tm logo
ZEGURO
Live/Registered
REGISTERED

on 20 Aug 2019

Last Applicant/ Owned by

Serial Number

88183266 filed on 06th Nov 2018

Registration Number

5838140 registered on 20th Aug 2019

in the Principal Register

Correspondent Address

Michael D. Cartona

Michael D. Cartona Grogan, Tuccillo & Vanderleedeen, LLP

Suite 508

Springfield, MA 01103

United States

Filing Basis

1. filed as use application

2. use application currently

Disclaimer

NO DATA

ZEGURO

Computer security consultancy; information technology consultation; computer security consultation in the field of assessing, correcting, defending and managing cyber security; information technology consulting in the field of cyber security solutions; information technology consulting in the field of compliance with data privacy and data security regulations; technology consultation in the field Read More

Classification Information


Class [042]
Computer & Software Services & Scientific Services


Computer security consultancy; information technology consultation; computer security consultation in the field of assessing, correcting, defending and managing cyber security; information technology consulting in the field of cyber security solutions; information technology consulting in the field of compliance with data privacy and data security regulations; technology consultation in the field of cyber security and cyber risk assessment; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess security vulnerabilities; cybersecurity assessment services, namely, computer security threat analysis for protecting data security, data privacy and managing cybersecurity regulations and standards; providing temporary use of non-downloadable cyber security software to reduce risk of cyber threats; providing temporary use of non-downloadable software for cyber security and cyber risk assessment; providing temporary use of non-downloadable cyber security software to detect and mitigate against cyber risks, threats and vulnerabilities; providing temporary use of non-downloadable cyber security software for preventing penetration by unauthorized computers and networks; providing temporary use of non-downloadable software for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; providing temporary use of non-downloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing customizable training modules to software users who demonstrate susceptibility to malicious electronic mail; providing temporary use of non-downloadable software for cybersecurity training and reporting purposes that replicates real-world cyber-attacks to enable employees and others how to identify, report, and avoid cybersecurity threats; providing temporary use of non-downloadable software for use in analyzing and measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; providing temporary use of non-downloadable software for use in monitoring and tracking compliance with laws and regulations in the fields of data privacy and data security; providing temporary use of non-downloadable software for cybersecurity training; design, development, and implementation of software in the fields of cyber security and information assurance; software development and product development consulting in the field of cyber security and cyber risk assessment; design, development and implementation of strategies to address cyber risk exposure, namely, continuous cyber risk monitoring, targeted employee training, automated web vulnerability testing, cybersecurity regulation and standards tracking and management, cybersecurity compliance and control tracking, application security management and monitoring, and cloud application security monitoring; conducting computer security threat assessments of information technology IT security policies and procedures for protecting data; providing a website featuring information on cyber risk management and computer security


First Use Date in General

31st Jan 2016

First Use Date in Commerce

31st Jan 2016

Mark Details


Serial Number

No 88183266

Mark Type

No Service Mark

Attorney Docket Number

No 1006-0071

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Legal History


Show more

Status DateAction Taken
29th Aug 2024AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
20th Aug 2024COURTESY REMINDER - SEC. 8 (6-YR) E-MAILED
14th Aug 2024ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
14th Aug 2024TEAS WITHDRAWAL OF ATTORNEY RECEIVED-FIRM RETAINS
14th Aug 2024TEAS CHANGE OF CORRESPONDENCE RECEIVED
14th Aug 2024TEAS CHANGE OF OWNER ADDRESS RECEIVED
14th Aug 2024APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED
14th Aug 2024TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
20th Aug 2019REGISTERED-PRINCIPAL REGISTER
02th Aug 2019APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED