Legal Representation
Attorney
John E. Ottaviani
Application History
2 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Jul 14, 2025 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
Jul 14, 2025 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Downloadable computer anti-virus software; Downloadable computer software for monitoring and controlling online traffic to computer servers, computer workstations, and mobile computer devices;; Downloadable computer software for computer security, namely, for preventing, detecting, evaluating, protecting, defending , monitoring, blocking, and removing computer viruses and threats; Downloadable computer software for data protection and data security; Downloadable computer software for continuously protecting and monitoring the internal security of devices, navigation, online risks and email and messaging management; Downloadable computer software for devices for computer virus protection and monitoring of computer systems for detecting unauthorized access or data breach; Downloadable computer software for devices for use in the analysis and protection of the security of devices, navigation, network communications, cybersecurity, email management virus protection, email archiving, email continuity, email security and phishing and domain spoofing scams and attacks; Downloadable computer software for computer security, computer network security, data security and Internet security
Class 042
Software as a service (SAAS) services featuring software for computer security, computer network security, data security and Internet security; Software as a service (SAAS) services featuring software for monitoring of network systems, servers and web and database applications and notification of related events and alerts; Providing on-line non-downloadable software for computer security, namely, for preventing, detecting, evaluating, protecting, defending , monitoring, blocking, and removing computer viruses and threats to computer servers, computer workstations, and mobile computer devices; Providing on-line non-downloadable software for monitoring and controlling online traffic to computer servers; Providing on-line non-downloadable software for computer anti-virus and endpoint detection and response (EDR); Providing on-line non-downloadable software for data protection and data security; Providing on-line non-downloadable software for continuously protecting and monitoring the internal security of devices, navigation, online risks and email and messaging management; Providing on-line non-downloadable software for devices for computer virus protection and monitoring of computer systems for detecting unauthorized access or data breach; Providing on-line non-downloadable software for devices for use in the analysis and protection of the security of devices, navigation, network communications, cybersecurity, email management virus protection, email archiving, email continuity, email security and phishing and domain spoofing scams and attacks; Providing on-line non-downloadable software for managing network security, updating firewalls, aggregating and integrating network security intelligence and data, and collecting and reporting on network security data; Providing on-line non-downloadable software for computer security, computer network security, data security and Internet security; Providing on-line non-downloadable software for promoting employee awareness and training employees in the field of workplace cybersecurity; Monitoring of computer systems for detecting unauthorized access or data breach; Technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Remote online backup of computer data; Computer virus protection services; Monitoring of computer systems to detect cybersecurity incidents
Additional Information
Design Mark
The mark consists of a stylized image of a bird, next to the word Cyber in red, over the word Guardian in gray.
Color Claim
The color(s) red, gray, white is/are claimed as a feature of the mark.
Classification
International Classes
009
042