Trademark: 88020512
Word
FROM HUNTED TO HUNTER
Status
Dead
Status Code
602
Status Date
Tuesday, April 2, 2019
Serial Number
88020512
Mark Type
4000
Filing Date
Friday, June 29, 2018
Abandoned Date
Tuesday, March 5, 2019

Trademark Owner History

Classifications
9 multi-platform, downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
42 computer consultation; consulting in the field of information technology; computer consultation in the field of computer and network security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SaaS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; software as a service (SaaS) services, namely, hosting software for use in detecting, blocking, and removing computer viruses and threats; threat hunting as a service (THaaS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; threat hunting as a service (THaaS) services, namely, hosting software for use in detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers
45 monitoring of computer systems for security purposes; provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; implementing plans for improving computer and network security via a global computer network

Trademark Events
Apr 2, 2019
Abandonment Notice E-Mailed - Failure To Respond
Apr 2, 2019
Abandonment - Failure To Respond Or Late Response
Sep 12, 2018
Teas Change Of Correspondence Received
Sep 5, 2018
Undeliverable Mail - Courtesy Copy Mailed
Sep 4, 2018
Notification Of Non-Final Action E-Mailed
Sep 4, 2018
Non-Final Action E-Mailed
Sep 4, 2018
Non-Final Action Written
Aug 30, 2018
Assigned To Examiner
Aug 23, 2018
Teas Change Of Correspondence Received
Aug 23, 2018
Teas Withdrawal Of Attorney Received-Firm Retains
Jul 5, 2018
New Application Office Supplied Data Entered In Tram
Jul 3, 2018
New Application Entered In Tram

Trademark Alertz updated from USPTO on 2030-01-24