Cyberzero logo

Cyberzero

2 Marks
Company
First Filed:Aug 15, 2025Latest Filed:Sep 4, 2025Address:21 Avonlea Road, Ottawa, ON K2G 0J4

Portfolio Overview

Pending
2(100%)

Top Classes

Class 42
Software, IT Services & Scientific Research
2(100%)

TTAB Proceedings

No litigation activity

Top Firms

Miller IP(Sep 2025)
2

Trademark Portfolio

2 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
QUANTANAUT
QUANTANAUT
Service Mark
Word
ITU
PENDING
Owner:
Serial:99375523
Filed:Sep 4, 2025
Classes:42
Goods & Services
Class 042: Computer security consultancy; Computer virus protection services; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Providing user authentication services using blockchain-based software technology for cryptocurrency transactions; Providing user authentication services using single sign-on technology for cryptographic protocols; Providing user authentication services using multi-factor authentication technology for cryptographic protocols; Providing user authentication services using biometric hardware and software technology for cryptographic protocols; Providing user authentication services using cryptographic protocols for e-commerce transactions; Design and development of computer hardware and software; Software as a service (SAAS) services featuring software for managing cryptographic risk
CYBERZERO
CYBERZERO
Service Mark
Word
PENDING
Owner:
Serial:99340873
Filed:Aug 15, 2025
Classes:42
Goods & Services
Software as a service (SAAS) services featuring software for use in cybersecurity monitoring, threat detection, threat analysis, risk scoring, threat mitigation, and breach remediation; Software as a service (SAAS) services featuring software for cryptographic asset discovery, post-quantum cryptography (PQC) readiness assessment, hybrid cryptography transition planning, and secure algorithm inventory analysis; Software as a service (SAAS) services featuring software for analyzing, categorizing, managing, and visualizing cybersecurity risks and vulnerabilities; Software as a service (SAAS) services featuring software for providing alerts and notifications of cryptographic or cybersecurity threats; Software as a service (SAAS) services featuring software for cyber supply chain risk scoring and third-party vendor integrity assessment; Providing a web site featuring temporary use of non-downloadable software for compliance-aligned assessments based on government and industry cybersecurity frameworks; Computer security consultancy; Consulting services in the field of software as a service (SAAS); Consulting services in the design and implementation of computer-based information systems for businesses; Business technology software consultation services; Technological planning and consulting services in the field of cloud security, cryptography, post-quantum migration, secure architecture, and zero trust implementation; Technical support services, namely, troubleshooting of computer software problems; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Design, maintenance, development and updating of computer software; Design, installation, updating and maintenance of computer software; Computer programming consultancy in the field of software as a service (SaaS), secure system design, and information technology (IT); Software development consulting in the field of software as a service (SaaS), secure system design, and information technology (IT); Software development and product development consulting in the field of software as a service (SaaS), secure system design, and information technology (IT); Technological planning and consulting services in the field of software as a service (SaaS), secure system design, and information technology (IT)

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.