granted
on 29 Mar 2024
Last Applicant/ Owned by
5090 N. 40th Street, Suite 400
Phoenix
AZ
85018
Serial Number
97415987 filed on 18th May 2022
Registration Number
N/A
Filing Basis
1. intent to use
2. intent to use current
Disclaimer
"PROTECTOR"
Software as a service (SAAS) services featuring computer software for controlling, monitoring, and managing user access to computer systems and software; software as a service (SAAS) services featuring computer software for use in providing remote information technology support services; computer services, namely, technical consultation and assistance in the design, selection, implementation and uRead More
Software as a service (SAAS) services featuring computer software for controlling, monitoring, and managing user access to computer systems and software; software as a service (SAAS) services featuring computer software for use in providing remote information technology support services; computer services, namely, technical consultation and assistance in the design, selection, implementation and use of computer networks and computer hardware and software systems for others with respect to implementing privileged access and vulnerability management systems; providing technical information in the field of computer system administration for others; computer security consulting services in the field of privileged access and vulnerability management solutions; computer technology consultation in the field of computer, network, and software application security; Providing temporary use of on-line non-downloadable computer software for management of application software configuration settings; Providing temporary use of on-line non-downloadable computer software programs for use in assisting in security and privilege management for computer operating systems, communication protocols, and software applications; Providing temporary use of on-line non-downloadable computer software programs for use in assisting in systems administration and security of operating systems that support remote access protocols; Providing temporary use of on-line non-downloadable computer software programs for use in assisting in integrating host credentials into directories; Providing temporary use of on-line non-downloadable computer software programs for use in providing access to multiple software applications in different operating systems; Providing temporary use of on-line non-downloadable computer software programs for use in assisting in data leak protection; Providing temporary use of on-line non-downloadable computer software programs for use in assisting in cloud and virtualization monitoring and management; Providing temporary use of on-line non-downloadable computer software for privileged account and vulnerability management in the field of cybersecurity
Computer software, namely, downloadable computer programs and mobile device applications for use in controlling, monitoring, and managing user access to computer systems and software; computer software, namely, downloadable computer programs and mobile device applications for use in providing remote information technology support services; Downloadable computer software programs and computer hardware for use in assisting in security and privilege management for computer operating systems, communication protocols, and software applications; Downloadable computer software programs for use in assisting in systems administration and security of operating systems that support remote access protocols; Downloadable computer software programs for use in assisting in integrating host credentials into directories; Downloadable computer software programs for use in providing access to multiple software applications in different operating systems; Downloadable computer software programs for use in assisting in data leak protection; Downloadable computer software programs for use in assisting in cloud and virtualization monitoring and management; Downloadable computer software for management of application software configuration settings; Downloadable computer software for privileged account and vulnerability management in the field of cybersecurity; Downloadable computer software for management of computer and network systems and security, analytics and reporting of computer and network security, and computer hardware and software asset discovery and profiling in the fields of security and privilege management in cybersecurity
No 97415987
No Service Mark
No BEY-614
No
No
No
No
No
No
No
No
Status Date | Action Taken |
---|---|
30th Mar 2024 | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED |
29th Mar 2024 | SOU TEAS EXTENSION RECEIVED |
29th Mar 2024 | SOU EXTENSION 1 FILED |
29th Mar 2024 | SOU EXTENSION 1 GRANTED |
03rd Oct 2023 | NOA E-MAILED - SOU REQUIRED FROM APPLICANT |
08th Aug 2023 | PUBLISHED FOR OPPOSITION |
08th Aug 2023 | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
19th Jul 2023 | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
05th Jul 2023 | APPROVED FOR PUB - PRINCIPAL REGISTER |
10th May 2023 | TEAS/EMAIL CORRESPONDENCE ENTERED |