Trademark: 88106752
Word
BOT RADAR
Status
Dead
Status Code
602
Status Date
Thursday, July 18, 2019
Serial Number
88106752
Mark Type
4000
Filing Date
Thursday, September 6, 2018
Abandoned Date
Thursday, June 20, 2019

Trademark Owner History

Classifications
9 Computer hardware; Computer hardware, namely, firewalls and networks security devices; Computer software for security and protection, namely, software for providing web security and protection, detecting suspicious or malicious user activity and cyber-related threats, monitoring of computer systems for detecting unauthorized access or data breach; Computer software, namely, software for protecting applications by concealing or reshaping the interfaces of a website; Computer software for providing security and protection of data, networks and communications; Downloadable computer software for providing security and protection of data, networks and communications; Computer software for identifying and preventing malicious attacks, unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; Computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, boot kits, backdoors, cyber-attacks, malicious attacks and advanced persistent threats; Computer hardware, namely, network security appliances in the nature of network access server hardware, and network management stations in the nature of computer network server; Computer software, namely, network security software applications for controlling and managing access server applications; Computer software featuring self-protection mechanisms for detecting and removing computer viruses for vulnerable systems, effectively extending the defense perimeter of enterprises; Computer security and information technology products, namely, computer software for authorizing access to databases
42 Computer security consultancy; Computer technology consultancy; Providing temporary use of non-downloadable computer software services, namely, web security and protection services, detection of suspicious or malicious user activity, unauthorized access or data breach, and cyber-related threats, monitoring of computer systems; Computer security services, namely, restricting unauthorized network access by concealing or reshaping the interfaces of a website; Providing a secure electronic online system featuring technology of a real time proactive defense mechanisms for vulnerable systems Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems by remote access to ensure proper functioning; Cloud computing services featuring software and databases for use in database management for computer security and prevention and mitigation of computer risks; Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; Provision of information in the field of computer security risk and internet security risk consultancy; Computer and internet security testing services, namely, threat analysis for protecting data and risk control services in the field of internet security for prevention and mitigation of computer risks; Design and development of computer hardware and software for use in computer network security and protection; Technological consultation in the field of computer networking and network security; Technical support, namely, monitoring of network systems and servers related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Technical consulting related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Technical support services, namely, 24/7 monitoring application services related to the design, development and management of cyber-security systems for others; Software development in the field of network security, incident and fraud prevention and response, digital forensics, intrusion prevention; Maintenance of computer software; Software as a service (SAAS) services featuring software for providing security and protection for use in computer network security; Software as a service (SAAS) services, namely, hosting software for use by others for providing security and protection for use in computer network security; Software as a Service (SaaS) services, namely, hosting cloud and datacenter infrastructure software for use by others for providing security and protection in relation to security and protection computer software

Trademark Events
Jul 18, 2019
Abandonment Notice E-Mailed - Failure To Respond
Jul 18, 2019
Abandonment - Failure To Respond Or Late Response
Dec 19, 2018
Notification Of Non-Final Action E-Mailed
Dec 19, 2018
Non-Final Action E-Mailed
Dec 19, 2018
Non-Final Action Written
Dec 17, 2018
Assigned To Examiner
Sep 14, 2018
New Application Office Supplied Data Entered In Tram
Sep 10, 2018
New Application Entered In Tram

Trademark Alertz updated from USPTO on 2030-01-24