Companies to explore
"Send me your thoughts and feature requests - Jacob, Co-Founder of TrademarkFetch"
Updated: 17 Jan 2023
REGISTRATION Issued and Active
Serial Number
90747363
Filed: 01 Jun 2021
Registration Number
6958661
Registered: 17 Jan 2023
Owner
Attorney
Share
Scientific and technological services, including software development
Covers exact words in any format
Computer services in the fields of computer security, namely, computer security consulting; computer security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity computer diagnostic services; cybersecurity, namely, computer security threat analysis for protecting data; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security computer diagnostic services; data security consulting; endpoint detection and response, namely, monitoring of computer systems to detect intrusions and breakdowns; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; firewall security computer diagnostic services; firewall security services, namely, computer security threat analysis for protecting data; firewall security support services, namely, help desk services; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; information technology security, namely, computer security threat analysis for protecting information technology data; information technology security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes, and scanning hardware; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; managed detection and response, namely, monitoring of computer systems to detect breakdowns and security vulnerabilities; managed security service provider, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; network security services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security policy assessment, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, review and testing of computer hardware security involved in computer networks, review and testing of network hardware security of computer networks; vulnerability assessments, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software security policy assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes
Words or letters with a specific styling, font, or arrangement.
Mark Literal Elements: PROSOC
Standard Character Claim: Yes. The mark consists of standard characters without claim to any particular font style, size, or color.
Mark Drawing Type: 4000 - Stylized Words/Letters
This trademark protects the word(s) in ANY font, style, size, or color. Using these exact words for similar products/services may infringe on this trademark regardless of how you display them.
Classification Information
Service Class
Scientific and technological services, including software development
What this class covers:
This class includes software development, scientific research, and IT services. It covers cybersecurity, AI development, and patent research. If a company works with technology or science to innovate, it belongs here. However, business consulting fits under Class 35.
In simple terms: Tech and science services, including software development and R&D
First Use in Commerce
01 Feb 2013
First Use Anywhere
01 Feb 2013
Status Date | Action Taken |
---|---|
17 Jan 2023 | NOTICE OF REGISTRATION CONFIRMATION EMAILED |
17 Jan 2023 | REGISTERED-PRINCIPAL REGISTER |
10 Dec 2022 | NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED |
09 Dec 2022 | ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED |
28 Nov 2022 | STATEMENT OF USE PROCESSING COMPLETE |
Join thousands of smart business owners who've marked their territory.
© 2025 TrademarkFetch. All rights reserved. 🐾