ForAllSecure, Inc.
6 Marks
First Filed:Apr 9, 2018Latest Filed:Dec 22, 2021Address:3710 Forbes Avenue, 3rd Floor, Pittsburgh, PENNSYLVANIA 15213, US
Portfolio Overview
Registered
6(100%)Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 41
Education and EntertainmentTTAB Proceedings
No litigation activity
Top Firms
Dorsey & Whitney LLP(Dec 2021)
6
Trademark Portfolio
6 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
6
0
Status
6
0
0
0
0
Mark Type
4
0
0
2
0
5
2
Goods & Services
Class 009: Downloadable podcasts in the field of internet security, data security, computer security, and cyber security; Class 041: Entertainment services, namely, providing podcasts in the field of internet security, data security, computer security, and cyber security
Goods & Services
Educational services, namely, conducting conferences, webinars and workshops in the field of cyber and cyber-physical security threats, vulnerabilities, risks and events and distribution of course material in connection therewith; Educational services, namely, conducting conferences, seminars and workshops in the fields of internal auditing, data privacy and data security, cybersecurity, data privacy and security regulations and compliance, information technology governance and management, and data privacy and security risk management
Goods & Services
Downloadable computer software that detects software issues, defects, bugs and vulnerabilities in application software; Downloadable cybersecurity software for preventing malicious attacks and advanced persistent threats against application software; Downloadable computer application and downloadable software for security testing, namely software for detection, analysis, and facilitation of computer vulnerabilities remediation in software from cyberattacks, malicious attacks, and advanced persistent threats; Downloadable electronic publications in the nature of e-books, datasheets, solution briefs, reports, whitepapers, online magazines, online newspapers, electronic journals, blogs, and podcasts in the field of cybersecurity | Promoting the use of security testing as a security assurance best practices to others in the field of cloud computing; Business risk management services, namely, continuity of operations business planning; Business consultation in the field of turnaround and crisis management; Business risk management services in the fields of information technology and information technology enterprises; Providing a live forum for companies to showcase, display, demonstrate and promote ideas, products and services; business consultancy and advisory services | Educational services, namely, conducting conferences, webinars and workshops in the field of cyber and cyber-physical security threats, vulnerabilities, risks and events and distribution of course material in connection therewith; Educational services, namely, conducting conferences, seminars and workshops in the fields of internal auditing, data privacy and data security, cybersecurity, data privacy and security regulations and compliance, information technology governance and management, and data privacy and security risk management; Non-downloadable electronic publications in the nature of e-books, online magazines, online newspapers, electronic journals, blogs, and podcasts in the field of cybersecurity | Software as a service (SAAS) services featuring software for detecting issues, defects, bugs, and vulnerabilities in application software; Software as a service (SAAS) service featuring cybersecurity software for preventing malicious attacks and advanced persistent threats against application software; Application computer security and application software security services, namely, nondownloadable cybersecurity software for protecting application software against malicious attacks and advanced persistent threats; Computer security vulnerability analysis; Consultancy in the fields of internet security, data security, computer security, and cyber security; Monitoring and testing computer terminals, servers, networks and end points directed toward the detection of cybersecurity exploits and protecting against information security vulnerability; Collaborative computer programming for others in the nature of hackathons; Providing information in the fields of technology and software development via an on-line website; Technology consultation in the field of cybersecurity; Information technology consulting services, namely, regulatory compliance consulting with the information and technology security; Providing cyber security compliance services, namely, detection, analysis, blocking, and facilitation of computer vulnerabilities remediation in software from cyberattacks, malicious attacks, and advanced persistent threats; Security services, namely, testing of computer systems, application, and software for addressing potential threats, vulnerabilities, risks and security events; Consulting services in the field of cyber security threat assessment and cyber security intelligence | Providing online resources, namely, providing a website featuring information in the field of physical security threats, vulnerabilities, risks and events; Technology licensing of security hardware and software; Providing an on-line searchable database featuring information concerning physical security threats, vulnerabilities, risks and events
Goods & Services
Downloadable computer software that detects software issues, defects, bugs and vulnerabilities in application software; Downloadable cybersecurity software for preventing malicious attacks and advanced persistent threats against application software; Downloadable computer application and downloadable software for security testing, namely software for detection, analysis, and facilitation of computer vulnerabilities remediation in software from cyberattacks, malicious attacks, and advanced persistent threats; Downloadable electronic publications in the nature of e-books, datasheets, solution briefs, reports, whitepapers, online magazines, online newspapers, electronic journals, blogs, and podcasts in the field of cybersecurity | Non-downloadable electronic publications in the nature of e-books, online magazines, online newspapers, electronic journals, blogs, and podcasts in the field of cybersecurity | Software as a service (SAAS) services featuring software for detecting issues, defects, bugs, and vulnerabilities in application software; Software as a service (SAAS) service featuring cybersecurity software for preventing malicious attacks and advanced persistent threats against application software; Application computer security and application software security services, namely, nondownloadable cybersecurity software for protecting application software against malicious attacks and advanced persistent threats; Computer security vulnerability analysis; Consultancy in the fields of internet security, data security, computer security, and cyber security; Monitoring and testing computer terminals, servers, networks and end points directed toward the detection of cybersecurity exploits and protecting against information security vulnerability; Collaborative computer programming for others in the nature of hackathons; Providing information in the fields of technology and software development via an on-line website; Technology consultation in the field of cybersecurity
Goods & Services
Downloadable computer software that detects software issues, defects, bugs and vulnerabilities in application software; Downloadable cybersecurity software for preventing malicious attacks and advanced persistent threats against application software; Downloadable computer application and downloadable software for security testing, namely software for detection, analysis, and facilitation of computer vulnerabilities remediation in software from cyberattacks, malicious attacks, and advanced persistent threats; Downloadable electronic publications in the nature of e-books, datasheets, solution briefs, reports, whitepapers, online magazines, online newspapers, electronic journals, blogs, and podcasts in the field of cybersecurity | Non-downloadable electronic publications in the nature of e-books, online magazines, online newspapers, electronic journals, blogs, and podcasts in the field of cybersecurity | Software as a service (SAAS) services featuring software for detecting issues, defects, bugs, and vulnerabilities in application software; Software as a service (SAAS) service featuring cybersecurity software for preventing malicious attacks and advanced persistent threats against application software; Application computer security and application software security services, namely, nondownloadable cybersecurity software for protecting application software against malicious attacks and advanced persistent threats; Computer security vulnerability analysis; Consultancy in the fields of internet security, data security, computer security, and cyber security; Monitoring and testing computer terminals, servers, networks and end points directed toward the detection of cybersecurity exploits and protecting against information security vulnerability; Collaborative computer programming for others in the nature of hackathons; Providing information in the fields of technology and software development via an on-line website; Technology consultation in the field of cybersecurity
Goods & Services
Computer software that autonomously detects vulnerabilities in application software using patented dynamic analysis techniques, for use by developers, enterprises and end-users; cybersecurity software for protecting application software against cyber threats | Software as a service (SAAS) services, namely, software for autonomously detecting vulnerabilities in application software using patented dynamic analysis techniques, for use by developers, enterprises and end-users; software as a service (SAAS) service, namely, cybersecurity software for protecting application software against cyber threats