Trademark: 86661180
Word
FULL STACK SECURITY
Status
Dead
Status Code
606
Status Date
Monday, January 23, 2017
Serial Number
86661180
Mark Type
4000
Filing Date
Friday, June 12, 2015
Published for Opposition
Tuesday, April 26, 2016
Abandoned Date
Monday, January 23, 2017

Trademark Owner History
SOPHOS SECURITY TECHNOLOGY LIMITED - 1st New Owner After Publication
Barricade Security Systems Limited - Owner At Publication

Classifications
9 Cyber security software; computer software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber risks, threats, events, intrusions, breaches and attacks; computer software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; computer software for ensuring the security of computer software, computer hardware, and computer networks; computer software for ensuring the security of IT systems and infrastructure; computer software for ensuring the security of servers; computer software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; computer software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; computer software to assist and instruct user in understanding, managing, and mitigating cyber security risks, threats, events, intrusions, breaches and attacks; computer software for monitoring computer software, computer hardware, and computer network security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; computer software for monitoring IT systems and infrastructure to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks
42 Software as a service (SAAS) featuring cyber security software; software as a service (SAAS) featuring software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of IT systems and infrastructures; software as a service (SAAS) featuring software for server security; software as a service (SAAS) featuring software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; software as a service (SAAS) featuring software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; software as a service (SAAS) featuring software to assist and instruct user in understanding, managing, and mitigating cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for monitoring computer software, computer hardware, and computer network security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; software as a service (SAAS) featuring software for monitoring IT system and infrastructure security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; technology consultation in the field of cyber security, computer software security, computer hardware security, computer network security, and IT systems and infrastructure security; cyber risks and security consultancy services
"SECURITY"

Trademark Events
Jan 23, 2017
Abandonment Notice Mailed - No Use Statement Filed
Jan 23, 2017
Abandonment - No Use Statement Filed
Dec 21, 2016
Automatic Update Of Assignment Of Ownership
Dec 19, 2016
Attorney Revoked And/Or Appointed
Dec 19, 2016
Teas Revoke/Appoint Attorney Received
Jun 21, 2016
Noa E-Mailed - Sou Required From Applicant
Apr 26, 2016
Official Gazette Publication Confirmation E-Mailed
Apr 26, 2016
Published For Opposition
Apr 6, 2016
Notification Of Notice Of Publication E-Mailed
Mar 24, 2016
Law Office Publication Review Completed
Mar 23, 2016
Approved For Pub - Principal Register
Mar 23, 2016
Teas/Email Correspondence Entered
Mar 23, 2016
Correspondence Received In Law Office
Mar 16, 2016
Assigned To Lie
Mar 3, 2016
Teas Response To Office Action Received
Feb 29, 2016
Notification Of Non-Final Action E-Mailed
Feb 29, 2016
Non-Final Action E-Mailed
Feb 29, 2016
Non-Final Action Written
Feb 27, 2016
Teas/Email Correspondence Entered
Feb 26, 2016
Correspondence Received In Law Office
Feb 26, 2016
Teas Response To Office Action Received
Oct 1, 2015
Notification Of Non-Final Action E-Mailed
Oct 1, 2015
Non-Final Action E-Mailed
Oct 1, 2015
Non-Final Action Written
Sep 22, 2015
Assigned To Examiner
Sep 22, 2015
Assigned To Examiner
Jun 17, 2015
New Application Office Supplied Data Entered In Tram
Jun 16, 2015
New Application Entered In Tram

Trademark Alertz updated from USPTO on 2030-01-24