GleanMark is free for all of AprilGet free access
Cyber Safe Solutions LLC logo

Cyber Safe Solutions LLC

4 Marks
LLC
First Filed:Oct 13, 2015Latest Filed:Aug 12, 2021Address:68 S. Service Rd., Suite 301, Melville, NY 11747

Portfolio Overview

Registered
4(100%)

Top Classes

Class 35
Advertising, Business Services & Retail
4(100%)
Class 45
Personal services
3(75%)
Class 42
Software, IT Services & Scientific Research
3(75%)

TTAB Proceedings

No litigation activity

Top Firms

Carter, Deluca, & Farrell, L...(Aug 2021)
4

Trademark Portfolio

4 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
SOL
SOL
Service Mark
Word
REGISTERED
Owner:
Serial:90878888
Filed:Aug 12, 2021
Classes:35
Registration:6910241
Registered:Nov 29, 2022
Goods & Services
Business data analysis services in the field of cybersecurity | educational services, namely, providing classes, workshops, seminars, in the fields of cybersecurity, prevention of computer threats, security, and hackers | Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, namely, providing active and passive network scanning, asset inventory, host-based software inventory, vulnerability assessment testing and remediation verification for others; Computer security service, namely, cybersecurity services in the nature of restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer forensic services; Monitoring of computer systems for cybersecurity purposes in the nature of network security monitoring, continuous cybersecurity monitoring, detection, rapid response and mitigation of the network threats and threat detection of network and host systems, behavioral monitoring of network systems and collection of data for tracking any network security threats; Cybersecurity services in the nature of restricting unauthorized access to computer systems through the monitoring of electronic files for integrity and vulnerability, namely, monitoring Internet activity to prevent illegal file sharing and providing electronic reports to others regarding attempts at illegal file sharing in connection therewith
86787217
86787217
Service Mark
Design
REGISTERED
Owner:
Serial:86787217
Filed:Oct 14, 2015
Classes:35, 42, 45
Registration:4987631
Registered:Jun 28, 2016
Goods & Services
Business data analysis services in the field of cybersecurity; Monitoring of computer systems for security purposes in the nature of network security monitoring, continuous security monitoring, detection, rapid response and mitigation of the network threats and threat detection of network and host systems, behavioral monitoring of network systems and collection of data for tracking any network security threats; Monitoring of files for integrity and vulnerability, namely, monitoring Internet activity to prevent illegal file sharing and providing electronic reports to others regarding attempts at illegal file sharing in connection therewith; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, namely, providing active and passive network scanning, asset inventory, host-based software inventory, vulnerability assessment testing and remediation verification for others; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer forensic services
CYBERSAFE SOLUTIONS
CYBERSAFE SOLUTIONS
Service Mark
Word
REGISTERED
Owner:
Serial:86786729
Filed:Oct 13, 2015
Classes:35, 42, 45
Registration:4987597
Registered:Jun 28, 2016
Goods & Services
Business data analysis services in the field of cybersecurity; Monitoring of computer systems for security purposes in the nature of network security monitoring, continuous security monitoring, detection, rapid response and mitigation of the network threats and threat detection of network and host systems, behavioral monitoring of network systems and collection of data for tracking any network security threats; Monitoring of files for integrity and vulnerability, namely, monitoring Internet activity to prevent illegal file sharing and providing electronic reports to others regarding attempts at illegal file sharing in connection therewith; "SOLUTIONS"; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, namely, providing active and passive network scanning, asset inventory, host-based software inventory, vulnerability assessment testing and remediation verification for others; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer forensic services
IF YOU CAN'T SEE IT, YOU CAN'T DEFEND AGAINST IT
Owner:
Serial:86785886
Filed:Oct 13, 2015
Classes:35, 42, 45
Registration:5025505
Registered:Aug 23, 2016
Goods & Services
Business data analysis services in the field of cybersecurity | Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, namely, providing active and passive network scanning, asset inventory, host-based software inventory, vulnerability assessment testing and remediation verification for others; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer forensic services | Monitoring of computer systems for security purposes in the nature of network security monitoring, continuous security monitoring, detection, rapid response and mitigation of the network threats and threat detection of network and host systems, behavioral monitoring of network systems and collection of data for tracking any network security threats; Monitoring of files for integrity and vulnerability, namely, monitoring Internet activity to prevent illegal file sharing and providing electronic reports to others regarding attempts at illegal file sharing in connection therewith