tm logo
DRAGOS
Live/Registered
REGISTERED

on 04 Apr 2023

Last Applicant/ Owned by

1745 Dorsey Rd., Suite R

Hanover

MD

21076

Serial Number

90342897 filed on 25th Nov 2020

Registration Number

7019580 registered on 04th Apr 2023

in the Principal Register

Correspondent Address

Jennifer M. Lantz

Jennifer M. Lantz

260 Homer Avenue, Suite 202

Palo Alto,CA 94301

Filing Basis

1. intent to use

2. use application currently

Disclaimer

NO DATA

DRAGOS

Providing online non-downloadable software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; providing online non-downloadable cybersecurity software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Software as a service (SaaS) services featuring software for Read More

Classification Information


Class [045]
Personal & Legal & Social Services


Private investigation of security threats to computer systems, industrial control systems, and networked devices for cybersecurity purposes for the protection of computer networks and tangible property; private investigation of security vulnerabilities and problems in computer systems, industrial control systems, and networked devices for cybersecurity purposes for the protection of computer networks and tangible property; private investigation of industrial security


First Use Date in General

28th Apr 2016

First Use Date in Commerce

12th Sep 2016

Class [042]
Computer & Software Services & Scientific Services


Providing online non-downloadable software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; providing online non-downloadable cybersecurity software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Software as a service (SaaS) services featuring software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Platform as a service (PaaS) services featuring computer software platforms for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Software as a service (SaaS) services featuring cybersecurity software ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Platform as a service (PaaS) services featuring cybersecurity software platforms for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; providing online non-downloadable software for providing network, Internet, and computer security; providing online non-downloadable software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; providing online non-downloadable software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; providing online non-downloadable software for the encryption and authentication of electronic and digital information and data; providing online non-downloadable software for identity security; providing online non-downloadable software for authentication and identity management information security; providing online non-downloadable software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; providing online non-downloadable software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data; Providing an online portal for computer security threat analysis services for the protection of data in the nature of the management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and network security of computer systems, industrial control systems, and networked devices; Providing an online portal for computer security threat analysis for protecting data in the field of internet security, computer network security, computer security monitoring, computer network asset identification, computer security threat detection for protecting data, computer security threat intelligence for protecting data, computer security integration, computer network architecture, data encryption technology, data authentication technology, intrusion detection and prevention in the nature of computer security services for protecting data, and computer security and dysfunction incident remediation in the nature of computer security services for protecting data; electronic storage of data; Information technology consulting services; Technology consulting services in the field of cybersecurity; computer security consulting services in the field of IT project management, monitoring, evaluation, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Providing information concerning the encryption and authentication of electronic and digital data; Authentication, issuance and validation of digital certificates; issuance of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks being computer security services; Design, development, installation, and customization of software; Design and development of cybersecurity systems; Computer security consulting services relating to the development, design, implementation, testing, analysis of cybersecurity systems in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; Updating of computer software; Computer diagnostic services; Technical support services, namely, troubleshooting of industrial security monitoring software problems; Technical support services in the nature of monitoring, detecting, diagnosing, remediating, mitigating and resolving cybersecurity issues, namely, monitoring technological functions of industrial computer network systems; Technical support services in the nature of network security architecture reviews, information security vulnerability assessments, testing of computers in the nature of device and application penetration tests, network penetration tests, and threat hunting for of computer systems, industrial control systems, and networked devices all to assess information security vulnerability in computers; Computer monitoring service which tracks application software performance, performs periodic maintenance and provides reports and alerts concerning such performance; Monitoring of computer systems, industrial control systems, and networked devices for computer security purposes in the nature of protecting data and information from unauthorized access; Monitoring and tracking of computer security vulnerabilities and problems in computer software products and computer networks for protecting data and information from unauthorized access; scientific investigation services for medical purposes; investigation of security threats to computer systems, industrial control systems, and networked devices in the nature of computer security threat analysis for protecting data for computer security purposes; Investigation of security vulnerabilities and problems in computer systems, industrial control systems, and networked devices in the nature of computer security threat analysis for protecting data for computer security purposes; Computer emergency response team services, namely, monitoring, tracking, and investigation of computer security vulnerabilities and problems in computer software products and computer networks devices in the nature of computer security threat analysis for protecting data


First Use Date in General

28th Apr 2016

First Use Date in Commerce

12th Sep 2016

Class [041]
Education and Entertainment Services


Educational services, namely, providing classes, seminars and workshops in the field of industrial cybersecurity; Educational services, namely, providing classes, seminars and workshops in the field of cybersecurity; Training services in the field of cybersecurity; Providing online, non-downloadable educational publications in the nature of articles, webinars, whitepapers, solution briefs, reports, and datasheets in the field of cybersecurity


First Use Date in General

28th Apr 2016

First Use Date in Commerce

12th Sep 2016

Class [035]
Advertising, Business & Retail Services


Business management consulting in the field of industrial cybersecurity; business monitoring services, namely, tracking the cybersecurity performance of industrial facilities for business purposes; Providing an online portal for use in business management of computer systems, industrial control systems, and networked devices for security purposes


First Use Date in General

28th Apr 2016

First Use Date in Commerce

12th Sep 2016

Class [009]
Computer & Software Products & Electrical & Scientific Products


Downloadable software for industrial cybersecurity; Downloadable and recorded software for industrial cybersecurity; downloadable cybersecurity software for ensuring the security of industrial control systems and associated networks; Downloadable and recorded software for providing network, Internet, and computer security; Downloadable and recorded software for use in the management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Downloadable and recorded software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; Downloadable and recorded software for the encryption and authentication of electronic and digital information and data; Downloadable and recorded computer software for identity security; Downloadable and recorded software for authentication and identity management information security; Downloadable and recorded software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; Downloadable and recorded software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data; Downloadable electronic data files featuring data for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation; Computer hardware; Computer hardware for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices; electronic sensors for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices


First Use Date in General

28th Apr 2016

First Use Date in Commerce

12th Sep 2016

Mark Details


Serial Number

No 90342897

Mark Type

No Service Mark

Attorney Docket Number

No R3690-9

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Design Code(s)

04.05.01 -

Dragons and griffons (half eagle, half lion)

27.03.03 -

Representations of animals or parts of animals forming letters or numerals, including punctuation

Legal History


Show more

Status DateAction Taken
03rd Jan 2024TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
03rd Jan 2024ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
03rd Jan 2024TEAS CHANGE OF CORRESPONDENCE RECEIVED
04th Apr 2023REGISTERED-PRINCIPAL REGISTER
04th Apr 2023NOTICE OF REGISTRATION CONFIRMATION EMAILED
28th Feb 2023NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED
27th Feb 2023ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED
25th Feb 2023STATEMENT OF USE PROCESSING COMPLETE
23rd Feb 2023CASE ASSIGNED TO INTENT TO USE PARALEGAL
31st Jan 2023TEAS STATEMENT OF USE RECEIVED