TrademarkFetch Header Logo

"Send me your thoughts and feature requests - Jacob, Co-Founder of TrademarkFetch"

Trademark

SOAR AS A SERVICE

LIVE

Updated: 30 Jan 2024

Serial Number

88764703

Filed: 18 Jan 2020

Registration Number

7294983

Registered: 30 Jan 2024

Owner

Loading owner data...

Attorney

Loading attorney data...

Share

Class 042

Scientific and technological services, including software development

Stylized Words/Letters

Covers exact words in any format

Description

Computer network security policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultancy; computer security policy assessment; computer security, namely, cybersecurity policy assessment; computer security, namely, data security policy assessment; computer security, namely, firewall security policy assessment; computer security, namely, information technology security policy assessment; computer services, namely, endpoint detection and response of software and hardware threats; computer services, namely, managed detection and response of cyber intrusions and threats; computer support services, namely, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity computer software maintenance services; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; data security computer software maintenance services; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; data security, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; firewall computer software security maintenance services; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security, namely, security threat analysis for protecting data; technical support services, namely, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security, namely, security threat analysis for protecting data; information technology support services, namely, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing temporary use of non- downloadable software for security operations center management; security policy assessment, namely, data security consultancy; software diagnostic services, namely, computer security threat analysis for protecting data; software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability

Trademark Coverage Details

Stylized Words/Letters

Words or letters with a specific styling, font, or arrangement.

Mark Literal Elements: SOAR AS A SERVICE

Standard Character Claim: Yes. The mark consists of standard characters without claim to any particular font style, size, or color.

Mark Drawing Type: 4000 - Stylized Words/Letters

For E-commerce Sellers:

This trademark protects the word(s) in ANY font, style, size, or color. Using these exact words for similar products/services may infringe on this trademark regardless of how you display them.

Classification Information

042

Service Class

Scientific and technological services, including software development

What this class covers:

This class includes software development, scientific research, and IT services. It covers cybersecurity, AI development, and patent research. If a company works with technology or science to innovate, it belongs here. However, business consulting fits under Class 35.

In simple terms: Tech and science services, including software development and R&D

First Use in Commerce

01 Aug 2019

First Use Anywhere

01 Aug 2019

Legal History

Status DateAction Taken
30 Jan 2024NOTICE OF REGISTRATION CONFIRMATION EMAILED
30 Jan 2024REGISTERED-PRINCIPAL REGISTER
23 Dec 2023NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED
22 Dec 2023ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED
12 Dec 2023NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED

Protect your brand like a watchdog 🐕

Join thousands of smart business owners who've marked their territory.

Need help?

Our trademark experts can help you understand this information.

Get Expert Advice

TrademarkFetch

Protect your brand. Mark your territory.

© 2025 TrademarkFetch. All rights reserved. 🐾

Made with love for brand creators
Woof! Need help? Contact us