SYTECA

Serial Number 98768573
688

Registration Progress

Application Filed
Sep 25, 2024
Under Examination
Sep 30, 2025
Approved for Publication
Aug 5, 2025
Published for Opposition
Aug 5, 2025
Registered

Trademark Image

SYTECA

Basic Information

Serial Number
98768573
Filing Date
September 25, 2024
Published for Opposition
August 5, 2025
Drawing Code
3

Status Summary

Current Status
Active
Status Code
688
Status Date
Sep 30, 2025
Application
Pending
Classes
009 042

Rights Holder

Syteca, Inc.

03
Address
60 Kendrick St., Suite 201
Needham, MA 02494

Ownership History

Syteca, Inc.

Original Applicant
03
Needham, MA

Syteca, Inc.

Owner at Publication
03
Needham, MA

Legal Representation

Attorney
Preetha Chakrabarti

USPTO Deadlines

All Deadlines Cleared

All 4 deadline(s) have been cleared by subsequent events. No active deadlines at this time.

Application History

16 events
Date Code Type Description Documents
Oct 24, 2025 EISU I TEAS STATEMENT OF USE RECEIVED Loading...
Sep 30, 2025 NOAM E NOA E-MAILED - SOU REQUIRED FROM APPLICANT Loading...
Aug 5, 2025 NPUB E OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED Loading...
Aug 5, 2025 PUBO A PUBLISHED FOR OPPOSITION Loading...
Jul 30, 2025 NONP E NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED Loading...
Jul 1, 2025 CNSA P APPROVED FOR PUB - PRINCIPAL REGISTER Loading...
Jun 27, 2025 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Jun 27, 2025 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Jun 27, 2025 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED Loading...
Apr 1, 2025 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED Loading...
Apr 1, 2025 GNRT F NON-FINAL ACTION E-MAILED Loading...
Apr 1, 2025 CNRT R NON-FINAL ACTION WRITTEN Loading...
Apr 1, 2025 DOCK D ASSIGNED TO EXAMINER Loading...
Mar 31, 2025 MDSC E NOTICE OF DESIGN SEARCH CODE E-MAILED Loading...
Mar 31, 2025 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Loading...
Sep 25, 2024 NWAP I NEW APPLICATION ENTERED Loading...

Detailed Classifications

Class 009
Downloadable software for use as a tool to monitor computer system servers and workstations by monitoring, detecting and analyzing computer systems for user-based insider threats to data, and monitoring the computer systems of third-party contractors and of other business partners for cyber security threats to data; Downloadable software for use in auditing of computer systems for cyber security threats; Downloadable software for regulatory compliance of computer systems and computer systems audits; Downloadable software used for simple and integrated video format reporting for live cyber incident response; Downloadable software for conducting multi-factor searches for cyber security threats to computer systems and for generating the corresponding reports; Downloadable software with incident response tools, namely, downloadable software for investigating data leakage from computer systems by monitoring user endpoints for suspicious activity, alerting administrators, and auditing user activity; Downloadable software for managing user software licenses featuring affordable floating licensing subscriptions; Downloadable software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; Downloadable software for configuring manual approval during login, enforcing endpoint access restrictions, and ensuring that only authorized users can access critical systems; Downloadable software to manage and monitor privileged accounts and their access to systems and data within a network; Downloadable software for managing credentials, passwords, and privileged data, to ensure secure access to databases, operating systems, and web-based IT resources; Downloadable software for controlling remote access to privileged accounts with real-time monitoring and session recording, to ensure compliance and security; Downloadable software for implementing multi-factor authentication used to verify and manage privileged user identities; Downloadable software used for integrating with directory services for the centralized management of privileged accounts across on-premises and cloud environments; Downloadable software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; Downloadable software for real-time monitoring and threat detection of privileged account activities, with automated response capabilities for security incidents; Downloadable software for integration with third-party applications and cloud services, used to allow seamless integration with ticketing systems, Security Information and Event Management (SIEM) tools and IT management systems; Downloadable software for enforcing identity policies across diverse IT environments and ensuring authorized access to sensitive data and systems; Downloadable software for securely storing and managing individual user credentials in a personal password vault
Class 042
Development and implementation of software solutions for universal and network protocol diagnostic monitoring; Monitoring of computer systems for detecting and analyzing user-based insider threats to data; Monitoring of third-party contractors and other business partners computer systems for cyber security threats to data; Development of customized software for others for use in regulatory compliance and in auditing of computer systems for cyber security threats; Providing temporary use of on-line non-downloadable software tools used for simple and integrated video format reporting for live cyber incident response; Providing temporary use of non-downloadable software for conducting a multi-factor search of computer systems cyber threats and generating corresponding reports; Development of customized software for others for user software license management featuring affordable floating licensing subscriptions; Providing temporary use of non-downloadable cloud-based software as tools for monitoring insider computer security; Software as a service (SaaS) services featuring software for monitoring user activity on computer systems and computer servers; Software as a service (SaaS) services featuring software for privileged access management used to manage and monitor privileged accounts and their access to systems and data within a network; Software as a service (SaaS) services featuring software used for managing credentials, passwords, and privileged data, and for ensuring secure access to databases, operating systems, and web-based IT resources; Software as a service (SaaS) services featuring software for controlling remote access to privileged accounts, equipped with real-time monitoring and session recording to ensure compliance and security; Software as a service (SaaS) services featuring software for implementing multi-factor authentication used to verify and manage privileged user identities, equipped with dynamic privilege adjustment based on risk; Software as a service (SaaS) services featuring software for integrating with directory services for centralized management of privileged accounts across on-premises and cloud environments and for providing unified audit trails and reporting; Software as a service (SaaS) services featuring software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; Software as a service (SaaS) services featuring software for real-time monitoring and threat detection of privileged account activities, equipped with automated response capabilities for security incidents; Software as a service (SaaS) services featuring software for enforcing identity policies across diverse IT environments, and for ensuring authorized access to sensitive data and systems; Software as a service (SaaS) services featuring software for securely storing and managing individual user credentials in a personal password vault, and for ensuring compliance with security policies; Software as a service (SaaS) services featuring software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; Software as a service (SaaS) services featuring software for configuring manual approval during login and for enforcing endpoint access restrictions to ensure that only authorized users can access critical systems; Software as a service (SaaS) services featuring software for session recording and for playback used to enable administrators to review user actions on endpoints for compliance audits and security investigations; Software as a service (SaaS) services featuring software for integration with third-party applications and cloud services to allow for seamless integration with ticketing systems, Security Information and Event Management (SIEM) tools and IT management systems; Software as a service (SaaS) services featuring software used for endpoint activity monitoring, providing detailed reports on application usage, and web browsing to support productivity and security analysis; Software as a service (SaaS) services featuring software for automating policy enforcement across user sessions and ensuring consistent application of security controls across all managed endpoints; Software as a service (SaaS) services featuring software for the centralized management of privileged user sessions, used for role-based access control and user session termination

Additional Information

Design Mark
The mark consists of a shaded broken circle caused by two intersecting lines forming an arrow pointing to the right creating the appearance of a pie with a slice cut out, shown to the left of the term "Syteca".
Color Claim
Color is not claimed as a feature of the mark.

Classification

International Classes
009 042