CyberSheath Services International, LLC logo

CyberSheath Services International, LLC

5 Marks
LLC
First Filed:Dec 26, 2012Latest Filed:Mar 24, 2024Address:11710 Plaza America Drive, Reston, VA 20190

Portfolio Overview

Registered
3(60%)
Pending
1(20%)
Dead
1(20%)

Top Classes

Class 37
Construction and Repair
3(60%)
Class 41
Education and Entertainment
3(60%)
Class 42
Software, IT Services & Scientific Research
2(40%)

TTAB Proceedings

No litigation activity

Top Firms

Lambert Shortell & Connaught...(Mar 2024)
5

Trademark Portfolio

5 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
AIM FOR COMPLIANCE
AIM FOR COMPLIANCE
Service Mark
Word
ITU
PENDING
Owner:
Serial:98465017
Filed:Mar 24, 2024
Classes:37, 42
Goods & Services
Computer consultation, namely, consulting regarding the repair of computer hardware; consulting in the field of information technology relating to installation, maintenance, and updating of computer hardware; technological consulting servicesrelating to installation, maintenance, and updating of computer hardware; information technology consulting services relating to installation, maintenance, and updating of computer hardware; IT consulting services relating to installation, maintenance, and updating of computer hardware; technological consultation relating to installation, maintenance, and updating of computer hardware in the technology field of information security; Computer technology consultation; Computer technology consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software consultancy; Computer software consulting; Consultancy in the field of software design; Consulting in the field of engineering; Consulting in the field of information technology relating to installation, maintenance, and updating of computer software; Consulting in the field of IT project management; Consulting in the field of telecommunications technology; Consulting in the fields of engineering and architecture; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of collection of evidence for forensic purposes; Technological consulting services in the nature of consultation concerning the installation, maintenance, and updating of computer software in the field of computer-based information systems for businesses; Consulting services in the field of design and development of engineering processes; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of software as a service (SAAS); Consulting services in the fields of forensic science; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Design and development of electronic data security systems; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Information technology consulting servicesrelating to installation, maintenance, and updating of computer software; IT consulting servicesrelating to installation, maintenance, and updating of computer software; Product research in the field of products utilizing computer intelligence and security technologies; Technical advice relating to operation of computers; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technological consultationrelating to installation, maintenance, and updating of computer software in the technology field of information security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks; Consulting in the field of configuration management for computer hardware and software; Providing a secured-access website that gives registered Internet networked institutions the ability to upload, view, copy, print, download and share documents and images for the purposes of conducting consumerdriven transactions; Computer security consultancy in the field of maintaining the security and integrity of databases from unauthorized electronic access
FEDERAL ENCLAVE
FEDERAL ENCLAVE
Service Mark
Word
REGISTERED
Owner:
Serial:97257252
Filed:Feb 8, 2022
Classes:41
Registration:7306986
Registered:Feb 13, 2024
Goods & Services
Business training consultancy services | Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software consultancy; Computer software consulting; Computer technology consultancy; Computer technology consultancy in the field of computer security; Consultancy in the field of software design; Consulting in the field of configuration management for computer hardware and software; Consulting in the field of engineering; Consulting in the field of information technology; Consulting in the field of IT project management; Consulting in the field of telecommunications technology; Consulting in the fields of engineering and architecture; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of collection of evidence for forensic purposes; Consulting services in the field of design and development of engineering processes; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of software as a service (SAAS); Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Design and development of electronic data security systems; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Information technology consulting services; Providing a secured-access website that gives registered Internet networked institutions the ability to upload, view, copy, print, download and share documents and images for the purposes of conducting consumer-driven transactions; Research and development of technology in the field of products utilizing computer intelligence and security technologies; Technical advice relating to operation of computers; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technological consultation in the technology field of information security; Technological planning and consulting services in the field of computer-based information systems for businesses; Technological planning and consulting services in the field of maintaining the security and integrity of databases from unauthorized electronic access; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks
AIM FOR COMPLIANCE
AIM FOR COMPLIANCE
Service Mark
Word
ABANDONED
Owner:
Serial:90075497
Filed:Jul 27, 2020
Classes:37
MEASURE ONCE, COMPLY MANY
REGISTERED
Owner:
Serial:88006352
Filed:Jun 19, 2018
Classes:37, 41, 42
Registration:5915876
Registered:Nov 19, 2019
Goods & Services
Computer consultation, namely, consulting regarding the repair of computer hardware | Business training consultancy services | Computer technology consultation; Computer technology consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software consultancy; Computer software consulting; Consultancy in the field of software design; Consulting in the field of engineering; Consulting in the field of information technology; Consulting in the field of IT project management; Consulting in the field of telecommunications technology; Consulting in the fields of engineering and architecture; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of collection of evidence for forensic purposes; Technological consulting services in the field of computer-based information systems for businesses; Consulting services in the field of design and development of engineering processes; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of software as a service (SAAS); Consulting services in the fields of forensic science; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Design and development of electronic data security systems; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Information technology consulting services; IT consulting services; Research in the field of products utilizing computer intelligence and security technologies; Technical advice relating to operation of computers; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technological consultation in the technology field of information security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks; Consulting in the field of configuration management for computer hardware and software; Providing a secured-access website that gives registered Internet networked institutions the ability to upload, view, copy, print, download and share documents and images for the purposes of conducting consumer-driven transactions; Consulting services in the field of maintaining the security and integrity of databases from unauthorized electronic access
CYBERSHEATH
CYBERSHEATH
Service Mark
Word
REGISTERED
Owner:
Serial:85810426
Filed:Dec 26, 2012
Classes:41
Registration:4482390
Registered:Feb 11, 2014
Goods & Services
Business training consultancy services | Computer consultation; Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software consultancy; Computer software consulting; Consultancy in the field of software design; Consulting in the field of engineering; Consulting in the field of information technology; Consulting in the field of IT project management; Consulting in the field of telecommunications technology; Consulting in the fields of engineering and architecture; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of collection of evidence for forensic purposes; Consulting services in the field of computer-based information systems for businesses; Consulting services in the field of design and development of engineering processes; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of software as a service (SAAS); Consulting services in the fields of forensic science; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Design and development of electronic data security systems; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Information technology consulting services; IT consulting services; Research in the field of intelligence and security technology; Technical advice relating to operation of computers; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technological consultation in the technology field of information security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks; Consulting in the field of configuration management for computer hardware and software; Providing a secured-access website that gives registered Internet networked institutions the ability to upload, view, copy, print, download and share documents and images for the purposes of conducting consumer-driven transactions | Consultation in the field of data theft and identity theft; Consultation services concerning homeland safety and security issues; Consulting services in the field of counter-terrorism; Consulting services in the field of homeland security; Consulting services in the field of maintaining the security and integrity of databases; Consulting services in the field of national security; Consulting services in the field of public safety; Consulting services in the field of state and federal regulatory compliance requirements for personnel safety; Monitoring of computer systems for security purposes; Monitoring of security systems; Monitoring of security systems used in electronic tracking for use in connection with homeland security; Providing information concerning homeland safety and security issues; Regulatory compliance consulting in the field of information security; Security consultancy; Security services, namely, providing security assessments for businesses and governmental agencies; Security services, namely, threat simulation vulnerability analysis and mitigation and emergency and crisis response; Security threat analysis for personal protection purposes

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.