Companies to explore
"Send me your thoughts and feature requests - Jacob, Co-Founder of TrademarkFetch"
Updated: 08 Mar 2024
APPLICATION/Awaiting Examination
Serial Number
98440124
Filed: 08 Mar 2024
Owner
Attorney
Share
Scientific and technological services, including software development
Covers exact words in any format
Network penetration testing, namely, simulating real-world network attack to find and exploit security vulnerabilities within an internal and external network environment; application penetration testing, namely, simulating real-world attack on applications to find and exploit security vulnerabilities within the web applications, mobile applications, and API's; vulnerability classification, namely, classifying technical and compliance vulnerabilities based on scoring systems to understand the exposure of an organization; cloud penetration testing, namely, simulating real-world attack on a cloud environment to find and exploit security vulnerabilities within the internal and external cloud footprint; continuous penetration testing, namely, providing organizations with a consistent feed of new and emerging attack simulations throughout a period of time to provide to consistently find new threats associated with the clients technology environment; Providing software as a service (SaaS) services featuring software for cybersecurity monitoring and control of activities on a computer, antivirus scanning, computer virus characterization, remediation, and elimination, simulating large-scale processes in the field of enterprise cybersecurity, providing large-scale graph-based database services used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, providing malware incident forensics services, providing malware incident remediation services, providing rules-based decision support services in the field of enterprise cybersecurity, providing neural networks for use in analytics and planning in the field of enterprise cybersecurity, providing temporal event capture, analysis, and management services in the field of enterprise cybersecurity, providing risk quantification, mitigation, and management services in the field of enterprise cybersecurity, providing cyber decision platform services in the field of enterprise cybersecurity; providing services for identifying actions in the nature of incident assessment, response, and remediation needed to optimize prevention and handling of cybersecurity incidents, and providing business analytics functionality for the purpose of data-driven decision making and predictive analytics in the field of enterprise cybersecurity; providing professional consulting services pertaining to the deployment, configuration and optimization of software delivered from the cloud or deployed locally, namely, software for cybersecurity monitoring and control of activities on a computer, antivirus software, simulation software used in the field of enterprise cybersecurity, graph-based database software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, kernel-level software for preventing actions by malware, malware incident forensics software, malware incident remediation software, rules-based decision support software used in the field of enterprise cybersecurity, neural network software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, temporal event capture, management, and analysis software used in the field of enterprise cybersecurity, risk quantification, mitigation, and management software, cyber decision platform software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, software for identifying actions in the nature of incident assessment, response, and remediation needed to optimize prevention and handling of cybersecurity incidents in the field of enterprise cybersecurity, and business analytics software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity
Words or letters with a specific styling, font, or arrangement.
Mark Literal Elements: ADAPTIVEIQ
Standard Character Claim: Yes. The mark consists of standard characters without claim to any particular font style, size, or color.
Mark Drawing Type: 4000 - Stylized Words/Letters
This trademark protects the word(s) in ANY font, style, size, or color. Using these exact words for similar products/services may infringe on this trademark regardless of how you display them.
Classification Information
Service Class
Scientific and technological services, including software development
What this class covers:
This class includes software development, scientific research, and IT services. It covers cybersecurity, AI development, and patent research. If a company works with technology or science to innovate, it belongs here. However, business consulting fits under Class 35.
In simple terms: Tech and science services, including software development and R&D
First Use in Commerce
0
First Use Anywhere
0
Status Date | Action Taken |
---|---|
08 Mar 2024 | NEW APPLICATION ENTERED |
Join thousands of smart business owners who've marked their territory.
© 2025 TrademarkFetch. All rights reserved. 🐾