associated with 32 other trademarks
Computer software and downloadable computer software for Information Technology (IT) asset management, namely, cataloging and managing of IT physical ...

Words that describe this trademark:

software information technology  downloadable computer software  computer software information  technology asset management  asset management  information technology  computer software  software downloadable  management  cataloging 

Serial Number:

88001962

Mark:

Status:

Registered

Status Date:

03-22-2022

Filing Date:

Registration Number:

6679835

Registration Date:

03-22-2022

Goods and Services:

Computer software and downloadable computer software for Information Technology (IT) asset management, namely, cataloging and managing of IT physical and logical business assets and cloud resources; computer software and downloadable computer software for IT risk management, namely, assessing and managing IT risks in context of the business, and presenting risk exposure thereto; computer software and downloadable computer software for IT vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical IT assets through integration into a security tools architecture; computer software and downloadable computer software for IT control management, namely, documenting, assessing, and providing an evidence trail of IT controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure LAN data integration, and organizational enterprise risk management relating to network security, communication security and data security Providing temporary use of non-downloadable software for Information Technology (IT) asset management, namely, cataloging and managing of IT physical and logical business assets and cloud resources; providing temporary use of non-downloadable software for IT risk management, namely, assessing and managing IT risks in context of the business, and presenting risk exposure thereto; providing temporary use of non-downloadable software for IT vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical IT assets through integration into a security tools architecture; providing temporary use of non-downloadable software for IT control management, namely, documenting, assessing, and providing an evidence trail of IT controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure LAN data integration, and organizational enterprise risk management relating to network security, communication security and data security; Software as a service (SAAS) services featuring software for Information Technology (IT) asset management, namely, cataloging and managing of IT physical and logical business assets; Software as a service (SAAS) services featuring software for IT risk management, namely, assessing and managing IT risks in context of the business, and presenting risk exposure thereto; Software as a service (SAAS) services featuring software for IT vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical IT assets through integration into a security tools architecture; Software as a service (SAAS) services featuring software for IT control management, namely, documenting, assessing, and providing an evidence trail of IT controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure LAN data integration, and organizational enterprise risk management relating to network security, communication security and data security

Mark Description:

The mark consists of a set of three stacked curved broken lines next to a mirror image set of three stacked curved broken lines.

Class:

Scientific and technological services

Type of Mark:

Trademark

Published for Opposition Date:

12-04-2018

Mark Drawing Status:

Design Only

Abandon Date:

N/A

Business Name:

MILES & STOCKBRIDGE P.C.

Correspondent Name:

Recent Trademark filings by this company