final action
on 23 Nov 2024
Last Applicant/ Owned by
2600 N. Central Ave., 11th Floor
Phoenix
AZ
85004
Serial Number
98531858 filed on 02th May 2024
Registration Number
N/A
Correspondent Address
Gary W. Newson
Filing Basis
1. filed as use application
2. use application currently
Disclaimer
NO DATA
Computer security services, namely, security information and event management (SIEM) in the nature of monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, thre Read More
Computer security services, namely, security information and event management (SIEM) in the nature of monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior; managed computer security services, namely, malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time; software as a service (SAAS) services featuring a combination of software and hardware for security information and event management (SIEM); platform as a service (PAAS) services featuring a combination of computer software platforms and hardware for performing SIEM; providing temporary use of non-downloadable computer software for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; providing temporary use of non-downloadable computer software for the automation of tasks in the field of security and network incident remediation; managed computer security services, namely, monitoring, reporting, analysis, and remediation of events collected from computer network and security devices for the purposes of protecting data and restricting unauthorized network access; computer security consultancy in the field of security incident and breach response and remediation; computer security consulting, namely, computer and network security assessment and testing services to diagnose areas of vulnerability and risk to prioritize remediation; providing temporary use of on-line non-downloadable cloud computing computer and network security software for network and application security for the purposes of protecting data and restricting unauthorized network access; software as a service (SAAS) services, namely, hosting of computer and network security software for use by others for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; computer software and computer management security services in the field of malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time; Educational services, namely, arranging, organizing, conducting, and presenting educational classes, non-downloadable webinars, and online instruction, all in the field of computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; Downloadable computer network and security threat management software; computer and network security threat management hardware in the nature of security appliances for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices
04th Oct 2022
04th Oct 2022
No 98531858
No Service Mark
No 10439.2300
No
No
No
No
No
No
No
No
24.01.03 -
Shields or crests with letters, punctuation or inscriptions contained therein or superimposed thereon
Status Date | Action Taken |
---|---|
23rd Nov 2024 | NON-FINAL ACTION WRITTEN |
23rd Nov 2024 | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
23rd Nov 2024 | NON-FINAL ACTION E-MAILED |
15th Nov 2024 | ASSIGNED TO EXAMINER |
25th Oct 2024 | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED |
25th Oct 2024 | NOTICE OF DESIGN SEARCH CODE E-MAILED |
07th Oct 2024 | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED |
07th Oct 2024 | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED |
07th Oct 2024 | TEAS CHANGE OF CORRESPONDENCE RECEIVED |
02th May 2024 | NEW APPLICATION ENTERED |