Breach Point Inc. logo

Breach Point Inc.

3 Marks
Corp.
First Filed:May 23, 2025Latest Filed:May 23, 2025Address:2807 N. Parham Rd, Suite 320, Richmond, VA 23294

Portfolio Overview

Registered
2(67%)
Pending
1(33%)

Top Classes

Class 42
Software, IT Services & Scientific Research
2(67%)
Class 35
Advertising, Business Services & Retail
2(67%)
Class 9
Electronics, Software & Scientific Equipment
1(33%)

TTAB Proceedings

Total Proceedings
1
As Plaintiff
0(0%)
As Defendant
1(100%)

Top Firms

Winthrop & Weinstine, P.A.(May 2025)
3

Trademark Portfolio

3 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
99200236
99200236
Service Mark
Design
REGISTERED
Owner:
Serial:99200236
Filed:May 23, 2025
Classes:35, 42
Registration:8086411
Registered:Dec 30, 2025
Goods & Services
Employment staffing in the field of cybersecurity operations; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity; Computer security threat analysis for protecting data; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software consulting; Computer security consultancy; Computer network security consultancy; Telecommunication network security consultancy; Computer programming consultancy in the field of cybersecurity; Software as a service (SAAS) services featuring software for operating security operations centers (SOC); Software as a service (SAAS) services featuring software for monitoring cyber security systems incidents; Software as a service (SAAS) services featuring software for responding to cyber security systems threats by tracking, analyzing, and managing data; Software as a service (SAAS) services featuring software for providing vulnerability scanning; Software as a service (SAAS) services featuring software for identifying, assessing, and prioritizing vulnerabilities in a system; Software as a service (SAAS) services featuring software for managing and optimizing computer security software for security information and event management (SIEM); Software as a service (SAAS) services featuring software for data protection and recovery; Software as a service (SAAS) services featuring software for email security; Software as a service (SAAS) services featuring software for protecting and securing computer networks and software applications; Software as a service (SAAS) services featuring software for vulnerability scanning of computer software, hardware, and computer networks; Software as a service (SAAS) services featuring software for cybersecurity vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for software vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for hardware vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for network vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for firewall security vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for data security vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for active directory vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for detection and removal of computer viruses and threats; Software as a service (SAAS) services featuring software for encrypting information and authenticating users; Software as a service (SAAS) services featuring software for ensuring the security of electronic mail; Software as a service (SAAS) services featuring software for penetration testing; Software as a service (SAAS) services featuring software for cybersecurity diagnostics; Software as a service (SAAS) services featuring software for data security diagnostics; Software as a service (SAAS) services featuring software for endpoint detection and response (EDR); Software as a service (SAAS) services featuring software for managed detection and response (MDR)
BREACH POINT
BREACH POINT
Service Mark
Word
REGISTERED
Owner:
Serial:99200142
Filed:May 23, 2025
Classes:35, 42
Registration:8086398
Registered:Dec 30, 2025
Goods & Services
Employment staffing in the field of cybersecurity operations; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security threat analysis for protecting data; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software consulting; Computer security consultancy; Computer network security consultancy; Telecommunication network security consultancy; Computer programming consultancy in the field of cybersecurity; Technology consultation in the field of cybersecurity; Software as a service (SAAS) services featuring software for operating security operations centers (SOC); Software as a service (SAAS) services featuring software for monitoring cyber security systems incidents; Software as a service (SAAS) services featuring software for responding to cyber security systems threats by tracking, analyzing, and managing data; Software as a service (SAAS) services featuring software for identifying, assessing, and prioritizing vulnerabilities in a system; Software as a service (SAAS) services featuring software for managing and optimizing computer security software for security information and event management (SIEM); Software as a service (SAAS) services featuring software for data protection and recovery; Software as a service (SAAS) services featuring software for email security; Software as a service (SAAS) services featuring software for protecting and securing computer networks and software applications; Software as a service (SAAS) services featuring software for vulnerability scanning of computer software, hardware, and computer networks; Software as a service (SAAS) services featuring software for cybersecurity vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for software vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for hardware vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for network vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for firewall security vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for data security vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for active directory vulnerability assessments and diagnostics; Software as a service (SAAS) services featuring software for detection and removal of computer viruses and threats; Software as a service (SAAS) services featuring software for encrypting information and authenticating users; Software as a service (SAAS) services featuring software for ensuring the security of electronic mail; Software as a service (SAAS) services featuring software for penetration testing; Software as a service (SAAS) services featuring software for cybersecurity diagnostics; Software as a service (SAAS) services featuring software for data security diagnostics; Software as a service (SAAS) services featuring software for endpoint detection and response (EDR); Software as a service (SAAS) services featuring software for managed detection and response (MDR); Software as a service (SAAS) services featuring software for providing vulnerability scanning
INSIGHT-RECON
INSIGHT-RECON
Trademark
Word
ITU
PENDING
Owner:
Serial:99200201
Filed:May 23, 2025
Classes:9
Goods & Services
Downloadable computer software for protecting and securing computer networks and software applications; Downloadable computer software for vulnerability scanning of computer software, hardware, and computer networks; Downloadable computer software for cybersecurity vulnerability assessments and diagnostics; Downloadable computer software for software vulnerability assessments and diagnostics; Downloadable computer software for hardware vulnerability assessments and diagnostics; Downloadable computer software for network vulnerability assessments and diagnostics; Downloadable computer software for firewall security vulnerability assessments and diagnostics; Downloadable computer software for data security vulnerability assessments and diagnostics; Downloadable computer software for active directory vulnerability assessments and diagnostics; Downloadable computer software for detection and removal of computer viruses and threats; Downloadable computer software for encrypting information and authenticating users; Downloadable computer software for ensuring the security of electronic mail; Downloadable computer software for penetration testing; Downloadable computer software for cybersecurity diagnostics; Downloadable computer software for data security diagnostics; Downloadable computer software for endpoint detection and response (EDR); Downloadable computer software for managed detection and response (MDR)

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.