Trademark: 88005176
Word
THREATINSIGHT
Status
Registered
Status Code
700
Status Date
Tuesday, October 13, 2020
Serial Number
88005176
Registration Number
6175677
Registration Date
Tuesday, October 13, 2020
Mark Type
4000
Filing Date
Monday, June 18, 2018
Published for Opposition
Tuesday, May 28, 2019

Trademark Owner History
ProSOC, Inc. - Original Registrant

Classifications
9 computer hardware and software for analyzing and preventing cyber threats in the fields of computer security; computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software for protecting and securing computer networks and applications; computer software for providing real-time security audits of an online application, network, and host
41 education, namely, providing classes, seminars, workshops, webinars and training in the fields of computer security
42 providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity computer hardware and software maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; computer security, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security computer hardware and software maintenance services; data security, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; computer security, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer services, namely, endpoint detection and response of software and hardware threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall computer hardware and software security maintenance services; firewall security, namely, security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; computer hardware maintenance services; hardware security, namely, maintenance of computer hardware security systems; computer security, namely, hardware security policy assessment; hardware support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer hardware and software maintenance services; information technology security, namely, security threat analysis for protecting data; computer security, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber intrusions and threats; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network maintenance services for others; computer network security, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network security policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy; support services, namely, troubleshooting of computer software problems, troubleshooting of security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing temporary use of non- downloadable software for security operations center management; software diagnostic services, namely, computer security threat analysis for protecting data; computer software maintenance services; software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems, troubleshooting of computer hardware and software security problems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
THREAT INSIGHT

Trademark Events
Aug 26, 2021
Applicant/Correspondence Changes (Non-Responsive) Entered
Aug 26, 2021
Teas Change Of Correspondence Received
Aug 26, 2021
Attorney/Dom.Rep.Revoked And/Or Appointed
Aug 26, 2021
Teas Revoke/App/Change Addr Of Atty/Dom Rep Received
Aug 26, 2021
Teas Change Of Owner Address Received
Oct 13, 2020
Registered-Principal Register
Sep 8, 2020
Notice Of Acceptance Of Statement Of Use E-Mailed
Sep 7, 2020
Allowed Principal Register - Sou Accepted
Sep 5, 2020
Teas/Email Correspondence Entered
Sep 4, 2020
Correspondence Received In Law Office
Sep 4, 2020
Teas Response To Office Action Received
Mar 4, 2020
Notification Of Non-Final Action E-Mailed
Mar 4, 2020
Non-Final Action E-Mailed
Mar 4, 2020
Su - Non-Final Action - Written
Mar 4, 2020
Statement Of Use Processing Complete
Jan 23, 2020
Use Amendment Filed
Mar 2, 2020
Case Assigned To Intent To Use Paralegal
Jan 28, 2020
Paper Received
Jul 23, 2019
Noa E-Mailed - Sou Required From Applicant
May 28, 2019
Official Gazette Publication Confirmation E-Mailed
May 28, 2019
Published For Opposition
May 8, 2019
Teas Change Of Correspondence Received
May 8, 2019
Notification Of Notice Of Publication E-Mailed
Apr 24, 2019
Law Office Publication Review Completed
Apr 22, 2019
Assigned To Lie
Apr 8, 2019
Approved For Pub - Principal Register
Apr 5, 2019
Teas/Email Correspondence Entered
Apr 4, 2019
Correspondence Received In Law Office
Apr 4, 2019
Teas Response To Office Action Received
Oct 4, 2018
Notification Of Non-Final Action E-Mailed
Oct 4, 2018
Non-Final Action E-Mailed
Oct 4, 2018
Non-Final Action Written
Oct 4, 2018
Assigned To Examiner
Jun 23, 2018
New Application Office Supplied Data Entered In Tram

Trademark Alertz updated from USPTO on 2030-01-24