associated with 161 other trademarks
Downloadable software for computer security; downloadable software in the field of information security management systems for information technology ...

Words that describe this trademark:

software computer security  information security management  security management systems  software field  computer security  field information  management systems  downloadable software  security 

Serial Number:

86676423

Mark:

Status:

Cancelled-Section 8

Status Date:

03-24-2023

Filing Date:

Registration Number:

5042400

Registration Date:

09-13-2016

Goods and Services:

Downloadable software for computer security; downloadable software in the field of information security management systems for information technology (IT) infrastructure and systems security, for user and entity behavioral analytics, predictive analytics for computer and network security, profiling and analyzing users, endpoints, applications and other entities independently and then correlates the data to identify threats, prioritize alerts, and communicate relevant information to the appropriate stakeholders, identifying anomalies in privileged user access, insight into third party vendor behavior, and intelligence about vulnerabilities within organizations' attack surface, detection, blocking, and facilitating removal and remediation of cyber-attacks, malicious attacks, insider threats, outsider threats, anomalous user behavior, compromised end points, compromised users, exploitable assets susceptible to threats, privilege account abuse, observed privilege activity, data exfiltration, phishing, bots, time bombs, worms, and advanced persistent threats, identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices, providing remediation and responder portal, providing just-in-time awareness training modules that personalize cyber education to change user behavior and shift the culture of the organization, providing executive dashboards and security self-service portals for cyber risk management, predicting and stopping crime before it happens by identifying, analyzing and correlating risky behavior and vulnerabilities across five vectors - insiders (employees), outsiders (bad actors), high privilege accounts, third party vendors and businesses' most valuable assets including who has access to them, and prioritizing the potential threats and security risk coming in through modern cyber threat vectors such as users, systems, applications, and vendors

Mark Description:

The mark consists of a mirror image of a four-sided non-standard geometrical shape.

Class:

Scientific

Type of Mark:

Trademark

Published for Opposition Date:

01-26-2016

Mark Drawing Status:

Design Only

Abandon Date:

N/A

Business Name:

QUARLES & BRADY LLP

Correspondent Name:

Recent Trademark filings by this company