Serial Number
90534137
Owner
CONETRIX, LLCAttorney
Sarah Hegi SimpsonFirst Use Date
Dec 19, 2000
Filing Date
Feb 18, 2021
CONETRIX Trademark
Serial Number: 90534137 • Registration: 6682941
Trademark Classes
Owner Contact Info
Legal Representation
Trademark Details
Filing Date
February 18, 2021
Registration Date
March 29, 2022
First Use Anywhere
December 19, 2000
First Use in Commerce
February 1, 2001
Published for Opposition
January 11, 2022
Goods & Services
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Backup services for computer hard drive data; Computer disaster recovery planning; Computer network configuration services; Computer network design for others; Computer project management services; Computer security consultancy; Computer services, namely, cloud hosting provider services; Computer services, namely, computer system administration for others; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer software installation and maintenance; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting in the field of information technology; Consulting in the field of virtualization technologies for enterprises and businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Development of security systems and contingency planning for information systems; Hosting the software, websites and other computer applications of others on a virtual private server; Installation and maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems by remote access to ensure proper functioning; Providing virtual computer systems and virtual computer environments through cloud computing; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Computer services, namely, data recovery services; Computer systems analysis; Installation of computer software; Integration of computer systems and networks; Information technology audit services, namely, testing and analysis of information technology systems; technical support, namely, monitoring technological functions of computer network systems; Business technology software consultation services; Computer services, namely, management of cybersecurity specifically computer security systems management; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity; Computer services, namely, monitoring technological functions of networks for malicious activity and exploits, stopping malicious activity and exploits by means of restricting access and blocking unauthorized programs and users of computer systems, alerting network users and owners via notifications of computer network system events, and restoring or recovering normal network operations; Computer services, namely, monitoring technological functions of computer systems for malicious activity and exploits, stopping malicious activity and exploits by means of restricting access and blocking unauthorized programs and users of computer systems, alerting network users and owners via notification of computer network system events, and restoring or recovering normal system operations; Computer services, namely, providing network threat protection services by means of restricting unauthorized access to computer systems and networks; Managed security services, namely, network threat protection services specifically computer security threat analysis for protecting data