REVBITS, LLC. logo

REVBITS, LLC.

15 Marks
LLC
First Filed:Mar 28, 2017Latest Filed:Jul 8, 2019Address:Suite 1R, Melville, NY 11747

Portfolio Overview

Registered
2(13%)
Dead
13(87%)

Top Classes

Class 9
Electronics, Software & Scientific Equipment
12(80%)
Class 42
Software, IT Services & Scientific Research
3(20%)

TTAB Proceedings

No litigation activity

Top Firms

Mandelbaum Silfin Economou L...(Jul 2019)
15

Trademark Activity Timeline(2017 – 2021)

Trademark Portfolio

15 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
88504136
88504136
Trademark
Design
ABANDONED
Owner:
Serial:88504136
Filed:Jul 8, 2019
Classes:9
88504155
88504155
Trademark
Design
ABANDONED
Owner:
Serial:88504155
Filed:Jul 8, 2019
Classes:9
88503921
88503921
Trademark
Design
ABANDONED
Owner:
Serial:88503921
Filed:Jul 8, 2019
Classes:9
88504111
88504111
Service Mark
Design
ABANDONED
Owner:
Serial:88504111
Filed:Jul 8, 2019
Classes:42
88504057
88504057
Trademark
Design
ABANDONED
Owner:
Serial:88504057
Filed:Jul 8, 2019
Classes:9
88504003
88504003
Trademark
Design
ABANDONED
Owner:
Serial:88504003
Filed:Jul 8, 2019
Classes:9
10010001101
10010001101
Trademark
Combined
ABANDONED
Owner:
Serial:88504090
Filed:Jul 8, 2019
Classes:9
BEEALERT
BEEALERT
Trademark
Word
ABANDONED
Owner:
Serial:88503950
Filed:Jul 8, 2019
Classes:9
CYBERDOME
CYBERDOME
Trademark
Word
ABANDONED
Owner:
Serial:88504049
Filed:Jul 8, 2019
Classes:9
PHISHDRILL
PHISHDRILL
Service Mark
Word
ABANDONED
Owner:
Serial:88504101
Filed:Jul 8, 2019
Classes:42
PHISH-O-METER
PHISH-O-METER
Trademark
Word
ABANDONED
Owner:
Serial:88504066
Filed:Jul 8, 2019
Classes:9
R
R
Trademark
Combined
ABANDONED
Owner:
Serial:88503749
Filed:Jul 8, 2019
Classes:9
REVBITS
REVBITS
Trademark
Word
REGISTERED
Owner:
Serial:88504119
Filed:Jul 8, 2019
Classes:9
Registration:6329509
Registered:Apr 20, 2021
Goods & Services
downloadable security software, namely, anti-malware, anti-phishing, and anti-hacking software, downloadable security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; downloadable computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; downloadable computer software for use in computer security, namely, end-point control, device management, malware detection and response, threat detection and response, virus detection and response; downloadable computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems; downloadable privileged access management computer software for use in controlling, monitoring and managing user access to computer systems and software, downloadable computer software for managing and securing passwords and sensitive information; downloadable computer software for managing software encryption keys; downloadable computer software for managing digital public key identity certificates that allow secure exchange of data over the Internet; downloadable software for blocking detected phishing sites in email links and web browsing; downloadable computer software for use in initiating, monitoring and recording privileged sessions between users via computer hardware and software systems, initiating privileged sessions between users via computer hardware and software systems without revealing passwords to the end user, and recording usage of administrative and privileged accounts and activities performed by users during privileged sessions and including a playback feature of such recordings | providing online non-downloadable security software, namely, anti-malware, anti-phishing, and anti-hacking software; providing online nondownloadable security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; providing online non-downloadable computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; providing online non-downloadable computer software for use in computer security, namely, end-point control, device management, malware detection and response, threat detection and response, virus detection and response; providing online non-downloadable training simulation software that records a recipient's response to phishing email communications for use in the field of analyzing, detecting and preventing digital and online threats consisting of computer virus, malware and phishing attacks
REVBITS PSM
REVBITS PSM
Trademark
Word
ABANDONED
Owner:
Serial:88504128
Filed:Jul 8, 2019
Classes:9
R
R
Service Mark
Combined
REGISTERED
Owner:
Serial:87389460
Filed:Mar 28, 2017
Classes:42
Registration:5328299
Registered:Nov 7, 2017
Goods & Services
Computer consultation in the field of computer security

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.