tm logo
RSA
APPROVED

on 28 Nov 2024

Last Applicant/ Owned by

RSA Security LLC

174 Middlesex TurnpikeBedford, Massachusetts 01730

US

Serial Number

1952384 filed on 19th Mar 2019

Correspondent Address

1 PLACE VILLE MARIE37TH FLOOR/37E ETAGEMONTREAL

QUÉBEC

CA

H3B3P4

RSA

Trademark usage description

identity and access management software for preventing, detecting, analyzing, mitigating and resolving threats in the field of cybersecurity, namely, Read More

Classification Information


Class [009]
Identity and access management software for preventing, detecting, analyzing, mitigating and resolving threats in the field of cybersecurity, namely, for computer and mobile device user identity authentication, computer and mobile device user identity management, password authentication, sign-on control, and intrusion prevention, and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data of businesses, networked managed workspaces, software applications, cloud servers, mobile networks and devices, and computer networks; Software for automating authentication and governance of identity over the internet and other computer networks; Software for risk analytics in the field of cybersecurity, namely, the management of user identity authentication and access privileges of users to data of businesses, software applications and cloud servers, mobile networks and devices, and computer networks; Software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity, namely, for the management of user identity authentication and access privileges of users to aid in compliance with regulatory and industry business data protection requirements, user provisioning of personal information, role management, policy automation, computer access certification, short message service (SMS), and voice call one time password (OTP) services, biometric software and computer hardware for providing computer and mobile device user identity authentication in the field of cybersecurity; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to authenticate user identity; Computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Software for monitoring and improving the cybersecurity of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer hardware systems, global computer networks, local computer networks, computer hardware and computer network hardware, software applications, digital consumer and business devices, data of businesses, and mobile devices in the field of cybersecurity; Software for providing operational business management intelligence, business management analytics, cybersecurity information, troubleshooting, and monitoring of computer network cybersecurity by combining information from databases in the field of cybersecurity; Software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; Software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for electronic fraud and identity theft detection and prevention; Software for detecting, monitoring, managing and preventing fraud, financial crime, cybercrime, cyber threats, cyber-attacks, security attacks and intrusions; software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Software for managing user identity authentication and access privileges to aid in compliance with regulatory requirements; non-predictable code calculators, namely, computer hardware and computer software that generate security access codes for accessing host data bank computers; and computer software programs that issue and manage digital user identities and access privileges for electronic commerce and security


Classification kind code

11

Class [035]
Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, and data security; Providing on-line employment listings over global computer networks, in the fields of computer cybersecurity, information technology security, electronic cybersecurity, cyber security, and business data cybersecurity


Classification kind code

11

Class [041]
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, and data security; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, and data security


Classification kind code

11

Class [042]
Software as a service (SaaS) services and cloud computing featuring identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; Software as a service (SaaS) services and cloud computing featuring software for automating authentication and governance of identity over the internet and other computer networks; Software as a service (SaaS) services and cloud computing featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; Software as a service (SaaS) services and cloud computing featuring software for preventing, detecting, analyzing, mitigating and resolving threats in the field of cybersecurity, namely, for the management of user identity authentication and access privileges of users to aid in compliance with regulatory and industry data of businesses protection requirements, user provisioning of personal information, role management, policy automation, computer, computer network and mobile network access certification, short message service (SMS), and voice call one time password (OTP) services, biometric software and computer hardware for providing computer and mobile device user identity authentication; Software as a service (SaaS) services and cloud computing featuring computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Software as a service (SaaS) services and cloud computing featuring software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, software applications, digital devices, digital data, and mobile devices; Software as a service (SaaS) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; Software as a service (SaaS) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; Software as a service (SaaS) services and cloud computing featuring integrated cybersecurity risk management software for cybersecurity risk, cybersecurity quality and regulatory compliance management, enterprise and operational cybersecurity risk management, internal business audit management, automating business continuity, cybersecurity crisis management and disaster recovery planning and execution, managing consumer technology, commercial technology, and cybersecurity related risks, cataloging third parties, business contracts, business engagements and related cybersecurity risks, and managing regulatory, governmental and corporate compliance in the field of cybersecurity; Software as a service (SaaS) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software as a service (SaaS) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (SaaS) services and cloud computing featuring software for detecting, monitoring, managing and preventing fraud, financial crime, cybercrime, cyber threats, cyber-attacks, security attacks and intrusions; Software as a service (SaaS) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Software as a service (SaaS) services and cloud computing featuring software for managing user identity authentication and access privileges to aid in compliance with regulatory requirements; Authentication, issuance and validation of digital certificates; Identification verification services, namely, providing authentication of personal identification information; Providing user authentication services in e-commerce transactions; Providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Regulatory compliance consulting


Classification kind code

11

Class [045]
Consulting services in the field of maintaining the security and integrity of databases; Consultation in the field of data theft and identity theft


Classification kind code

11

Mark Details


Serial Number

1952384

Mark Type

Trademark

Legal History


Show more

Action TakenStatus
Submitted for opposition 26
on 28th Nov 2024
Approved
Submitted for opposition 48
on 12th Aug 2024
Agent Changed
Submitted for opposition 15
on 04th Jun 2024
Correspondence Created
Submitted for opposition 22
on 27th Jun 2023
Search Recorded
Submitted for opposition 20
on 27th Jun 2023
Examiner's First Report
Submitted for opposition 287
on 09th May 2022
Pre-Assessment Letter Sent
Submitted for opposition 80
on 03rd Feb 2021
Change of Title Registered
Submitted for opposition 31
on 25th Mar 2019
Formalized
Submitted for opposition 1
on 20th Mar 2019
Created
Submitted for opposition 30
on 19th Mar 2019
Filed