PROSOC, INC. logo

PROSOC, INC.

17 Marks
Corp.
First Filed:Jul 31, 2012Latest Filed:Jun 1, 2021Address:Carlsbad, CA 92008

Portfolio Overview

Registered
8(47%)
Dead
9(53%)

Top Classes

Class 9
Electronics, Software & Scientific Equipment
11(65%)
Class 42
Software, IT Services & Scientific Research
7(41%)
Class 41
Education and Entertainment
3(18%)

TTAB Proceedings

No litigation activity

Top Firms

Womble Bond Dickinson (US) L...(Jun 2021)
10

Trademark Activity Timeline(2012 – 2024)

Trademark Portfolio

17 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
PROSOC
PROSOC
Service Mark
Word
REGISTERED
Owner:
Serial:90747363
Filed:Jun 1, 2021
Classes:42
Registration:6958661
Registered:Jan 17, 2023
Goods & Services
Computer services in the fields of computer security, namely, computer security consulting; computer security policy assessment, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; cybersecurity computer diagnostic services; cybersecurity, namely, computer security threat analysis for protecting data; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; data security computer diagnostic services; data security consulting; endpoint detection and response, namely, monitoring of computer systems to detect intrusions and breakdowns; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; firewall security computer diagnostic services; firewall security services, namely, computer security threat analysis for protecting data; firewall security support services, namely, help desk services; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; information technology security, namely, computer security threat analysis for protecting information technology data; information technology security policy assessment, namely, scanning, review and testing of computer and network policies implemented by software to assess information security vulnerability for computer security purposes, and scanning hardware; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes; managed detection and response, namely, monitoring of computer systems to detect breakdowns and security vulnerabilities; managed security service provider, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; network security services, namely, maintenance of computer software relating to computer security and prevention of computer risks; network security policy assessment, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, review and testing of computer hardware security involved in computer networks, review and testing of network hardware security of computer networks; vulnerability assessments, namely, scanning and penetration testing of networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software security policy assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability for computer security purposes, scanning, review and testing of computer and network security policies implemented by software to assess information security vulnerability for computer security purposes, reviewing policies, scanning hardware, and reviewing human compliance with security policies to assess information security vulnerability for computer security purposes; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess password security vulnerability for computer security purposes
PROFICIO
PROFICIO
Service Mark
Word
REGISTERED
Owner:
Serial:90736651
Filed:May 26, 2021
Classes:42
Registration:6745596
Registered:May 31, 2022
Goods & Services
Computer hardware diagnostic services; computer network diagnostic services; computer network security policy assessment; computer network security, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultancy; computer security policy assessment; computer security, namely, cybersecurity policy assessment; computer security, namely, data security policy assessment; computer security, namely, firewall security policy assessment; computer security, namely, hardware security policy assessment; computer security, namely, information technology security policy assessment; computer services, namely, endpoint detection and response of software and hardware threats; computer services, namely, managed detection and response of cyber intrusions and threats; computer software and hardware password maintenance services; computer software maintenance services; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity computer software maintenance services; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; data security computer software maintenance services; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; data security, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; firewall computer software security maintenance services; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security, namely, security threat analysis for protecting data; technical support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security, namely, security threat analysis for protecting data; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing temporary use of non- downloadable software for security operations center management; security policy assessment, namely, data security consultancy; software diagnostic services, namely, computer security threat analysis for protecting data; software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems, troubleshooting of computer hardware and software security problems; support services, namely, troubleshooting of computer software security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
PROXDR
PROXDR
Trademark
Word
ABANDONED
Owner:
Serial:90291538
Filed:Oct 31, 2020
Classes:9
P
P
Trademark
Stylized
REGISTERED
Owner:
Serial:90059203
Filed:Jul 17, 2020
Classes:41
Registration:6823490
Registered:Aug 23, 2022
Goods & Services
Computer hardware and recorded software for analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities in the fields of computer security; downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; downloadable computer software for protecting and securing computer networks and applications; computer software for providing real-time security audits of an online application, network, and host | Education, namely, providing classes, individual training, seminars, workshops and training in the fields of computer security | Providing online non-downloadable software for analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data; cybersecurity computer hardware, software network and web-based maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials and specified policies; computer security, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; data security diagnostic services, namely, computer security threat analysis for protecting data; data security computer hardware, software, network and web-based maintenance services; data security, namely, computer security threat analysis for protecting data; computer security, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer services, namely, endpoint detection and response of computer software and hardware to potential threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, security threat analysis for protecting data; firewall computer hardware, software and network security maintenance services; firewall security, namely, computer security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; computer hardware maintenance services; hardware security, namely, design and development of computer hardware security systems; computer security, namely, hardware security policy assessment; hardware support services, namely, troubleshooting of computer hardware problems, monitoring technological functions of computer network systems; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer hardware, network, software and web-based maintenance services; information technology security, namely, computer security threat analysis for protecting data; computer security, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber, data, firewall, endpoint, network and security threats and vulnerabilities; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network maintenance services for others; computer network security, namely, analysis for protecting data, administering digital certificates, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; computer network security policy assessment; computer network support services, namely, installation, administration, and troubleshooting of web and database applications, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; password security, namely, providing authentication, issuance, validation and revocation of digital certificates, implementing software and network policies; password security policy assessment, namely, analyzing and implementing software and network policies; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; support services, namely, troubleshooting of computer software problems, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for cyber, data, firewall, endpoint, network and security threats and vulnerabilities for computer hardware and software; providing temporary use of non-downloadable software for security operations center management; software diagnostic services, namely, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; computer software maintenance services; software security policy assessments, namely, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; software support services, namely, troubleshooting of computer software problems, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; vulnerability assessments, namely, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities, scanning and penetration testing of computers and networks to assess information security vulnerability
PROVIEW
PROVIEW
Service Mark
Word
REGISTERED
Owner:
Serial:88803241
Filed:Feb 19, 2020
Classes:42
Registration:6782838
Registered:Jul 5, 2022
Goods & Services
Computer hardware diagnostic services; computer network diagnostic services; computer network security policy assessment; computer network security, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultancy; computer security policy assessment; computer security, namely, cybersecurity policy assessment; computer security, namely, data security policy assessment; computer security, namely, firewall security policy assessment; computer security, namely, hardware security policy assessment; computer security, namely, information technology security policy assessment; computer services, namely, endpoint detection and response of software and hardware threats; computer services, namely, managed detection and response of cyber intrusions and threats; computer software and hardware password maintenance services; computer software maintenance services; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity computer software maintenance services; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; data security computer software maintenance services; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; data security, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; firewall computer software security maintenance services; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security, namely, security threat analysis for protecting data; technical support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security, namely, security threat analysis for protecting data; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing temporary use of non- downloadable software for security operations center management; security policy assessment, namely, data security consultancy; software diagnostic services, namely, computer security threat analysis for protecting data; software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems, troubleshooting of computer hardware and software security problems; support services, namely, troubleshooting of computer software security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
SOAR AS A SERVICE
SOAR AS A SERVICE
Service Mark
Word
REGISTERED
Owner:
Serial:88764703
Filed:Jan 18, 2020
Classes:42
Registration:7294983
Registered:Jan 30, 2024
Goods & Services
Computer network security policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultancy; computer security policy assessment; computer security, namely, cybersecurity policy assessment; computer security, namely, data security policy assessment; computer security, namely, firewall security policy assessment; computer security, namely, information technology security policy assessment; computer services, namely, endpoint detection and response of software and hardware threats; computer services, namely, managed detection and response of cyber intrusions and threats; computer support services, namely, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity computer software maintenance services; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; data security computer software maintenance services; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; data security, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; firewall computer software security maintenance services; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security, namely, security threat analysis for protecting data; technical support services, namely, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security, namely, security threat analysis for protecting data; information technology support services, namely, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing temporary use of non- downloadable software for security operations center management; security policy assessment, namely, data security consultancy; software diagnostic services, namely, computer security threat analysis for protecting data; software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
PROVIEW PLUS
PROVIEW PLUS
Trademark
Word
REGISTERED
Owner:
Serial:88005171
Filed:Jun 18, 2018
Classes:9, 41, 42
Registration:6169903
Registered:Oct 6, 2020
Goods & Services
Computer hardware and software for analyzing and preventing cyber threats in the fields of computer security; computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software for protecting and securing computer networks and applications; computer software for providing real-time security audits of an online application, network, and host | Education, namely, providing classes, seminars, workshops, webinars and training in the fields of computer security | Providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity computer hardware and software maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; computer security, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security computer hardware and software maintenance services; data security, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; computer security, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer services, namely, endpoint detection and response of software and hardware threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall computer hardware and software security maintenance services; firewall security, namely, security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; computer hardware maintenance services; hardware security, namely, maintenance of computer hardware security systems; computer security, namely, hardware security policy assessment; hardware support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer hardware and software maintenance services; information technology security, namely, security threat analysis for protecting data; computer security, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber intrusions and threats; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network maintenance services for others; computer network security, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network security policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy; support services, namely, troubleshooting of computer software problems, troubleshooting of security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing temporary use of non- downloadable software for security operations center management; software diagnostic services, namely, computer security threat analysis for protecting data; computer software maintenance services; software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems, troubleshooting of computer hardware and software security problems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
THREATINSIGHT
THREATINSIGHT
Trademark
Word
REGISTERED
Owner:
Serial:88005176
Filed:Jun 18, 2018
Classes:9, 41, 42
Registration:6175677
Registered:Oct 13, 2020
Goods & Services
computer hardware and software for analyzing and preventing cyber threats in the fields of computer security; computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software for protecting and securing computer networks and applications; computer software for providing real-time security audits of an online application, network, and host | education, namely, providing classes, seminars, workshops, webinars and training in the fields of computer security | providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity computer hardware and software maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; computer security, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security computer hardware and software maintenance services; data security, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; computer security, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer services, namely, endpoint detection and response of software and hardware threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall computer hardware and software security maintenance services; firewall security, namely, security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; computer hardware maintenance services; hardware security, namely, maintenance of computer hardware security systems; computer security, namely, hardware security policy assessment; hardware support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer hardware and software maintenance services; information technology security, namely, security threat analysis for protecting data; computer security, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber intrusions and threats; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network maintenance services for others; computer network security, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network security policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy; support services, namely, troubleshooting of computer software problems, troubleshooting of security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing temporary use of non- downloadable software for security operations center management; software diagnostic services, namely, computer security threat analysis for protecting data; computer software maintenance services; software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems, troubleshooting of computer hardware and software security problems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
THREATINTEL
THREATINTEL
Service Mark
Word
ABANDONED
Owner:
Serial:88005190
Filed:Jun 18, 2018
Classes:42
THREATSIGHT
THREATSIGHT
Trademark
Word
ABANDONED
Owner:
Serial:88005183
Filed:Jun 18, 2018
Classes:9
P
P
Trademark
Combined
ABANDONED
Owner:
Serial:87769705
Filed:Jan 25, 2018
Classes:9
POWERED BY PROFICIO
POWERED BY PROFICIO
Trademark
Word
ABANDONED
Owner:
Serial:87332996
Filed:Feb 13, 2017
Classes:9
POWERED BY PROSOC
POWERED BY PROSOC
Trademark
Word
ABANDONED
Owner:
Serial:87333000
Filed:Feb 13, 2017
Classes:9
PROFICIO
PROFICIO
Trademark
Word
REGISTERED
Owner:
Serial:86880857
Filed:Jan 20, 2016
Classes:9
Registration:5355679
Registered:Dec 12, 2017
Goods & Services
Computer [ hardware and ] software systems for security operations center management, namely, [ hardware and ] software for performing computer security, computer security policy assessment, computer support, computer vulnerability assessments, cybersecurity diagnostics, cybersecurity maintenance, cybersecurity policy assessment, cybersecurity support, cybersecurity vulnerability assessments, data security diagnostics, data security maintenance, data security, data security policy assessment, data security support, data security vulnerability assessments, endpoint detection and response, firewall security assessments, firewall security diagnostics, firewall security maintenance, firewall security, firewall security policy assessment, firewall security support, firewall security vulnerability assessments, hardware diagnostics, hardware maintenance, hardware security, hardware security policy assessment, hardware support, hardware vulnerability assessments, information technology diagnostics, information technology maintenance, information technology security, information technology security policy assessment, information technology support, information technology vulnerability assessments, managed detection and response, network diagnostics, network maintenance, network security, network security policy assessment, network support, network vulnerability assessments, password diagnostics, password maintenance, password security, password security policy assessment, password support, password vulnerability assessments, security policy assessments, security vulnerability assessments, penetration testing, security operations center management, software diagnostics, software maintenance, software security policy assessments, software support, and software vulnerability assessments
PROFICIO
PROFICIO
Trademark
Combined
CANCELLED
Owner:
Serial:86880897
Filed:Jan 20, 2016
Classes:9
Registration:5365511
Registered:Dec 26, 2017
PRONOC
PRONOC
Trademark
Word
CANCELLED
Owner:
Serial:85766057
Filed:Oct 29, 2012
Classes:9
Registration:4527783
Registered:May 13, 2014
PROSOC
PROSOC
Trademark
Word
CANCELLED
Owner:
Serial:85691773
Filed:Jul 31, 2012
Classes:9
Registration:4519950
Registered:Apr 29, 2014

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.