final action
on 07 Oct 2024
Last Applicant/ Owned by
9864 E. Grand River, Ste 110-139
Brighton
MI
48116
Serial Number
98080345 filed on 11th Jul 2023
Registration Number
N/A
Correspondent Address
Connie L. Ellerbach
Filing Basis
1. intent to use
2. intent to use current
Disclaimer
NO DATA
Providing online non-downloadable software for use in the field of computer network security and cybersecurity; software as a service (SaaS) services featuring software for use in the field of computer network security and cybersecurity; platform as a service (PaaS) featuring software platforms for use in the field of computer network security and cybersecurity; cybersecurity services in the natur Read More
Providing online non-downloadable software for use in the field of computer network security and cybersecurity; software as a service (SaaS) services featuring software for use in the field of computer network security and cybersecurity; platform as a service (PaaS) featuring software platforms for use in the field of computer network security and cybersecurity; cybersecurity services in the nature of continuous threat monitoring and analysis, incident response and management, vulnerability assessments, endpoint detection and response monitoring, third party risk management, asset management, firewall compliance reporting, security technology stack monitoring, medical and internet of things (IoT) device security monitoring, and attack surface management, and government risk and compliance services in the fields of cyber security, incident response planning, risk management, security architecture design, compliance and regulatory guidance, security technology implementation, cybersecurity strategy development, and security awareness; consultation and advisory services in the fields of cybersecurity, incident response planning, risk management, security architecture design, compliance and regulatory guidance, security technology implementation, cybersecurity strategy development, and security awareness; developing customized software in the fields of fields of cybersecurity, incident response planning, risk management, security architecture design, compliance and regulatory guidance, security technology implementation, cybersecurity strategy development, and security awareness for others; providing online non-downloadable software for continuous threat monitoring and analysis, incident response and management, vulnerability assessments, endpoint detection and response monitoring, third party risk management, asset management, firewall compliance reporting, security technology stack monitoring, medical and internet of things (IoT) device security monitoring, and attack surface management in the fields of cyber security, incident response planning, risk management, security architecture design, compliance and regulatory guidance, security technology implementation, cybersecurity strategy development, and security awareness; software as a service (SaaS) services featuring software for continuous threat monitoring and analysis, incident response and management, vulnerability assessments, endpoint detection and response monitoring, third party risk management, asset management, firewall compliance reporting, security technology stack monitoring, medical and internet of things (IoT) device security monitoring, and attack surface management in the fields of cyber security, incident response planning, risk management, security architecture design, compliance and regulatory guidance, security technology implementation, cybersecurity strategy development, and security awareness; platform as a service (PaaS) featuring software platforms for continuous threat monitoring and analysis, incident response and management, vulnerability assessments, endpoint detection and response monitoring, third party risk management, asset management, firewall compliance reporting, security technology stack monitoring, medical and internet of things (IoT) device security monitoring, and attack surface management in the fields of cyber security, incident response planning, risk management, security architecture design, compliance and regulatory guidance, security technology implementation, cybersecurity strategy development, and security awareness; providing a website featuring technology for others in the fields of cybersecurity, incident response planning, risk management, security architecture design, compliance and regulatory guidance, security technology implementation, cybersecurity strategy development, and security awareness; technical support, namely, monitoring of network systems and servers related to security and vulnerability, cyber-attacks, and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support services, namely, 24/7 monitoring services including continuous threat monitoring and analysis, incident response and management, vulnerability assessments, endpoint detection and response monitoring, third party risk management, asset management, firewall compliance reporting, security technology stack monitoring, medical and internet of things (IoT) device security monitoring, and attack surface management
N/A
N/A
Education services in the field of computer network security and cybersecurity; education services, namely, conducting classes, seminars, workshops, presentations, webinars, simulation exercises, and trainings in the fields of cyber security, incident response planning, risk management, security architecture design, compliance and regulatory guidance, security technology implementation, cybersecurity strategy development, and security awareness
N/A
N/A
Downloadable software for use in the field of computer network security and cybersecurity; downloadable software for continuous threat monitoring and analysis, incident response and management, vulnerability assessments, endpoint detection and response monitoring, third party risk management, asset management, firewall compliance reporting, security technology stack monitoring, medical and internet of things (IoT) device security monitoring, and attack surface management in the fields of cyber security, incident response planning, risk management, security architecture design, compliance and regulatory guidance, security technology implementation, cybersecurity strategy development, and security awareness
N/A
N/A
No 98080345
No Service Mark
No 41242-00070
No
No
No
No
No
No
No
No
Status Date | Action Taken |
---|---|
07th Oct 2024 | NON-FINAL ACTION E-MAILED |
07th Oct 2024 | NON-FINAL ACTION WRITTEN |
07th Oct 2024 | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
29th Aug 2024 | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
29th Aug 2024 | TEAS/EMAIL CORRESPONDENCE ENTERED |
29th Aug 2024 | CORRESPONDENCE RECEIVED IN LAW OFFICE |
12th Jun 2024 | APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED |
12th Jun 2024 | APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED |
22nd Mar 2024 | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
22nd Mar 2024 | NON-FINAL ACTION E-MAILED |