tm logo
PHISH INSIGHT
Live/Registered
REGISTERED

on 28 Aug 2018

Last Applicant/ Owned by

JR Shinjuku Miraina Tower 20F

Tokyo

JP

160-0022

Serial Number

87418304 filed on 20th Apr 2017

Registration Number

5551737 registered on 28th Aug 2018

in the Principal Register

Correspondent Address

Joi A. White

CARR & FERRELL LLP

411 Borel Avenue, Suite 603

San Mateo,CA 94402

Filing Basis

1. intent to use

2. use application currently

Disclaimer

"PHISH"

PHISH INSIGHT

Software as a service (SAAS) services featuring software and applications for computer, data and network security; providing temporary use of online non-downloadable computer software and applications for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, computer training software, anti-malware software andRead More

Classification Information


Class [042]
Computer & Software Services & Scientific Services


Software as a service (SAAS) services featuring software and applications for computer, data and network security; providing temporary use of online non-downloadable computer software and applications for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; providing temporary use of online non-downloadable computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; software as a service (SAAS) services featuring computer software and applications for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for educating, training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for educating training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; software as a service (SAAS) services featuring computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; providing temporary use of online non-downloadable computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; software as a service (SAAS) services featuring computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities


First Use Date in General

19th May 2017

First Use Date in Commerce

19th May 2017

Mark Details


Serial Number

No 87418304

Mark Type

No Service Mark

Attorney Docket Number

No T-4006 US

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Legal History


Show more

Status DateAction Taken
20th Feb 2024TEAS SECTION 8 & 15 RECEIVED
02th Feb 2024TEAS CHANGE OF OWNER ADDRESS RECEIVED
02th Feb 2024APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED
02th Feb 2024TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
02th Feb 2024ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
02th Feb 2024TEAS CHANGE OF CORRESPONDENCE RECEIVED
28th Aug 2023COURTESY REMINDER - SEC. 8 (6-YR) E-MAILED
29th Aug 2022TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
29th Aug 2022ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
29th Aug 2022TEAS CHANGE OF CORRESPONDENCE RECEIVED