Trademark: 88005190
Word
THREATINTEL
Status
Dead
Status Code
602
Status Date
Thursday, May 2, 2019
Serial Number
88005190
Mark Type
4000
Filing Date
Monday, June 18, 2018
Abandoned Date
Friday, April 5, 2019

Trademark Owner History

Classifications
42 Hardware and software in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; maintenance of computer software relating to computer security and prevention of computer risks; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; testing of security systems; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments;Education and training in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; maintenance of computer software relating to computer security and prevention of computer risks; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; testing of security systems; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments; Computer services in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; maintenance of computer software relating to computer security and prevention of computer risks; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; testing of security systems; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments; Security services in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; maintenance of computer software relating to computer security and prevention of computer risks; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; testing of security systems; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments

Trademark Events
May 8, 2019
Teas Change Of Correspondence Received
May 2, 2019
Abandonment Notice E-Mailed - Failure To Respond
May 2, 2019
Abandonment - Failure To Respond Or Late Response
Oct 4, 2018
Notification Of Non-Final Action E-Mailed
Oct 4, 2018
Non-Final Action E-Mailed
Oct 4, 2018
Non-Final Action Written
Oct 4, 2018
Assigned To Examiner
Jun 23, 2018
New Application Office Supplied Data Entered In Tram

Trademark Alertz updated from USPTO on 2030-01-24