Trademark: 90342897
Word
DRAGOS
Status
Registered
Status Code
700
Status Date
Tuesday, April 4, 2023
Serial Number
90342897
Registration Number
7019580
Registration Date
Tuesday, April 4, 2023
Mark Type
3000
Filing Date
Wednesday, November 25, 2020
Published for Opposition
Tuesday, June 7, 2022

Trademark Owner History
Dragos, Inc. - Original Registrant

Classifications
41 Educational services, namely, providing classes, seminars and workshops in the field of industrial cybersecurity; Educational services, namely, providing classes, seminars and workshops in the field of cybersecurity; Training services in the field of cybersecurity; Providing online, non-downloadable educational publications in the nature of articles, webinars, whitepapers, solution briefs, reports, and datasheets in the field of cybersecurity
9 Downloadable software for industrial cybersecurity; Downloadable and recorded software for industrial cybersecurity; downloadable cybersecurity software for ensuring the security of industrial control systems and associated networks; Downloadable and recorded software for providing network, Internet, and computer security; Downloadable and recorded software for use in the management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Downloadable and recorded software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; Downloadable and recorded software for the encryption and authentication of electronic and digital information and data; Downloadable and recorded computer software for identity security; Downloadable and recorded software for authentication and identity management information security; Downloadable and recorded software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; Downloadable and recorded software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data; Downloadable electronic data files featuring data for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation; Computer hardware; Computer hardware for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices; electronic sensors for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices
35 Business management consulting in the field of industrial cybersecurity; business monitoring services, namely, tracking the cybersecurity performance of industrial facilities for business purposes; Providing an online portal for use in business management of computer systems, industrial control systems, and networked devices for security purposes
45 Private investigation of security threats to computer systems, industrial control systems, and networked devices for cybersecurity purposes for the protection of computer networks and tangible property; private investigation of security vulnerabilities and problems in computer systems, industrial control systems, and networked devices for cybersecurity purposes for the protection of computer networks and tangible property; private investigation of industrial security
42 Providing online non-downloadable software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; providing online non-downloadable cybersecurity software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Software as a service (SaaS) services featuring software for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Platform as a service (PaaS) services featuring computer software platforms for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Software as a service (SaaS) services featuring cybersecurity software ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; Platform as a service (PaaS) services featuring cybersecurity software platforms for ensuring the security of industrial computer systems, industrial control systems, and associated networked devices; providing online non-downloadable software for providing network, Internet, and computer security; providing online non-downloadable software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; providing online non-downloadable software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; providing online non-downloadable software for the encryption and authentication of electronic and digital information and data; providing online non-downloadable software for identity security; providing online non-downloadable software for authentication and identity management information security; providing online non-downloadable software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; providing online non-downloadable software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data; Providing an online portal for computer security threat analysis services for the protection of data in the nature of the management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and network security of computer systems, industrial control systems, and networked devices; Providing an online portal for computer security threat analysis for protecting data in the field of internet security, computer network security, computer security monitoring, computer network asset identification, computer security threat detection for protecting data, computer security threat intelligence for protecting data, computer security integration, computer network architecture, data encryption technology, data authentication technology, intrusion detection and prevention in the nature of computer security services for protecting data, and computer security and dysfunction incident remediation in the nature of computer security services for protecting data; electronic storage of data; Information technology consulting services; Technology consulting services in the field of cybersecurity; computer security consulting services in the field of IT project management, monitoring, evaluation, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Providing information concerning the encryption and authentication of electronic and digital data; Authentication, issuance and validation of digital certificates; issuance of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks being computer security services; Design, development, installation, and customization of software; Design and development of cybersecurity systems; Computer security consulting services relating to the development, design, implementation, testing, analysis of cybersecurity systems in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; Updating of computer software; Computer diagnostic services; Technical support services, namely, troubleshooting of industrial security monitoring software problems; Technical support services in the nature of monitoring, detecting, diagnosing, remediating, mitigating and resolving cybersecurity issues, namely, monitoring technological functions of industrial computer network systems; Technical support services in the nature of network security architecture reviews, information security vulnerability assessments, testing of computers in the nature of device and application penetration tests, network penetration tests, and threat hunting for of computer systems, industrial control systems, and networked devices all to assess information security vulnerability in computers; Computer monitoring service which tracks application software performance, performs periodic maintenance and provides reports and alerts concerning such performance; Monitoring of computer systems, industrial control systems, and networked devices for computer security purposes in the nature of protecting data and information from unauthorized access; Monitoring and tracking of computer security vulnerabilities and problems in computer software products and computer networks for protecting data and information from unauthorized access; scientific investigation services for medical purposes; investigation of security threats to computer systems, industrial control systems, and networked devices in the nature of computer security threat analysis for protecting data for computer security purposes; Investigation of security vulnerabilities and problems in computer systems, industrial control systems, and networked devices in the nature of computer security threat analysis for protecting data for computer security purposes; Computer emergency response team services, namely, monitoring, tracking, and investigation of computer security vulnerabilities and problems in computer software products and computer networks devices in the nature of computer security threat analysis for protecting data

Trademark Events
Jan 3, 2024
Teas Change Of Correspondence Received
Jan 3, 2024
Attorney/Dom.Rep.Revoked And/Or Appointed
Jan 3, 2024
Teas Revoke/App/Change Addr Of Atty/Dom Rep Received
Apr 4, 2023
Notice Of Registration Confirmation Emailed
Apr 4, 2023
Registered-Principal Register
Feb 28, 2023
Notice Of Acceptance Of Statement Of Use E-Mailed
Feb 27, 2023
Allowed Principal Register - Sou Accepted
Feb 25, 2023
Statement Of Use Processing Complete
Jan 31, 2023
Use Amendment Filed
Feb 23, 2023
Case Assigned To Intent To Use Paralegal
Jan 31, 2023
Teas Statement Of Use Received
Aug 2, 2022
Noa E-Mailed - Sou Required From Applicant
Jun 7, 2022
Official Gazette Publication Confirmation E-Mailed
Jun 7, 2022
Published For Opposition
May 18, 2022
Notification Of Notice Of Publication E-Mailed
May 4, 2022
Approved For Pub - Principal Register
May 4, 2022
Examiner's Amendment Entered
May 4, 2022
Notification Of Examiners Amendment E-Mailed
May 4, 2022
Examiners Amendment E-Mailed
May 4, 2022
Examiners Amendment -Written
Apr 20, 2022
Teas/Email Correspondence Entered
Apr 20, 2022
Correspondence Received In Law Office
Apr 20, 2022
Assigned To Lie
Apr 15, 2022
Teas Request For Reconsideration Received
Apr 15, 2022
Ex Parte Appeal-Instituted
Apr 15, 2022
Jurisdiction Restored To Examining Attorney
Apr 15, 2022
Exparte Appeal Received At Ttab
Oct 19, 2021
Notification Of Final Refusal Emailed
Oct 19, 2021
Final Refusal E-Mailed
Oct 19, 2021
Final Refusal Written
Sep 14, 2021
Teas/Email Correspondence Entered
Sep 13, 2021
Correspondence Received In Law Office
Sep 13, 2021
Teas Response To Office Action Received
Aug 23, 2021
Assigned To Examiner
Jun 2, 2021
Assignment Of Ownership Not Updated Automatically
May 19, 2021
Assignment Of Ownership Not Updated Automatically
May 15, 2021
Notification Of Non-Final Action E-Mailed
May 15, 2021
Non-Final Action E-Mailed
May 15, 2021
Non-Final Action Written
May 11, 2021
Assigned To Examiner
Feb 10, 2021
Applicant/Correspondence Changes (Non-Responsive) Entered
Feb 10, 2021
Teas Change Of Correspondence Received
Feb 10, 2021
Attorney/Dom.Rep.Revoked And/Or Appointed
Feb 10, 2021
Teas Revoke/App/Change Addr Of Atty/Dom Rep Received
Feb 10, 2021
Teas Change Of Owner Address Received
Feb 2, 2021
Notice Of Design Search Code E-Mailed
Feb 1, 2021
New Application Office Supplied Data Entered
Jan 14, 2021
Applicant/Correspondence Changes (Non-Responsive) Entered
Jan 14, 2021
Teas Change Of Correspondence Received
Jan 14, 2021
Attorney/Dom.Rep.Revoked And/Or Appointed
Jan 14, 2021
Teas Revoke/App/Change Addr Of Atty/Dom Rep Received
Jan 14, 2021
Teas Change Of Owner Address Received
Nov 28, 2020
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24