This is a brand page for the SECURE MERGER trademark by Secure Merger LLC
in *********, **********, ***** ****.
Write a review about a product or service associated with this SECURE MERGER trademark.
Or, contact the owner Secure Merger LLC of the SECURE MERGER trademark by filing a request to communicate with
the Legal Correspondent for licensing, use, and/or questions related to the SECURE MERGER trademark.
On Monday, December 11, 2017,
a U.S. federal trademark registration was filed for
SECURE MERGER.
The USPTO has given the SECURE MERGER
trademark serial number of 87715242.
The current federal status of this trademark filing is ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE.
The correspondent listed for SECURE MERGER is
WENDY H. LEVER of
********,********, ***** ****
.
The SECURE MERGER trademark is filed in the category of
Computer & Software Services & Scientific Services
.
The description provided to the USPTO for SECURE MERGER
is Consulting in the field of information technology; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Consulting services in the field of software as a service (SAAS); Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; Technical support services, namely, migration of datacenter, server and database applications; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Computer disaster recovery planning; Computer network design for others; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, data recovery services; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; IT consulting services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems.