This website uses cookies

We use cookies to ensure you get the best experience. Check our Privacy Policy

Manage Cookies

Manage Cookies

You can choose to enable or disable some or all of these cookies but disabling some of them may affect your browsing experience.

Advertisement

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously

Analytics

Analytical cookies are used to understand how visitors interact with the website.

Functional

Functional cookies help perform certain functionalities like collecting feedback, and other third-party features.

Performance

Performance cookies are used to understand and analyze the key performance indexes of the website.

tm logo
Live/Pending
NON-FINAL ACTION - MAILED

final action

on 08 Dec 2024

Last Applicant/ Owned by

132 Menachem Begin Road

Circular Tower, FL 15

IL

670110

Serial Number

98566092 filed on 23rd May 2024

Registration Number

N/A

Correspondent Address

Perry J. Viscounty

Perry J. Viscounty Latham & Watkins LLP

Costa Mesa, CA 92626

United States

Filing Basis

No Filing Basis

Disclaimer

NO DATA

Logo Mark Trademark Information

Computer network security services; services for monitoring of computer systems of network connected physical and virtual devices by remote access for the detection of unauthorized access and data breaches and for authorization management; monitoring of computer systems of network-connected physical and virtual devices for detecting unauthorized access or data breach; software as a service (SAAS) Read More

Classification Information


Class [042]
Computer & Software Services & Scientific Services


Computer network security services; services for monitoring of computer systems of network connected physical and virtual devices by remote access for the detection of unauthorized access and data breaches and for authorization management; monitoring of computer systems of network-connected physical and virtual devices for detecting unauthorized access or data breach; software as a service (SAAS) services featuring software for use in the detection, analysis, mitigation and resolution of threats in the field of cyber security; computer security support services; Software as a service services (SaaS) featuring software for monitoring, analyzing, auditing, automating, identification, discovery, centralization, unification, management, optimization, integration, and security of users, actions, data, software and files; Software as a service services (SaaS) featuring software for identifying and reporting security threats, automating remediation on breaches of security policies, enforcing security policies, eliminating security vulnerabilities, security compliance monitoring, managing access rights and providing alerts and notifications; design, development and implementation of software in the field of data and network security; design, development and implementation of software in the fields of cloud, mobile or network applications; information technology support services, namely, monitoring network systems via information technology service support centers and helpdesks


First Use Date in General

N/A

First Use Date in Commerce

N/A

Class [009]
Computer & Software Products & Electrical & Scientific Products


Software for computer network security; computer software for management of physical and virtual devices connected to a network for the detection of unauthorized access and data breaches and for authorization management; software for security and compliance automation, continuously monitoring and collecting evidence of a company's security controls, and streamlining workflows to ensure audit-readiness; computer software for computer network security and for monitoring and identifying computer network users and cloud, mobile or network applications and computer hardware and the network activities of computer users and cloud, mobile or network applications and computer hardware; downloadable and recorded computer software and computer hardware for use in the detection, analysis, mitigation and resolution of threats in the field of cyber security; downloadable computer software for providing data and information assurance and security, information security policy validation and enforcement


First Use Date in General

N/A

First Use Date in Commerce

N/A

Mark Details


Serial Number

No 98566092

Mark Type

No Service Mark

Attorney Docket Number

No 070263-3

44D Filed

Yes

44D Current

Yes

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Design Code(s)

17.01.05 -

Hourglasse

26.01.21 -

Circles that are totally or partially shaded

Legal History


Status DateAction Taken
08th Dec 2024NON-FINAL ACTION WRITTEN
08th Dec 2024NOTIFICATION OF NON-FINAL ACTION E-MAILED
08th Dec 2024ASSIGNED TO EXAMINER
08th Dec 2024NON-FINAL ACTION E-MAILED
03rd Dec 2024NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
03rd Dec 2024NOTICE OF DESIGN SEARCH CODE E-MAILED
23rd May 2024NEW APPLICATION ENTERED