on 17 Jan 2023
Last Applicant/ Owned by
2177 Salk Ave, Suite 100
Carlsbad
CA
92008
Serial Number
90747363 filed on 01st Jun 2021
Registration Number
6958661 registered on 17th Jan 2023
Correspondent Address
Peter B. Bromaghim
Filing Basis
1. intent to use
2. use application currently
Disclaimer
NO DATA
Computer services in the fields of computer security, namely, computer security consulting; computer security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information se Read More
Computer services in the fields of computer security, namely, computer security consulting; computer security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity computer diagnostic services; cybersecurity, namely, computer security threat analysis for protecting data; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security computer diagnostic services; data security consulting; endpoint detection and response, namely, monitoring of computer systems to detect intrusions and breakdowns; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; firewall security computer diagnostic services; firewall security services, namely, computer security threat analysis for protecting data; firewall security support services, namely, help desk services; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; information technology security, namely, computer security threat analysis for protecting information technology data; information technology security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes, and scanning hardware; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; managed detection and response, namely, monitoring of computer systems to detect breakdowns and security vulnerabilities; managed security service provider, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; network security services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security policy assessment, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, review and testing of computer hardware security involved in computer networks, review and testing of network hardware security of computer networks; vulnerability assessments, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software security policy assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes
01st Feb 2013
01st Feb 2013
No 90747363
No Service Mark
No 104474.T002
No
No
No
No
No
No
No
No
Status Date | Action Taken |
---|---|
17th Jan 2023 | NOTICE OF REGISTRATION CONFIRMATION EMAILED |
17th Jan 2023 | REGISTERED-PRINCIPAL REGISTER |
10th Dec 2022 | NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED |
09th Dec 2022 | ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED |
28th Nov 2022 | STATEMENT OF USE PROCESSING COMPLETE |
28th Nov 2022 | CASE ASSIGNED TO INTENT TO USE PARALEGAL |
09th Nov 2022 | USE AMENDMENT FILED |
09th Nov 2022 | TEAS STATEMENT OF USE RECEIVED |
10th May 2022 | NOA E-MAILED - SOU REQUIRED FROM APPLICANT |
15th Mar 2022 | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |