publication of electronic books and journals on-line; Publication of on-line in the field data breach and/or cybersecurity law and mitigation.; Publication of texts, books, journals; Online publication of blogs; Online publication of journals; Open-access publishing services, namely, publication of electronic articles and documents in the field data breach and/or cybersecurity law and mitigation.; Publishing of electronic publications
Abandoned
·
June 7, 2023
·
98031497
·
BREACH VACCINE
Information technology security monitoring services, namely, monitoring and maintaining information technology infrastructures of enterprises to guard data and information from unauthorized access; information technology security incident response services, namely, restricting unauthorized computer network access by users without credentials; Managed information technology security services, namely, computer security threat analysis and testing for protecting data; Threat hunting computer sec...
Abandoned
·
November 23, 2019
·
88704316
·
BREACH X
Providing a website featuring on-line non-downloadable software that enables users to manage cybersecurity vulnerabilities, connect with cybersecurity professionals, and facilitate the procurement and provision of cybersecurity services; Providing technology information in the field of cybersecurity; Providing temporary use of on-line non-downloadable software and applications for use in managing cybersecurity vulnerability discovery and resolution, automating security workflows, enabling col...
Pending
·
January 17, 2025
·
99005835
·
BREACH-DEFENSE
Textiles and fabrics for the manufacture of commercial, household, and military products
Abandoned
·
February 12, 2008
·
77394542
·
BREACHABLE BARRICADE SOLUTION
Security device made of metal for use on exterior and interior doors
Abandoned
·
April 16, 2018
·
87877894
·
BREACHBITS
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability
Registered
·
May 20, 2021
·
90724699
·
BREACHBITS
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability
Registered
·
August 23, 2019
·
88590235
·
BREACHBITS CYBER RISK, SIMPLIFIED.
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability
Abandoned
·
February 3, 2022
·
97252192
·
BREACHBLOCKER
Online downloadable computer software for digital data and digital content storage, backup, restore, transfer, management, and delivery and online downloadable computer software for enhanced data security by securely dispersing data in pieces to diverse multi-cloud storage environments
Abandoned
·
June 13, 2013
·
85959140
·
BREACHBOARD
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability
Registered
·
May 20, 2021
·
90723841
·
BREACHBOX
Consulting and legal services in the field of privacy and security laws, regulations, and requirements
Abandoned
·
December 13, 2016
·
87267066
·
BREACHBOX
software for identifying vulnerabilities, testing exploitability of web applications and websites, and blocking malicious activity affecting computers and computer networks
Abandoned
·
December 30, 2011
·
85506140
·
BREACHBUSTER
Electronic card and encoded electronic chip cards for credit, debit, charge, payment and other financial transactions and identification verification for multiple transactions or sessions
Abandoned
·
November 12, 2014
·
86452705
·
BREACHCONTROL
Computer software and hardware for security, detection and removal of computer viruses and threats; computer software and hardware for managing and filtering electronic communications; computer software and hardware for protecting and securing computer networks and applications; computer software and hardware for encrypting information and authenticating users
Abandoned
·
February 7, 2018
·
87788326
·
BREACHED
fireworks
Registered
·
April 13, 2022
·
97360839
·
BREACHEDID
Consulting services in the field of risk and harm assessment as a result of a data breach; consulting services in the field of risk and harm mitigation as a result of a data breach; consulting services, namely, assessing a consumer's risk of identity theft or potential harm as a result of a data breach; monitoring of computer systems for detecting unauthorized access, identity fraud, or data breach; Consulting services in the field of consumer fraud-risk profiles, predicting potential new acc...
Registered
·
October 28, 2019
·
88670932
·
BREACHER
Footwear, in particular lace boots, boots as well as walking shoes
Abandoned
·
February 1, 2021
·
79307138
·
Previous
1
2
3
4
...
152
Next