THREATINTEL - Trademark Details
Status: 602 - Abandoned-Failure To Respond Or Late Response
Image for trademark with serial number 88005190
Serial Number
88005190
Word Mark
THREATINTEL
Status
602 - Abandoned-Failure To Respond Or Late Response
Status Date
2019-05-02
Filing Date
2018-06-18
Mark Drawing
4000 - Standard character mark Typeset
Attorney Name
Law Office Assigned Location Code
L90
Employee Name
SOBRAL, CHRISTINA
Statements
Goods and Services
Hardware and software in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; maintenance of computer software relating to computer security and prevention of computer risks; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; testing of security systems; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments;Education and training in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; maintenance of computer software relating to computer security and prevention of computer risks; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; testing of security systems; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments; Computer services in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; maintenance of computer software relating to computer security and prevention of computer risks; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; testing of security systems; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments; Security services in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; maintenance of computer software relating to computer security and prevention of computer risks; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; testing of security systems; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments
Classification Information
International Class
042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services. - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services.
US Class Codes
100, 101
Class Status Code
6 - Active
Class Status Date
2018-06-23
Primary Code
042
Correspondences
Name
GLENN E. VON TERSCH
Address
Please log in with your Justia account to see this address.
Trademark Events
Event DateEvent Description
2018-06-23NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
2018-10-04ASSIGNED TO EXAMINER
2018-10-04NON-FINAL ACTION WRITTEN
2018-10-04NON-FINAL ACTION E-MAILED
2018-10-04NOTIFICATION OF NON-FINAL ACTION E-MAILED
2019-05-02ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE
2019-05-02ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND
2019-05-08TEAS CHANGE OF CORRESPONDENCE RECEIVED