Serial Number
98330306
Owner
Red 5 Holdings, Inc.Attorney
Katrina G. Hull, Esq.First Use Date
Dec 7, 2023
Filing Date
Dec 26, 2023
RED5 Trademark
Serial Number: 98330306 • Registration: 7684599
Trademark Classes
Class 41 - Education & Entertainment
Education; providing of training; entertainment; sporting and cultural activities
Class 42 - Computer & Scientific
Scientific and technological services; industrial analysis and research services
Class 45 - Legal & Security Services
Legal services; security services for the protection of property and individuals
Class 35 - Advertising & Business
Advertising; business management; business administration; office functions
Owner Contact Info
Legal Representation
Correspondence Address
Katrina G. Hull, Esq. Markery Law LLC
P.O. Box 84150
Gaithersburg, MD 20883-4150
UNITED STATES
Trademark Details
Filing Date
December 26, 2023
Registration Date
February 11, 2025
First Use Anywhere
December 7, 2023
First Use in Commerce
December 7, 2023
Published for Opposition
September 10, 2024
Goods & Services
Educational services, namely, conducting classes, seminars, conferences, and workshops in the field of security, and distributing course materials in connection therewith; educational services, namely, conducting online classes, seminars, conferences, and workshops in the field of security, and distributing course materials in connection therewith
Arranging for others the repair and replacement of home security systems; business assistance, advisory and consulting services in the field of the Foreign Corrupt Practices Act (FCPA) industry, only for business and commercial purposes; business risk assessment services
Security guard services; security guarding for facilities; security services, namely, armed escorts and security personnel for protecting personal property of various individuals and businesses; security services, namely, providing executive protection; security threat analysis for protecting personal property; consultancy services in the field of home security; personal security consultation; physical security consultancy; providing security surveillance of premises for others; providing information in the field of personal physical security; physical security audits being a security threat analysis for protecting personal property and public safety; corporate security services namely, physical security audits, threat assessments, information technology security audits, executive protection programs, technical countermeasure security programs and security contingency planning all in the nature of being a security threat analysis for protecting personal property and public safety; Security due diligence services for individuals or businesses in the nature of detailed security briefings, vetting of local personnel, and providing information on sustainable security measures; threat assessments of Physical security; consulting services in the field of security threat assessment, and threat management for protecting public safety and personal property; remote monitoring of security alarm services for protecting personal property in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing; providing information in the field of emergency response preparedness, personal safety, physical security, and threat assessment of physical security and personal safety; security guard services, namely, intrusion detection services, intrusion prevention services, vulnerability assessment services all for preventing the intrusion of burglars and protecting physical security and personal safety; security services for individuals and business persons traveling internationally and domestically, namely, providing foreign country security briefings, embassy information and security reports for security purposes
Computer security consultancy; computer security consultancy in the field of cyber and physical protection; computer security threat analysis for protecting data; data security consultancy; design and development of electronic data security systems; design and development of home security systems; development of security systems and contingency planning for information systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; engineering and system analysis in the field of home security systems; testing of security systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer network and data security services, namely, computer network vulnerability assessment; providing temporary use of non-downloadable computer software for internet security, security vulnerability assessment, and managed security solutions; computer systems and network management for others in the fields of Internet security, security vulnerability assessment, and managed security solutions in the nature of management of wireless computer networks for others; remote monitoring of computer systems and networks for others to ensure internet security and protection from vulnerability from viruses, malware and hackers; providing temporary use of on-line non-downloadable computer software for security awareness training, simulation of security attacks, and vulnerability assessments; conducting security audits of computer network systems in the nature of monitoring technological functions of computer network systems; providing cybersecurity consulting and threat assessment in the nature of computer security threat analysis for protecting data; computer security consultancy services, namely, providing assessment of crisis action planning comprised of cyber security audits to assess computer security vulnerability, vulnerability and threat detection analysis, monitoring of computer systems and computer networks for computer security purposes, computer network traffic monitoring and analysis, computer network identity monitoring and management, computer network access and authentication monitoring and management, and continuity of operations response, namely, conducting recovery operations for the recovery of computers; computer security consulting services in the field of computer security threat assessment for protecting data