tm logo
THREATMATE
Live/Registered
REGISTERED

on 13 Aug 2024

Last Applicant/ Owned by

8 The Green, Suite 14359

Dover

DE

19901

Serial Number

97884260 filed on 12th Apr 2023

Registration Number

7471376 registered on 13th Aug 2024

in the Principal Register

Correspondent Address

8 The Green, Suite 14359

Dover, DE 19901

UNITED STATES

Filing Basis

1. filed as use application

2. use application currently

Disclaimer

NO DATA

THREATMATE

Software as a service (SaaS) featuring software for computer, internet and network security and protection; software as a service (SaaS) services featuring software for cybersecurity assessment and cyber threat mitigation; software as a service (SaaS) services featuring software to evaluate and score network security and resiliency and to develop a plan with prioritized tasks to reduce exposure to Read More

Classification Information


Class [042]
Computer & Software Services & Scientific Services


Software as a service (SaaS) featuring software for computer, internet and network security and protection; software as a service (SaaS) services featuring software for cybersecurity assessment and cyber threat mitigation; software as a service (SaaS) services featuring software to evaluate and score network security and resiliency and to develop a plan with prioritized tasks to reduce exposure to risks, and to improve the resiliency and score; software as a service (SaaS) services featuring computer software for use in network security management and analysis that allows users to view risk posture and network performance, to track network activity and to access reports regarding the same; platform as a service (PaaS) featuring computer software platforms for identifying and assessing security threats and for analyzing, reducing and remediating the attack surface of a computer network; providing temporary use of on-line non-downloadable computer software for detecting, computer network vulnerabilities and security configuration issues, and for improving security of networks, servers, containers, functions, applications, and services; providing online attack surface management in the nature of computer security threat analysis for protecting data, computer networks, and computer hardware systems; providing temporary use of online, non-downloadable software for detecting, identifying, analyzing, correlating, managing, mitigating and responding to cybersecurity risks and vulnerabilities; software as a service (SaaS) services featuring software for collecting, aggregating, and arranging data from multiple security assets to provide real-time attack surface visibility and specifying rules and tasks aimed at addressing identified security gaps and improving security effectiveness; providing temporary use of online non-downloadable computer software for monitoring of cloud systems for anomalous activity, outliers, vulnerabilities, misconfigurations, and compliance issues and violations; providing temporary use of online non-downloadable computer software for detecting, analyzing, monitoring, and displaying computer security threats, reducing risks, generating security reports, providing security alerts, and for security and regulatory compliance; software as a service (SaaS) services featuring online non-downloadable computer software for providing network security insights, analyzing network traffic, endpoint detections and remediation, attack surfaces reduction, and responses to security threats; providing online non-downloadable computer software for detecting, filtering, and analyzing computer networks and servers for configuration issues which could result in security vulnerabilities and misuse; software as a service (SaaS) services featuring software for conducting compliance queries and for evaluating internal and third party SaaS services to collect data to enrich vulnerability scans, check and monitor for compliance with IT policy and compliance protocols, and for detecting suspicious behaviors on computer networks; technology consultation in the field of computer, internet and network security, cybersecurity, and for cybersecurity assessment


First Use Date in General

31st Jan 2023

First Use Date in Commerce

31st Jan 2023

Class [009]
Computer & Software Products & Electrical & Scientific Products


Downloadable software for computer, internet and network security, and for cybersecurity assessment; downloadable computer software for collecting, analyzing, evaluating and scoring in the fields of cybersecurity, compliance, network security and end point security; downloadable computer software for advanced analytics to identify and monitor network access and cybersecurity risks and exposures; downloadable computer software for detecting, filtering, analyzing, maintaining and improving computer networks and servers for risks and exposures; downloadable computer software to monitor, detect, analyze, prevent, and mitigate cybersecurity risks, threats and attacks, reduce attack surfaces, protect privacy, generate security reports, provide security alerts, and for security and regulatory compliance; downloadable computer software for computer security threat analysis for protecting networks, devices, programs and data


First Use Date in General

31st Jan 2023

First Use Date in Commerce

31st Jan 2023

Mark Details


Serial Number

No 97884260

Mark Type

No Service Mark

Attorney Docket Number

No

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Legal History


Show more

Status DateAction Taken
13th Aug 2024NOTICE OF REGISTRATION CONFIRMATION EMAILED
13th Aug 2024REGISTERED-PRINCIPAL REGISTER
28th May 2024OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
28th May 2024PUBLISHED FOR OPPOSITION
08th May 2024NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
19th Apr 2024APPROVED FOR PUB - PRINCIPAL REGISTER
19th Apr 2024EXAMINER'S AMENDMENT ENTERED
19th Apr 2024NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
19th Apr 2024EXAMINERS AMENDMENT E-MAILED
19th Apr 2024EXAMINERS AMENDMENT -WRITTEN