tm logo
A
Live/Pending
NON-FINAL ACTION - MAILED

final action

on 23 Nov 2024

Last Applicant/ Owned by

2600 N. Central Ave., 11th Floor

Phoenix

AZ

85004

Serial Number

98531858 filed on 02th May 2024

Registration Number

N/A

Correspondent Address

Gary W. Newson

Gary W. Newson NOBLITT & NEWSON, PLLC

SCOTTSDALE, AZ 85253

United States

Filing Basis

1. filed as use application

2. use application currently

Disclaimer

NO DATA

A

Computer security services, namely, security information and event management (SIEM) in the nature of monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, thre Read More

Classification Information


Class [042]
Computer & Software Services & Scientific Services


Computer security services, namely, security information and event management (SIEM) in the nature of monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior; managed computer security services, namely, malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time; software as a service (SAAS) services featuring a combination of software and hardware for security information and event management (SIEM); platform as a service (PAAS) services featuring a combination of computer software platforms and hardware for performing SIEM; providing temporary use of non-downloadable computer software for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; providing temporary use of non-downloadable computer software for the automation of tasks in the field of security and network incident remediation; managed computer security services, namely, monitoring, reporting, analysis, and remediation of events collected from computer network and security devices for the purposes of protecting data and restricting unauthorized network access; computer security consultancy in the field of security incident and breach response and remediation; computer security consulting, namely, computer and network security assessment and testing services to diagnose areas of vulnerability and risk to prioritize remediation; providing temporary use of on-line non-downloadable cloud computing computer and network security software for network and application security for the purposes of protecting data and restricting unauthorized network access; software as a service (SAAS) services, namely, hosting of computer and network security software for use by others for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; computer software and computer management security services in the field of malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time; Educational services, namely, arranging, organizing, conducting, and presenting educational classes, non-downloadable webinars, and online instruction, all in the field of computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; Downloadable computer network and security threat management software; computer and network security threat management hardware in the nature of security appliances for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices


First Use Date in General

04th Oct 2022

First Use Date in Commerce

04th Oct 2022

Mark Details


Serial Number

No 98531858

Mark Type

No Service Mark

Attorney Docket Number

No 10439.2300

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Design Code(s)

24.01.03 -

Shields or crests with letters, punctuation or inscriptions contained therein or superimposed thereon

Legal History


Status DateAction Taken
23rd Nov 2024NON-FINAL ACTION WRITTEN
23rd Nov 2024NOTIFICATION OF NON-FINAL ACTION E-MAILED
23rd Nov 2024NON-FINAL ACTION E-MAILED
15th Nov 2024ASSIGNED TO EXAMINER
25th Oct 2024NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
25th Oct 2024NOTICE OF DESIGN SEARCH CODE E-MAILED
07th Oct 2024ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
07th Oct 2024TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
07th Oct 2024TEAS CHANGE OF CORRESPONDENCE RECEIVED
02th May 2024NEW APPLICATION ENTERED