on 28 Mar 2023
Last Applicant/ Owned by
1745 Dorsey Rd., Suite R
Hanover
MD
21076
Serial Number
90342905 filed on 25th Nov 2020
Registration Number
7013057 registered on 28th Mar 2023
Correspondent Address
Jennifer M. Lantz
Filing Basis
1. intent to use
2. use application currently
Disclaimer
NO DATA
Providing online non-downloadable software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; providing online non-downloadable cybersecurity software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Software as a service (SaaS) services featuring software for Read More
Private investigation services; private investigation of security threats to computer systems, industrial control systems, and networked devices for cybersecurity purposes for the protection of computer networks and tangible property; private investigation of security vulnerabilities and problems in computer systems, industrial control systems, and networked devices for cybersecurity purposes for the protection of computer networks and tangible property; private investigation of industrial security
28th Apr 2016
12th Sep 2016
Providing online non-downloadable software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; providing online non-downloadable cybersecurity software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Software as a service (SaaS) services featuring software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Platform as a service (PaaS) services featuring computer software platforms for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Software as a service (SaaS) services featuring cybersecurity software ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Platform as a service (PaaS) services featuring cybersecurity software platforms for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; providing online non-downloadable software for providing network, Internet, and computer security; providing online non-downloadable software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; providing online non-downloadable software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; providing online non-downloadable software for the encryption and authentication of electronic and digital information and data; providing online non-downloadable software for identity security; providing online non-downloadable software for authentication and identity management information security; providing online non-downloadable software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; providing online non-downloadable software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data; Providing an online portal for computer security threat analysis services for the protection of data in the nature of the management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and network security of computer systems, industrial control systems, and networked devices; Providing an online portal for computer security threat analysis for protecting data in the field of internet security, computer network security, computer security monitoring, computer network asset identification, computer security threat detection for protecting data, computer security threat intelligence for protecting data, computer security integration, computer network architecture, data encryption technology, data authentication technology, intrusion detection and prevention in the nature of computer security services for protecting data, and computer security and dysfunction incident remediation in the nature of computer security services for protecting data; electronic storage of data; Information technology consulting services; Technology consulting services in the field of cybersecurity; computer security consulting services in the field of IT project management, monitoring, evaluation, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Providing information concerning the encryption and authentication of electronic and digital data; Authentication, issuance and validation of digital certificates; issuance of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks being computer security services; Design, development, installation, and customization of software; Design and development of cybersecurity systems; Computer security consulting services relating to the development, design, implementation, testing, analysis of cybersecurity systems in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; Updating of computer software; Computer diagnostic services; Technical support services, namely, troubleshooting of industrial security monitoring software problems; Technical support services in the nature of monitoring, detecting, diagnosing, remediating, mitigating and resolving cybersecurity issues, namely, monitoring technological functions of industrial computer network systems ; Technical support services in the nature of network security architecture reviews, information security vulnerability assessments, testing of computers in the nature of device and application penetration tests, network penetration tests, and threat hunting for of computer systems, industrial control systems, and networked devices all to assess information security vulnerability in computers; Computer monitoring service which tracks application software performance, performs periodic maintenance and provides reports and alerts concerning such performance; Monitoring of computer systems, industrial control systems, and networked devices for computer security purposes in the nature of protecting data and information from unauthorized access; Monitoring and tracking of computer security vulnerabilities and problems in computer software products and computer networks for protecting data and information from unauthorized access; scientific investigation services for medical purposes; investigation of security threats to computer systems, industrial control systems, and networked devices in the nature of computer security threat analysis for protecting data for computer security purposes; Investigation of security vulnerabilities and problems in computer systems, industrial control systems, and networked devices in the nature of computer security threat analysis for protecting data for computer security purposes; Computer emergency response team services, namely, monitoring, tracking, and investigation of computer security vulnerabilities and problems in computer software products and computer networks devices in the nature of computer security threat analysis for protecting data
28th Apr 2016
12th Sep 2016
Educational services, namely, providing classes, seminars and workshops in the field of industrial cybersecurity; Educational services, namely, providing classes, seminars and workshops in the field of cybersecurity; Training services in the field of cybersecurity; Providing online, non-downloadable educational publications in the nature of articles, webinars, whitepapers, solution briefs, reports, and datasheets in the field of cybersecurity
28th Apr 2016
12th Sep 2016
Business management consulting in the field of industrial cybersecurity; business monitoring services, namely, tracking the cybersecurity performance of industrial facilities for business purposes; Providing an online portal for use in business management of computer systems, industrial control systems, and networked devices for security purposes
28th Apr 2016
12th Sep 2016
Downloadable software for industrial cybersecurity; Downloadable and recorded software for industrial cybersecurity; downloadable cybersecurity software for ensuring the security of industrial control systems and associated networks; Downloadable and recorded software for providing network, Internet, and computer security; Downloadable and recorded software for use in the management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Downloadable and recorded software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; Downloadable and recorded software for the encryption and authentication of electronic and digital information and data; Downloadable and recorded computer software for identity security; Downloadable and recorded software for authentication and identity management information security; Downloadable and recorded software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; Downloadable and recorded software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data; Downloadable electronic data files featuring data for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation; Computer hardware; Computer hardware for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices; electronic sensors for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices
28th Apr 2016
12th Sep 2016
No 90342905
No Service Mark
No R3690-8
No
No
No
No
No
No
No
No
Status Date | Action Taken |
---|---|
03rd Jan 2024 | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED |
03rd Jan 2024 | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED |
03rd Jan 2024 | TEAS CHANGE OF CORRESPONDENCE RECEIVED |
28th Mar 2023 | REGISTERED-PRINCIPAL REGISTER |
28th Mar 2023 | NOTICE OF REGISTRATION CONFIRMATION EMAILED |
24th Feb 2023 | NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED |
23rd Feb 2023 | ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED |
22nd Feb 2023 | STATEMENT OF USE PROCESSING COMPLETE |
21st Feb 2023 | CASE ASSIGNED TO INTENT TO USE PARALEGAL |
26th Jan 2023 | TEAS STATEMENT OF USE RECEIVED |