Method Security Inc
3 Marks
Corp.
First Filed:Dec 5, 2024Latest Filed:Aug 1, 2025Address:30 E. 23rd Street, Floor 10, New York, NY 10010
Portfolio Overview
Pending
3(100%)Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 42
Software, IT Services & Scientific ResearchTTAB Proceedings
No litigation activity
Top Firms
Loading...
Trademark Portfolio
3 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
3
0
Status
0
3
0
0
0
Mark Type
1
0
1
1
0
3
3
Goods & Services
Downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Downloadable computer software using artificial intelligence (AI) for providing assistance with cybersecurity tasks and workflows; Downloadable computer software using artificial intelligence (AI) for communicating with users through natural language and voice, understanding and categorizing user priorities, creating plans to execute work, and automating tasks on the user's behalf; Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Engineering services in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration; Computer programming consultancy in the field of cybersecurity, security, counterintelligence, engineering, asset protection, insider threat detection, cyber security programs, and integration; Technology consultation in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration engineering; Providing temporary use of online, non-downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Providing on-line non-downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Providing on-line non-downloadable software using artificial intelligence (AI) for providing assistance with cybersecurity tasks and workflows; Providing on-line non-downloadable software using artificial intelligence (AI) for communicating with users through natural language and voice, understanding and categorizing user priorities, creating plans to execute work, and automating tasks on the user's behalf
Goods & Services
Downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Downloadable computer software using artificial intelligence (AI) for providing assistance with cybersecurity tasks and workflows; Downloadable computer software using artificial intelligence (AI) for communicating with users through natural language and voice, understanding and categorizing user priorities, creating plans to execute work, and automating tasks on the user's behalf; Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Engineering services in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration; Computer programming consultancy in the field of cybersecurity, security, counterintelligence, engineering, asset protection, insider threat detection, cyber security programs, and integration; Technology consultation in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration engineering; Providing temporary use of online, non-downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Providing on-line non-downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Providing on-line non-downloadable software using artificial intelligence (AI) for providing assistance with cybersecurity tasks and workflows; Providing on-line non-downloadable software using artificial intelligence (AI) for communicating with users through natural language and voice, understanding and categorizing user priorities, creating plans to execute work, and automating tasks on the user's behalf
Goods & Services
Downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Downloadable software featuring artificial intelligence agents to provide assistance with cybersecurity tasks and workflows; Downloadable software featuring artificial intelligence agents that can communicate with users through natural language and voice, understand and categorize user priorities, create plans to execute work, and automate tasks on the user's behalf; SECURITY; Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Engineering services in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration; Computer programming consultancy in the field of cybersecurity, security, counterintelligence, engineering, asset protection, insider threat detection, cyber security programs, and integration; Technological consulting in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration engineering; Providing temporary use of online, non-downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Providing temporary use of online, non-downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Providing temporary use of online, non-downloadable software, namely, software featuring artificial intelligence agents to provide assistance with cybersecurity tasks and workflows; Providing temporary use of online, non-downloadable software, namely, software featuring artificial intelligence agents that can communicate with users through natural language and voice, understand and categorize user priorities, create plans to execute work, and automate tasks on the user's behalf