Trademark Overview
On Wednesday, April 8, 2026, a trademark application was filed for UNICONOS with the United States Patent and Trademark Office. The USPTO has given the UNICONOS trademark a serial number of 99752097. The federal status of this trademark filing is NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER as of Wednesday, April 8, 2026. This trademark is owned by Citrix Systems, Inc.. The UNICONOS trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:
providing online, non-downloadable software for monitoring, detecting, and preventing unauthorized access to computer networks and endpoints; providing online, non-downloadable software for device compliance, and policy enforcement, and for managing and securing endpoint devices, thin clients, desktops, laptops, remote computer terminals, and virtual desktop infrastructure (VDI); Software as a Service (SaaS) services featuring software for administering endpoint management, security, data protection, and cybersecurity; Software as a Service (SaaS) services featuring software for monitoring, detecting, and preventing unauthorized access to computer networks and endpoints; Software as a Service (SaaS) services featuring software for device compliance, and policy enforcement, and for managing and securing endpoint devices, thin clients, desktops, laptops, remote computer terminals, and virtual desktop infrastructure (VDI); Providing online non-downloadable software for administering endpo...
Downloadable operating system software; downloadable computer software for endpoint management, security, data protection, and cybersecurity; downloadable computer software for administering endpoint management, device compliance, and policy enforcement, managing, and securing endpoint devices, thin clients, desktops, laptops, remote computer terminals, and virtual desktop infrastructure (VDI); downloadable computer software for monitoring, detecting, and preventing unauthorized access to computer networks and endpoints