CYNETICS Trademark Information

Cynetics LLC

computer services, namely, binary analysis services for computer security purposes and cyber security purposes; computer consulting services, namely, planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, ; technology consultation services in the field of cyber security, namely, identificat...

Words that describe this mark

services       binary   analysis   services   security   purposes   cyber   security   purposes   consulting   services       planning   design   network   architectures   technical   consulting   services   field   cyber   security    

This is a brand page for the CYNETICS trademark by Cynetics LLC  in Woodbridge, VA, 22191.

Write a review about a product or service associated with this CYNETICS trademark. Or, contact the owner Cynetics LLC of the CYNETICS trademark by filing a request to communicate with the Legal Correspondent for licensing, use, and/or questions related to the CYNETICS trademark.

Status Update! On Tuesday, November 15, 2016, status on the CYNETICS trademark changed to PUBLISHED FOR OPPOSITION.

On Friday, June 24, 2016, a U.S. federal trademark registration was filed for CYNETICS by Cynetics LLC, Woodbridge, VA 22191. The USPTO has given the CYNETICS trademark serial number of 87083215. The current federal status of this trademark filing is PUBLISHED FOR OPPOSITION. The correspondent listed for CYNETICS is . The CYNETICS trademark is filed in the category of Computer & Software Services & Scientific Services . The description provided to the USPTO for CYNETICS is computer services, namely, binary analysis services for computer security purposes and cyber security purposes; computer consulting services, namely, planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, ; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; computer consulting services, namely, implementation and integration of information technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, computer consultation services regarding desired performance levels and reasons for optimization, evaluating the health of computer systems, providing upgrades to computer systems, updating software, applying patches, and changing configurations; computer technical support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, electronic collection and analysis of real-time network information to manage and respond to security vulnerabilities and external threats; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; computer cloud security advisory services, namely, software consultation regarding cloud storage, cloud collaboration software platforms, and cloud hosted enterprise software applications; information technology vulnerability assessment services, namely, computer testing for assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; computer consultation, namely, information technology system security breach investigation and remediation services in the nature of providing assistance to isolate and remediate security threats and security breaches in computer systems and networks, in information technology applications, and in computer software and hardware; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technology consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud computing security; testing of computer software and computer networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; computer services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices.

Word mark: CYNETICS
Status/Status Date:
PUBLISHED FOR OPPOSITION
11/15/2016
Serial Number: 87083215
Filing Date: 6/24/2016
Foreign Filing Deadline: Saturday, December 24, 2016
 
Registration Number: NOT AVAILABLE
Registration Date: NOT AVAILABLE
Goods and Services: computer services, namely, binary analysis services for computer security purposes and cyber security purposes; computer consulting services, namely, planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, ; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; computer consulting services, namely, implementation and integration of information technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, computer consultation services regarding desired performance levels and reasons for optimization, evaluating the health of computer systems, providing upgrades to computer systems, updating software, applying patches, and changing configurations; computer technical support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, electronic collection and analysis of real-time network information to manage and respond to security vulnerabilities and external threats; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; computer cloud security advisory services, namely, software consultation regarding cloud storage, cloud collaboration software platforms, and cloud hosted enterprise software applications; information technology vulnerability assessment services, namely, computer testing for assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; computer consultation, namely, information technology system security breach investigation and remediation services in the nature of providing assistance to isolate and remediate security threats and security breaches in computer systems and networks, in information technology applications, and in computer software and hardware; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technology consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud computing security; testing of computer software and computer networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; computer services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices
Mark Description: NOT AVAILABLE
Type Of Mark: Service Mark
Published For Opposition Date: 11/15/2016
Last Applicant/Owner: Cynetics LLC
Woodbridge, VA 22191
Mark Drawing Code: Standard Character Mark
Design Search: (NO DATA)
Register Type: Principal
Disclaimer: (NOT AVAILABLE)
Correspondent:

Use in Commerce Trademark - Applicant has provided proof of use of this mark in commerce to USPTO.

Trademarkia is the largest search engine for U.S. trademarks. Each month hundreds of trademarks around the world are filed by licensed attorneys in the LegalForce/Trademarkia network! You can register your trademark in 170+ countries in the world through LegalForce Network.

LegalForce Network can help you incorporate a business around your CYNETICS trademark in less than 5 minutes. Trademarkia makes the process easy and convenient, so start now!

Trademarkia.com is a free search engine of publicly available government records. Trademarkia.com is not a law firm and does not represent owners & correspondents listed on this page.

Trademark Document Retrieval >>

100% Satisfaction Guarantee protect your valuable brand now.

  • 1. Legalforce RAPC - #1 U.S. Trademark Filing since 2010.
  • 2. Describe how your business or product is being used. Register your mark in 176+ countries. Just $199 + govt fees! Start here >>
  • 1. Top Global IP Attorneys - Credibility and Experience!
  • 2. All processes will be performed in a timely manner. You will be informed periodically about the process.

What our customers say:

testimonial

I wasn't too sure what to expect when taking up services, but the professionalism from the site to the customer service is the slickest I have ever experienced.

Camryn, Surrey, UK
Current Trademark Status:
11/15/2016
PUBLISHED FOR OPPOSITION
Free Trademark Search:
Current Overall Rating:
RatingRatingRatingRatingRating (0 review)
What You Can Do:
Keep Track of this Brand.

Trademark Watch Services

Keep track of how your trademark is being used. Available in the United States and in more than 176 countries. Round-the-clock monitoring. Monthly report on potential infringement.

Trademark Watch Services read more...
Trademarkia lets you see how your personal name, product name, trademark name or username is being used on any of 530+ new and popular social networks. Be the first to reserve your name and get help stopping others from using it - all in one place!