Trademark: 87975936
Word
AWAKE SECURITY
Status
Dead
Status Code
602
Status Date
Thursday, May 24, 2018
Serial Number
87975936
Mark Type
4000
Filing Date
Monday, July 10, 2017
Abandoned Date
Friday, April 13, 2018

Trademark Owner History

Classifications
9 Computer software for use in protecting and managing enterprise security; computer software for digital security; computer software and software platform for monitoring enterprise networks and computer systems to protect against malicious attacks; computer software for monitoring data and communications for security purposes; embedded software for network monitoring and security; computer software for controlling privacy on enterprise networks and protecting private information; computer software for implementing computer, software and network security measures; computer software for monitoring and detecting security breaches; computer software that provides intrusion alert, virus protection, and other security functions; anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; Internet security software, including computer software for use in the monitoring and control of computer and online activity; fraud protection software; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software providing secure networks; computer software for security analytics; computer software for security orchestration; computer software for threat hunting
41 Providing information related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices and generally in the field of information technology security and vulnerability
42 Design and development of electronic data security systems; development of software for secure network operations and operations platforms; computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; updating and maintaining computer software for others; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments

Trademark Events
May 24, 2018
Abandonment Notice Mailed - Failure To Respond
May 24, 2018
Abandonment - Failure To Respond Or Late Response
Oct 12, 2017
Notification Of Non-Final Action E-Mailed
Oct 12, 2017
Non-Final Action E-Mailed
Oct 12, 2017
Non-Final Action Written
Oct 4, 2017
Assigned To Examiner
Sep 26, 2017
Amendment To Use Processing Complete
Aug 16, 2017
Use Amendment Filed
Sep 26, 2017
Divisional Processing Complete
Aug 16, 2017
Divisional Request Received
Sep 22, 2017
Case Assigned To Intent To Use Paralegal
Aug 31, 2017
Assigned To Lie
Aug 16, 2017
Teas Amendment Of Use Received
Aug 16, 2017
Teas Request To Divide Received
Jul 17, 2017
New Application Office Supplied Data Entered In Tram
Jul 13, 2017
New Application Entered In Tram

Trademark Alertz updated from USPTO on 2030-01-24