Field Effect Software Inc.
13 Marks
Corp.
First Filed:May 12, 2017Latest Filed:Nov 3, 2025Address:207-825 Exhibition Way, Ottawa, ON K1S 5J3, CA
Portfolio Overview
Registered
4(31%)Pending
7(54%)Dead
2(15%)Top Classes
Class 42
Software, IT Services & Scientific ResearchClass 9
Electronics, Software & Scientific EquipmentClass 41
Education and EntertainmentTTAB Proceedings
No litigation activity
Top Firms
BLANK ROME LLP(Apr 2023)
10
CONVERGENCE INTELLECTUAL PRO...(Nov 2025)
2
Sheehan Phinney Bass & Green...(Sep 2025)
1
Trademark Portfolio
13 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
13
0
Status
4
7
2
0
0
Mark Type
10
0
2
1
0
13
3
13
2
Goods & Services
Class 009: Security software; downloadable security software, namely,software for testing and simulating security conditions and capabilities in simpleand complex environments; downloadable electronic publications in the nature of customer reports on security risks, security threats and security events in the fields ofcomputer, network and internet security; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; downloadable computer software for identifying security risks and threats in real and simulated environments; recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; Class 042: Providing online non-downloadable security software for monitoring, analysing and protecting IT, IT systems, cloud systems, networks and endpoints, and for training, simulation and testing in the field of IT security; network security and internet security services, namely, monitoring and management of network security software and hardware, identifying and resolving operational issues, IT security threats on networks and devices, and anomalies in client cloud-based services infrastructure; automated security software and hardware testing; computer security consultancy; onsite and remote management of the IT systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security; computer security services, namely, for monitoring, identifying, reviewing and resolving operational issues, IT security threats and system data, and for restricting unauthorized access to computer hosts
Goods & Services
Class 009: Security software; downloadable electronic publications in the nature of customer reports on security risks, security threats and security events in the fields of computer, network and internet security; Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; downloadable security software, namely, software for testing and simulating security conditions and capabilities in simple and complex environments; downloadable computer software for identifying security risks and threats in real and simulated environments; Class 042: Providing online non-downloadable security software for monitoring, analysing and protecting IT, IT systems, cloud systems, networks and endpoints, and for training, simulation and testing in the field of IT security; computer security services, namely, for monitoring, identifying, reviewing and resolving operational issues, IT security threats and system data, and for restricting unauthorized access to computer hosts; network security and internet security services, namely, monitoring and management of network security software and hardware, identifying and resolving operational issues, IT security threats on networks and devices, and anomalies in client cloud-based services infrastructure; automated security software and hardware testing; computer security consultancy; onsite and remote management of the IT systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security
Goods & Services
Class 009: Recorded and downloadable security software, namely, cybersecurity and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cybersecurity and IT security; downloadable security software, namely, software for testing and simulating security conditions and capabilities in simple and complex environments; downloadable computer software for identifying security risks and threats in real and simulated environments; Class 042: Providing online non-downloadable security software for monitoring, analysing and protecting IT, IT systems, cloud systems, networks and endpoints, and for training, simulation and testing in the field of IT security; computer security services, namely, for monitoring, identifying, reviewing and resolving operational issues, IT security threats and system data, and for restricting unauthorized access to computer hosts; network security and internet security services, namely, monitoring and management of network security software and hardware, identifying and resolving operational issues, IT security threats on networks and devices, and anomalies in client cloud-based services infrastructure; automated security software and hardware testing; computer security consultancy; onsite and remote management of the IT systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security
Goods & Services
Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; Providing on-line non-downloadable security software in the nature of IT and IT system monitoring, analysis and protection, including for IT security threats; Providing on-line non-downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; Providing on-line non-downloadable security software for training, simulation and testing in the field of cyber security and IT security; computer security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on endpoint systems; computer network security services, namely, reviewing system data in the nature of logs and architecture, providing recommendations for improvement; internet security services, namely, monitoring and management of network security software and hardware; network security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on networks and network devices; internet security services, namely, monitoring and identifying anomalies, including security threats, in client cloud-based services infrastructure; automated security computer software and computer hardware testing; computer security services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; computer security services, namely, restricting unauthorized access to computer hosts and computer network security services; computer services, namely, on-site and remote management of the information technology (IT) systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security; automated security software and hardware testing
Goods & Services
Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; Providing on-line non-downloadable security software in the nature of IT and IT system monitoring, analysis and protection, including for IT security threats; Providing on-line non-downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; Providing on-line non-downloadable security software for training, simulation and testing in the field of cyber security and IT security; computer security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on endpoint systems; computer network security services, namely, reviewing system data in the nature of logs and architecture, providing recommendations for improvement; internet security services, namely, monitoring and management of network security software and hardware; network security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on networks and network devices; internet security services, namely, monitoring and identifying anomalies, including security threats, in client cloud-based services infrastructure; automated security computer software and computer hardware testing; computer security services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; computer security services, namely, restricting unauthorized access to computer hosts and computer network security services; computer services, namely, on-site and remote management of the information technology (IT) systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security; automated security software and hardware testing
Goods & Services
Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; Providing on-line non-downloadable security software in the nature of IT and IT system monitoring, analysis and protection, including for IT security threats; Providing on-line non-downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; Providing on-line non-downloadable security software for training, simulation and testing in the field of cyber security and IT security; computer security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on endpoint systems; computer network security services, namely, reviewing system data in the nature of logs and architecture, providing recommendations for improvement; internet security services, namely, monitoring and management of network security software and hardware; network security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on networks and network devices; internet security services, namely, monitoring and identifying anomalies, including security threats, in client cloud-based services infrastructure; automated security computer software and computer hardware testing; computer security services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; computer security services, namely, restricting unauthorized access to computer hosts and computer network security services; computer services, namely, on-site and remote management of the information technology (IT) systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security; automated security software and hardware testing
Goods & Services
Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; Providing on-line non-downloadable security software in the nature of IT and IT system monitoring, analysis and protection, including for IT security threats; Providing on-line non-downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; Providing on-line non-downloadable security software for training, simulation and testing in the field of cyber security and IT security; computer security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on endpoint systems; computer network security services, namely, reviewing system data in the nature of logs and architecture, providing recommendations for improvement; internet security services, namely, monitoring and management of network security software and hardware; network security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on networks and network devices; internet security services, namely, monitoring and identifying anomalies, including security threats, in client cloud-based services infrastructure; automated security computer software and computer hardware testing; computer security services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; computer security services, namely, restricting unauthorized access to computer hosts and computer network security services; computer services, namely, on-site and remote management of the information technology (IT) systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security; automated security software and hardware testing
Goods & Services
Downloadable software for ensuring computer, network and internet security; downloadable electronic publications in the nature of customized customer reports in the fields of cyber security risks, computer security threats and cyber security events regarding computer, network and internet security; Computer, network and internet security services, namely, restricting unauthorized access to data at rest on hard drives, computer networks, cloud services and websites; computer security services, namely, identifying, analyzing, reporting on and responding to security risks, security threats and security events; Providing temporary use of on-line non-downloadable software for use in restricting unauthorized access to data at rest (hard drives), computer networks, cloud services and websites; computer security consultancy; providing temporary use of on-line non-downloadable computer software for identifying and reporting cyber security risks, computer security threats and cyber security events on computers, computer networks and websites; providing information in the field of computer, network and internet security risks, threats and events; providing technical information in the field of computer, network and internet security risks, threats and events
Owner:
Serial:87726754
Filed:Dec 19, 2017
Classes:9, 41, 42, +1
Registration:6098521
Registered:Jul 14, 2020
Goods & Services
Educational services, namely, providing online instruction in the field of computer and software security via an online, virtualized computer software and hardware environment for training purposes; Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; Computer security services, namely, identification of computer system vulnerabilities, configuration issues, and all-hazard threats (measured and theoretical) that could affect the system; "SECURITY"; Design and development of security software; computer security consultancy; software security consultancy in the field of IT and IT security, including identifying system vulnerabilities, configuration issues, and all-hazard threats (measured and theoretical) that could affect the system; IT security consulting; computer network security services, namely, reviewing system data in the nature of logs and architecture, providing recommendations for improvement; internet security services, namely, monitoring and management of network security software and hardware; computer services, namely, identifying, analyzing and responding to security risks and security threats; designing and architecting secure computer systems, secure computer networks and security solutions; Providing temporary use of on-line non-downloadable security software in the nature of IT and IT system monitoring, analysis and protection, including for IT security threats; computer security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on endpoint systems; network security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on networks and network devices; internet security services, namely, monitoring and identifying anomalies, including security threats, in client cloud-based services infrastructure; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer hosting services, namely, providing hosted deployments of IT and IT system monitoring, analysis and protection capabilities and computer network security services, namely, monitoring on premise networks, endpoints, as well as cloud-based services and infrastructure
Goods & Services
Security software, namely, IT and IT system monitoring and protection, including for IT security threats; Providing temporary use of on-line non-downloadable security software in the nature of IT and IT system monitoring, analysis and protection, including for IT security threats; computer security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on endpoint systems; network security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on networks and network devices; internet security services, namely, monitoring and identifying anomalies, including security threats, in client cloud-based services infrastructure; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer hosting services, namely, providing hosted deployments of IT and IT system monitoring, analysis and protection capabilities and computer network security services, namely, monitoring on premise networks, endpoints, as well as cloud-based services and infrastructure
Goods & Services
Educational services, namely, providing a virtualized computer software and hardware environment in classrooms, office environments, via video teleconference, as well as any place with an internet-accessible computer system featuring training in the field of computer and software security; Security software, namely, software for testing and simulating security conditions, and capabilities in simple and complex environments; computer software for identifying security risks and threats in real and simulated environments; "CYBER RANGE"; Providing temporary use of on-line non-downloadable security simulation software for measuring and tracking student and participant progress
Goods & Services
Security software, namely, software for provisioning, testing and measuring virtual and physical hardware and software systems | Providing temporary use of on-line non-downloadable security software in the nature of software for software testing, assurance and performance measurement; computer security services, namely, providing hosted capabilities, evaluation of end-user products and services for security considerations; automated security software and hardware testing; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security
Owner:
Serial:87447743
Filed:May 12, 2017
Classes:9, 41, 42, +1
Registration:5824044
Registered:Aug 6, 2019
Goods & Services
Class 009: Security software, namely, software for network and endpoint threat and anomaly detection, threat surface measurement, network and endpoint sensor capabilities, abstract system provisioning capabilities, software and systems analysis tools; Class 041: Training in the field of computer security, software security, and IT security; Class 042: Design and development of security software; computer security consultancy; software security consultancy in the field of IT and IT security, including identifying system vulnerabilities, configuration issues, and all-hazard threats measured and theoretical, that could affect the system; IT security consulting; computer network security services, namely, reviewing system data and architecture, providing recommendations for improvement; internet security services, namely, monitoring and management of network security software and hardware; computer services, namely, identifying, analyzing and responding to security risks and security threats; designing and architecting secure computer systems, secure computer networks and security solutions; Class 045: Computer security services, namely, identification of computer system vulnerabilities, configuration issues, and all-hazard threats, measured and theoretical, that could affect the system