TrademarkFetch Header Logo

"Send me your thoughts and feature requests - Jacob, Co-Founder of TrademarkFetch"

Trademark

PROSOC

LIVE

Updated: 17 Jan 2023

Serial Number

90747363

Filed: 01 Jun 2021

Registration Number

6958661

Registered: 17 Jan 2023

Owner

Loading owner data...

Attorney

Loading attorney data...

Share

Class 042

Scientific and technological services, including software development

Stylized Words/Letters

Covers exact words in any format

Description

Computer services in the fields of computer security, namely, computer security consulting; computer security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity computer diagnostic services; cybersecurity, namely, computer security threat analysis for protecting data; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security computer diagnostic services; data security consulting; endpoint detection and response, namely, monitoring of computer systems to detect intrusions and breakdowns; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; firewall security computer diagnostic services; firewall security services, namely, computer security threat analysis for protecting data; firewall security support services, namely, help desk services; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; information technology security, namely, computer security threat analysis for protecting information technology data; information technology security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes, and scanning hardware; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; managed detection and response, namely, monitoring of computer systems to detect breakdowns and security vulnerabilities; managed security service provider, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; network security services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security policy assessment, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, review and testing of computer hardware security involved in computer networks, review and testing of network hardware security of computer networks; vulnerability assessments, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software security policy assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes

Trademark Coverage Details

Stylized Words/Letters

Words or letters with a specific styling, font, or arrangement.

Mark Literal Elements: PROSOC

Standard Character Claim: Yes. The mark consists of standard characters without claim to any particular font style, size, or color.

Mark Drawing Type: 4000 - Stylized Words/Letters

For E-commerce Sellers:

This trademark protects the word(s) in ANY font, style, size, or color. Using these exact words for similar products/services may infringe on this trademark regardless of how you display them.

Classification Information

042

Service Class

Scientific and technological services, including software development

What this class covers:

This class includes software development, scientific research, and IT services. It covers cybersecurity, AI development, and patent research. If a company works with technology or science to innovate, it belongs here. However, business consulting fits under Class 35.

In simple terms: Tech and science services, including software development and R&D

First Use in Commerce

01 Feb 2013

First Use Anywhere

01 Feb 2013

Legal History

Status DateAction Taken
17 Jan 2023NOTICE OF REGISTRATION CONFIRMATION EMAILED
17 Jan 2023REGISTERED-PRINCIPAL REGISTER
10 Dec 2022NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED
09 Dec 2022ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED
28 Nov 2022STATEMENT OF USE PROCESSING COMPLETE

Protect your brand like a watchdog 🐕

Join thousands of smart business owners who've marked their territory.

Need help?

Our trademark experts can help you understand this information.

Get Expert Advice

TrademarkFetch

Protect your brand. Mark your territory.

© 2025 TrademarkFetch. All rights reserved. 🐾

Made with love for brand creators
Woof! Need help? Contact us