tm logo
ZEGURO CYBER SAFE
Dead/Abandoned
ABANDONED - NO STATEMENT OF USE FILED

no statement of use filed

on 30 Aug 2021

Last Applicant/ Owned by

101A Clay St #280

San Francisco

CA

94111

Serial Number

88183269 filed on 06th Nov 2018

Registration Number

N/A

Correspondent Address

Beth M. Goldman

ORRICK, HERRINGTON & SUTCLIFFE LLP

IP Prosecution Department

2050 Main Street, Suite 1100

IRVINE CA 92614-8255

Filing Basis

1. intent to use

2. intent to use current

Disclaimer

"CYBER SAFE"

ZEGURO CYBER SAFE

"CYBER SAFE" Computer security consultancy; information technology consultation; computer security consultation in the field of assessing, correcting, defending and managing cyber security; information technology consulting in the field of cyber security solutions; information technology consulting in the field of compliance with data privacy and data security regulations; technology consultationRead More

Classification Information


Class [042]
Computer & Software Services & Scientific Services


Computer security consultancy; information technology consultation; computer security consultation in the field of assessing, correcting, defending and managing cyber security; information technology consulting in the field of cyber security solutions; information technology consulting in the field of compliance with data privacy and data security regulations; technology consultation in the field of cyber security and cyber risk assessment; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess security vulnerabilities; cybersecurity assessment services, namely, computer security threat analysis for protecting data security, data privacy and managing cybersecurity regulations and standards; providing temporary use of non-downloadable cyber security software to reduce risk of cyber threats; providing temporary use of non-downloadable software for cyber security and cyber risk assessment; providing temporary use of non-downloadable cyber security software to detect and mitigate against cyber risks, threats and vulnerabilities; providing temporary use of non-downloadable cyber security software for preventing penetration by unauthorized computers and networks; providing temporary use of non-downloadable software for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; providing temporary use of non-downloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing customizable training modules to software users who demonstrate susceptibility to malicious electronic mail; providing temporary use of non-downloadable software for cybersecurity training and reporting purposes that replicates real-world cyber-attacks to enable employees and others how to identify, report, and avoid cybersecurity threats; providing temporary use of non-downloadable software for use in analyzing and measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; providing temporary use of non-downloadable software for use in monitoring and tracking compliance with laws and regulations in the fields of data privacy and data security; providing temporary use of non-downloadable software for cybersecurity training; design, development, and implementation of software in the fields of cyber security and information assurance; software development and product development consulting in the field of cyber security and cyber risk assessment; design, development and implementation of strategies to address cyber risk exposure, namely, continuous cyber risk monitoring, targeted employee training, automated web vulnerability testing, cybersecurity regulation and standards tracking and management, cybersecurity compliance and control tracking, application security management and monitoring, and cloud application security monitoring; conducting computer security threat assessments of information technology IT security policies and procedures for protecting data; providing a website featuring information on cyber risk management and computer security

Mark Details


Serial Number

No 88183269

Mark Type

No Service Mark

Attorney Docket Number

No 34976-6001

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Legal History


Show more

Status DateAction Taken
30th Aug 2021ABANDONMENT - NO USE STATEMENT FILED
30th Aug 2021ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED
09th Jan 2021NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
07th Jan 2021EXTENSION 3 FILED
07th Jan 2021EXTENSION 3 GRANTED
07th Jan 2021TEAS EXTENSION RECEIVED
31st Jul 2020NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
29th Jul 2020EXTENSION 2 FILED
29th Jul 2020TEAS EXTENSION RECEIVED
29th Jul 2020EXTENSION 2 GRANTED