Trademark: 97220769
Word
CYBEATS SBOM STUDIO
Status
Pending
Status Code
651
Status Date
Saturday, February 3, 2024
Serial Number
97220769
Mark Type
4000
Filing Date
Friday, January 14, 2022

Trademark Owner History

Classifications
9 Downloadable security software, namely, computer software for encrypting and authenticating data; Downloadable computer software, namely, cyber security software being software for identifying cybersecurity risks and software vulnerabilities; downloadable computer software for computer security, computer network security and information security purposes being software for identifying cybersecurity risks and software vulnerabilities; downloadable computer software in the field of the security risk industry, namely, computer security software being software for identifying cybersecurity risks and software vulnerabilities; downloadable computer software for managing computer security strategy and resources; downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; downloadable cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing devices; downloadable computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; downloadable computer software for managing cyber incident response, alert management, response management, cyber incident investigation, and cyber incident data collection and analysis; downloadable application programing interfaces (APIs), namely, computer software comprising a set of subroutine definitions, protocols, and tools for building application software, for integrating external systems into detection and incident response management systems; downloadable computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats
37 Services for enhancing the performance, function and security of computer networks, namely, installation and maintenance of computer hardware; troubleshooting of computer hardware, namely, troubleshooting in the nature of the repair of computer hardware; maintenance and repair of computer hardware; installation, maintenance and repair of computer hardware; upgrading of computer hardware; computer consultation in the fields of computer networks security, cyber security, cyber threat detection, cybercrime, and prevention and mitigation of cyber risk consultation about the repair of computer hardware, consultancy relating to the maintenance of computer hardware
42 Computer network security services, namely, computer network security consultancy, restricting unauthorized access to computer networks; computer security consultancy; design and development of electronic data security systems; developing computer software; internet security consultancy; maintenance of computer software relating to computer security and prevention of computer risks; monitoring of computer systems for detecting unauthorized access or data breach; computer security consultation in the fields of computer networks security, cyber security, cyber threat detection, cybercrime, and prevention and mitigation of cyber risk; providing online non-downloadable software in the field of computer security; Software as a Service (SAAS) services featuring software for performing computer security and risk assessment and remediation; Platform as a Service (PAAS) services featuring software for computer security and risk assessment and remediation; providing online non-downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; providing online non-downloadable cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing firmware based devices; providing online non-downloadable computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; providing online non-downloadable computer software for managing cyber incident response, alert management, response management, cyber incident investigation and cyber incident data collection and analysis; providing online non-downloadable computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; providing temporary use of on-line non-downloadable security software, namely, computer software for encrypting and authenticating data; providing temporary use of on-line non-downloadable computer software, namely, cyber security software being software for identifying cybersecurity risks and software vulnerabilities; providing temporary use of on-line non-downloadable computer software for computer security, computer network security and information security purposes being software for identifying cybersecurity risks and software vulnerabilities; providing temporary use of online non-downloadable computer software in the field of the security risk industry, namely, computer security software being software for identifying cybersecurity risks and software vulnerabilities; providing temporary use of on-line non-downloadable computer software for managing computer security strategy and resources; providing temporary use of on-line non-downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; providing temporary use of on-line non-downloadable cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing devices; providing temporary use of on-line non-downloadable computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; providing temporary use of on-line non-downloadable computer software for managing cyber incident response, alert management, response management, cyber incident investigation, and cyber incident data collection and analysis; providing temporary use of on-line non-downloadable application programing interfaces (APIs), namely, computer software comprising a set of subroutine definitions, protocols, and tools for building application software, for integrating external systems into detection and incident response management systems; providing temporary use of on-line non-downloadable computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; installation, maintenance and repair of computer software
CYBEATS SOFTWARE BILL OF MATERIALS STUDIO
"SBOM STUDIO"

Trademark Events
Apr 4, 2024
Teas Response To Suspension Inquiry Received
Feb 3, 2024
Notification Of Inquiry As To Suspension E-Mailed
Feb 3, 2024
Inquiry To Suspension E-Mailed
Feb 3, 2024
Suspension Inquiry Written
Jan 10, 2024
Suspension Checked - To Attorney For Action
Jun 2, 2023
Notification Of Letter Of Suspension E-Mailed
Jun 2, 2023
Letter Of Suspension E-Mailed
Jun 2, 2023
Suspension Letter Written
May 2, 2023
Teas/Email Correspondence Entered
May 1, 2023
Correspondence Received In Law Office
May 1, 2023
Teas Response To Office Action Received
Nov 1, 2022
Notification Of Non-Final Action E-Mailed
Nov 1, 2022
Non-Final Action E-Mailed
Nov 1, 2022
Non-Final Action Written
Oct 22, 2022
Assigned To Examiner
Jan 21, 2022
New Application Office Supplied Data Entered
Jan 18, 2022
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24