Method Security Inc logo

Method Security Inc

3 Marks
Corp.
First Filed:Dec 5, 2024Latest Filed:Aug 1, 2025Address:30 E. 23rd Street, Floor 10, New York, NY 10010

Portfolio Overview

Pending
3(100%)

Top Classes

Class 9
Electronics, Software & Scientific Equipment
3(100%)
Class 42
Software, IT Services & Scientific Research
3(100%)

TTAB Proceedings

No litigation activity

Top Firms

Loading...

Trademark Portfolio

3 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
99316226
99316226
Trademark
Design
PENDING
Owner:
Serial:99316226
Filed:Aug 1, 2025
Classes:9, 42
Goods & Services
Downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Downloadable computer software using artificial intelligence (AI) for providing assistance with cybersecurity tasks and workflows; Downloadable computer software using artificial intelligence (AI) for communicating with users through natural language and voice, understanding and categorizing user priorities, creating plans to execute work, and automating tasks on the user's behalf; Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Engineering services in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration; Computer programming consultancy in the field of cybersecurity, security, counterintelligence, engineering, asset protection, insider threat detection, cyber security programs, and integration; Technology consultation in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration engineering; Providing temporary use of online, non-downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Providing on-line non-downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Providing on-line non-downloadable software using artificial intelligence (AI) for providing assistance with cybersecurity tasks and workflows; Providing on-line non-downloadable software using artificial intelligence (AI) for communicating with users through natural language and voice, understanding and categorizing user priorities, creating plans to execute work, and automating tasks on the user's behalf
METHOD
METHOD
Trademark
Combined
PENDING
Owner:
Serial:99316228
Filed:Aug 1, 2025
Classes:9, 42
Goods & Services
Downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Downloadable computer software using artificial intelligence (AI) for providing assistance with cybersecurity tasks and workflows; Downloadable computer software using artificial intelligence (AI) for communicating with users through natural language and voice, understanding and categorizing user priorities, creating plans to execute work, and automating tasks on the user's behalf; Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Engineering services in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration; Computer programming consultancy in the field of cybersecurity, security, counterintelligence, engineering, asset protection, insider threat detection, cyber security programs, and integration; Technology consultation in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration engineering; Providing temporary use of online, non-downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Providing on-line non-downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Providing on-line non-downloadable software using artificial intelligence (AI) for providing assistance with cybersecurity tasks and workflows; Providing on-line non-downloadable software using artificial intelligence (AI) for communicating with users through natural language and voice, understanding and categorizing user priorities, creating plans to execute work, and automating tasks on the user's behalf
METHOD SECURITY
METHOD SECURITY
Trademark
Word
PENDING
Owner:
Serial:98886631
Filed:Dec 5, 2024
Classes:9, 42
Goods & Services
Downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Downloadable software featuring artificial intelligence agents to provide assistance with cybersecurity tasks and workflows; Downloadable software featuring artificial intelligence agents that can communicate with users through natural language and voice, understand and categorize user priorities, create plans to execute work, and automate tasks on the user's behalf; SECURITY; Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Engineering services in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration; Computer programming consultancy in the field of cybersecurity, security, counterintelligence, engineering, asset protection, insider threat detection, cyber security programs, and integration; Technological consulting in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration engineering; Providing temporary use of online, non-downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Providing temporary use of online, non-downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Providing temporary use of online, non-downloadable software, namely, software featuring artificial intelligence agents to provide assistance with cybersecurity tasks and workflows; Providing temporary use of online, non-downloadable software, namely, software featuring artificial intelligence agents that can communicate with users through natural language and voice, understand and categorize user priorities, create plans to execute work, and automate tasks on the user's behalf

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.