RSA Security LLC logo

RSA Security LLC

11 Marks
LLC
First Filed:Apr 8, 2021Latest Filed:Oct 8, 2024Address:2 Burlington Woods Dr, Suite 201, Burlington, MA 01803

Portfolio Overview

Registered
4(36%)
Pending
2(18%)
Dead
5(45%)
Previous
22

Top Classes

Class 9
Electronics, Software & Scientific Equipment
9(82%)
Class 42
Software, IT Services & Scientific Research
8(73%)
Class 41
Education and Entertainment
6(55%)

TTAB Proceedings

Total Proceedings
12
As Plaintiff
8(67%)
As Defendant
4(33%)

Top Firms

Danielson Legal LLC(Oct 2024)
16
Husch Blackwell LLP(Nov 2024)
15
Foley & Lardner LLP(May 2021)
2

Trademark Portfolio

33 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
ADAPTIVE INTERVENTION
ADAPTIVE INTERVENTION
Trademark
Word
ITU
PENDING
Owner:
Serial:98790022
Filed:Oct 8, 2024
Classes:9, 35, 41, +2
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Downloadable computer software using artificial intelligence and machine learning to provide risk-based, multi-factor user authentication, and fraud detection, mitigation, and reporting; downloadable software using artificial intelligence and machine learning for producing reports, dashboards, metrics and alerts related to computer, computer network and electronic data security incidents; downloadable software using artificial intelligence and machine learning for electronic fraud and identity theft detection and prevention; downloadable software using artificial intelligence and machine learning for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Downloadable computer software featuring predictive analytics for fraud detection and prevention of financial fraud, phishing attacks and identity theft; Downloadable computer software featuring artificial intelligence and machine learning to analyze consumer behavior for the prevention of financial fraud and identity theft; Downloadable computer software featuring artificial intelligence and machine learning for user authentication; downloadable software featuring generative artificial intelligence and machine learning for creating and sending questionnaires and video, text and voice alerts in the fields of fraud detection, prevention and mitigation; downloadable software featuring generative artificial intelligence and machine learning for creating and modifying lists of recommended actions based on user-defined responses to questionnaires and to video, text and voice alerts; Business consulting in the fields of fraud, data theft and identity theft; Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data; Providing online non-downloadable software using artificial intelligence and machine learning for providing risk-based, multi-factor user authentication and fraud detection, mitigation, and reporting; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for electronic fraud and identity theft detection, prevention, and mitigation; Cloud computing featuring software using artificial intelligence and machine learning for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence and machine learning for fraud detection, reporting, and mitigation; computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of using artificial intelligence and machine learning to predict, detect, and mitigate fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; providing fraud detection services for others, for electronic commerce payment transactions via a global computer network; Software as a service (SAAS) services featuring software using predictive analytics for detection and prevention of financial fraud, phishing attacks, and identity theft; Software as a service (SAAS) services featuring software using artificial intelligence and machine learning to analyze consumer behavior for the prevention of financial fraud and identity theft; Software as a service (SAAS) services featuring software using artificial intelligence and machine learning for user authentication; software as a service (SAAS) services featuring software using generative artificial intelligence and machine learning for creating and sending questionnaires and video, text and voice alerts in the fields of fraud detection, prevention and mitigation; software as a service (SAAS) services featuring software using generative artificial intelligence and machine learning for creating and modifying lists of recommended actions based on user-defined responses to questionnaires and to video, text and voice alerts
MORE SIGNAL. LESS NOISE.
MORE SIGNAL. LESS NOISE.
Trademark
Word
ITU
PENDING
Owner:
Serial:98790027
Filed:Oct 8, 2024
Classes:9, 35, 41, +2
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Downloadable computer software using artificial intelligence and machine learning for user authentication, and fraud and identity theft detection, reporting, and mitigation; downloadable user authentication, identity theft detection, and fraud detection computer software using behavioral biometrics; Business consulting in the fields of fraud, data theft and identity theft; Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; Providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; Computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; Computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; Providing fraud detection services for others, for electronic commerce payment transactions via a global computer network; Providing online non-downloadable software featuring artificial intelligence and machine learning for user authentication, and fraud and identity theft detection, reporting, and mitigation; Providing online non-downloadable user authentication, identity theft detection, and fraud detection software featuring behavioral biometrics; Software as a service (saas) services featuring artificial intelligence and machine learning for user authentication, and fraud and identity theft detection, reporting, and mitigation; Software as a service (saas) services featuring software for user authentication, identity theft detection, and fraud detection using behavioral biometrics
ID IQ
ID IQ
Service Mark
Word
ABANDONED
Owner:
Serial:97903938
Filed:Apr 24, 2023
Classes:42
RISK AI
RISK AI
Service Mark
Word
ABANDONED
Owner:
Serial:97767629
Filed:Jan 25, 2023
Classes:42
Goods & Services
"AI"
NETWITNESS VISION XDR
ABANDONED
Owner:
Serial:97412363
Filed:May 16, 2022
Classes:9
FIGHT FRAUD, NOT CUSTOMERS
ABANDONED
Owner:
Serial:90702787
Filed:May 11, 2021
Classes:9
STOP FRAUD, NOT CUSTOMERS
REGISTERED
Owner:
Serial:90702767
Filed:May 11, 2021
Classes:9, 35, 41, +2
Registration:7219311
Registered:Nov 14, 2023
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Business consulting in the fields of fraud, data theft and identity theft; Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; Providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; Computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; Computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; Providing fraud detection services for others, for electronic commerce payment transactions via a global computer network
VISIONARY SCIENCE. AUTHENTIC CUSTOMERS.
Owner:
Serial:90702859
Filed:May 11, 2021
Classes:9
90690803
90690803
Trademark
Design
REGISTERED
Owner:
Serial:90690803
Filed:May 5, 2021
Classes:9, 35, 41, +2
Registration:7402415
Registered:May 28, 2024
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Business consulting in the fields of fraud, data theft and identity theft; Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; Providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; Computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; Computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft
OUTSEER
OUTSEER
Trademark
Stylized
REGISTERED
Owner:
Serial:90690796
Filed:May 5, 2021
Classes:9, 35, 41, +2
Registration:7255617
Registered:Dec 26, 2023
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Business consulting in the fields of fraud, data theft and identity theft; Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; providing fraud detection services for others, for electronic commerce payment transactions via a global computer network
OUTSEER
OUTSEER
Trademark
Word
REGISTERED
Owner:
Serial:90632944
Filed:Apr 8, 2021
Classes:9, 35, 41, +2
Registration:7255590
Registered:Dec 26, 2023
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Business consulting in the fields of fraud, data theft and identity theft; Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; providing fraud detection services for others, for electronic commerce payment transactions via a global computer network
RSAC
RSAC
Trademark
Word
Previous
ITU
PENDING
Owner:
Serial:98854509
Filed:Nov 14, 2024
Classes:9, 35, 41, +2
Goods & Services
educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing educational information, news, and commentary in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring blogs and non-downloadable videos, presentations, and podcasts in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; educational services, namely, providing sessions, courses, and training programs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; educational services, namely, providing virtual sessions, courses, and training programs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing online non-downloadable electronic publications in the nature of articles, ebooks, research reports, and white papers in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; providing recognition and incentives by the way of awards to demonstrate excellence in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; providing training for certification in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; granting of educational degrees and certifications in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing educational test preparation services for exams in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; entertainment services, namely, providing online video games; electronic downloadable publications, namely, articles, ebooks, research reports, and white papers in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; downloadable videos, presentations, and podcasts in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; downloadable video game software; downloadable software applications for receiving content in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; downloadable software in the nature of mobile applications for receiving content in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; arranging and conducting business conferences and events for business purposes in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; arranging and conducting virtual business conferences online in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring an online marketplace for exchanging goods and services with other users; providing business networking opportunities for individuals in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing business information, news, and commentary in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing on-line employment information in the field of job resources and listings; membership club services, namely, providing information to members in the field of jobs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring an online marketplace for exchanging reviews of goods and services with other users; conducting business surveys; online business and social networking services for professionals in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing online non-downloadable game software; computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers, form virtual communities, and engage in social networking services in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security
RSAC CONFERENCE
RSAC CONFERENCE
Trademark
Word
Previous
ITU
PENDING
Owner:
Serial:98850143
Filed:Nov 14, 2024
Classes:9, 35, 41, +2
Goods & Services
educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing educational information, news, and commentary in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring blogs and non-downloadable videos, presentations, and podcasts in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; educational services, namely, providing sessions, courses, and training programs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; educational services, namely, providing virtual sessions, courses, and training programs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing online non-downloadable electronic publications in the nature of articles, ebooks, research reports, and white papers in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; providing recognition and incentives by the way of awards to demonstrate excellence in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; providing training for certification in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; granting of educational degrees and certifications in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing educational test preparation services for exams in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; entertainment services, namely, providing online video games; electronic downloadable publications, namely, articles, ebooks, research reports, and white papers in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; downloadable videos, presentations, and podcasts in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; downloadable video game software; downloadable software applications for receiving content in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; downloadable software in the nature of mobile applications for receiving content in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; arranging and conducting business conferences and events for business purposes in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; arranging and conducting virtual business conferences online in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring an online marketplace for exchanging goods and services with other users; providing business networking opportunities for individuals in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing business information, news, and commentary in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing on-line employment information in the field of job resources and listings; membership club services, namely, providing information to members in the field of jobs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring an online marketplace for exchanging reviews of goods and services with other users; conducting business surveys; online business and social networking services for professionals in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing online non-downloadable game software; computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers, form virtual communities, and engage in social networking services in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security
RSA CONFERENCE
RSA CONFERENCE
Trademark
Word
Previous
ITU
PENDING
Owner:
Serial:98853386
Filed:Nov 14, 2024
Classes:9, 35, 41, +2
Goods & Services
educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing educational information, news, and commentary in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring blogs and non-downloadable videos, presentations, and podcasts in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; educational services, namely, providing sessions, courses, and training programs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; educational services, namely, providing virtual sessions, courses, and training programs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing online non-downloadable electronic publications in the nature of articles, ebooks, research reports, and white papers in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; providing recognition and incentives by the way of awards to demonstrate excellence in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; providing training for certification in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; granting of educational degrees and certifications in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing educational test preparation services for exams in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; entertainment services, namely, providing online video games; electronic downloadable publications, namely, articles, ebooks, research reports, and white papers in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; downloadable videos, presentations, and podcasts in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities and data security; downloadable video game software; downloadable software applications for receiving content in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; downloadable software in the nature of mobile applications for receiving content in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; arranging and conducting business conferences and events for business purposes in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; arranging and conducting virtual business conferences online in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring an online marketplace for exchanging goods and services with other users; providing business networking opportunities for individuals in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing business information, news, and commentary in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing on-line employment information in the field of job resources and listings; membership club services, namely, providing information to members in the field of jobs in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing a website featuring an online marketplace for exchanging reviews of goods and services with other users; conducting business surveys; online business and social networking services for professionals in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security; providing online non-downloadable game software; computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers, form virtual communities, and engage in social networking services in the fields of computer networks, security, information security, electronic security, cyber security, privacy, risk management, marketing data, customer lead generation activities, and data security
NETWITNESS NEXT
NETWITNESS NEXT
Trademark
Word
Previous
ABANDONED
Owner:
Serial:98797336
Filed:Oct 14, 2024
Classes:9, 42
Goods & Services
computer software used in collection, analysis and monitoring of network traffic for maintenance of network security, enforcement of business policies, rules and procedures and prevention of intellectual property theft or loss, computer-based fraud and crime, and other incidents of network intrusion and misuse; software as a service for collecting, analyzing and monitoring of network traffic for maintenance of network security, enforcement of business policies, rules and procedures and prevention of intellectual property theft or loss, computer-based fraud and crime, and other incidents of network intrusion and misuse.
NWX
NWX
Trademark
Word
Previous
ABANDONED
Owner:
Serial:98799759
Filed:Oct 14, 2024
Classes:9
Goods & Services
computer hardware; computer network server; computer hardware used in connection with software for collecting, analyzing and monitoring of network traffic for maintenance of network security, enforcement of business policies, rules and procedures and prevention of intellectual property theft or loss, computer-based fraud and crime, and other incidents of network intrusion and misuse
RSA ID IQ
RSA ID IQ
Service Mark
Word
Previous
PENDING
Owner:
Serial:98388487
Filed:Feb 2, 2024
Classes:42
Goods & Services
"ID IQ"; Conducting surveys, namely online assessments of users' knowledge of cybersecurity
RSA RISK AI
RSA RISK AI
Trademark
Word
Previous
REGISTERED
Owner:
Serial:98302969
Filed:Dec 7, 2023
Classes:9, 42
Registration:7896191
Registered:Aug 19, 2025
Goods & Services
RISK AI; Software as a service (SaaS) featuring software for determining the security and validity of requests for access to data, managed workspaces, software applications, websites, and cloud, mobile and network resources; Software as a service (SaaS) featuring software for automatically customizing the authentication requirements to data, managed workspaces, software applications, websites, and cloud, mobile and network resources based on the calculated security and validity of a request for access; Software as a service (SaaS) featuring software for context-based and automated assessment and response to the security and validity of requests for access to data, managed workspaces, software applications, websites, and cloud, mobile and network resources; Software as a service (SaaS) featuring software for conducting and applying behavioral analytics on requests for access to data, managed workspaces, software applications, websites, and cloud, mobile and network resources.
SECURID
SECURID
Trademark
Combined
Previous
REGISTERED
Owner:
Serial:90776721
Filed:Jun 16, 2021
Classes:9, 42
Registration:7026924
Registered:Apr 11, 2023
Goods & Services
Downloadable software and recorded software, for computer and mobile device user identity authentication and access management, password authentication, sign-on control, and intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications, websites, and cloud, mobile and network resources; Downloadable software and recorded software, for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Downloadable software and recorded software, for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, websites, SaaS and cloud, and mobile and network resources; Downloadable software and recorded software, for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and access certification; Downloadable software and recorded software, for user identity and access authentication; Downloadable software and recorded software, and hardware, for providing computer and mobile device user identity authentication; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system, computer network, website, computer resource, or computer software to authenticate user identity; downloadable software featuring a non-predictable code calculator for accessing computer networks, websites, computer software, and computer resources; downloadable software featuring a non-predictable code calculator for accessing a host data bank computer; downloadable software for calculating the probable authenticity of computer or mobile device user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and cloud, mobile and network resources; Software as a service (SaaS) services featuring software for identity authentication and access management, password authentication, sign-on control, intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications, websites, and cloud, mobile and network resources; Cloud computing featuring software for identity authentication and access management, password authentication, sign-on control, intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications, websites, and cloud, mobile and network resources; Software as a service (SaaS) services featuring software for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Cloud computing featuring software for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Software as a service (SaaS) services featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, websites, SaaS and cloud, and mobile and network resources; Cloud computing featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, websites, SaaS and cloud, and mobile and network resources; Software as a service (SaaS) services featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and access certification; Cloud computing featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and access certification; Software as a service (SaaS) services featuring software for user identity and access authentication; Cloud computing featuring software for user identity and access authentication; Software as a service (SaaS) services featuring software for providing computer and mobile device user identity authentication via a mobile application; Cloud computing featuring software for providing computer and mobile device user identity authentication via a mobile application; Software as a service (SaaS) services featuring software used by an authorized user of a computer system, computer network, website, computer resource, or computer software to authenticate user identity; Cloud computing featuring software used by an authorized user of a computer system, computer network, website, computer resource, or computer software to authenticate user identity; Software as a service (SaaS) services featuring a non-predictable code calculator for accessing computer networks, websites, computer software, and computer resources; Cloud computing featuring a non-predictable code calculator for accessing computer networks, websites, computer software, and computer resources; Software as a service (SaaS) services featuring a non-predictable code calculator for accessing a host data bank computer; Cloud computing featuring a non-predictable code calculator for accessing a host data bank computer; Software as a service (SaaS) services featuring software for calculating the probable authenticity of computer or mobile device user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and cloud, mobile and network resources; Cloud computing featuring software for calculating the probable authenticity of computer or mobile device user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and cloud, mobile and network resources
NETWITNESS
NETWITNESS
Trademark
Combined
Previous
REGISTERED
Owner:
Serial:90687500
Filed:May 3, 2021
Classes:9, 42
Registration:7013337
Registered:Mar 28, 2023
Goods & Services
Downloadable software and software recorded on computer media for detecting, investigating, resolving, and automating response to computer security and computer network security threats, and for analyzing and reporting associated electronic data; Downloadable software and software recorded on computer media for digital forensics; Downloadable software and software recorded on computer media for computer and computer network security information and event management; Downloadable software and software recorded on computer media for collecting, analyzing, reporting, and storing computer log data; Downloadable software and software recorded on computer media for supporting computer and computer network security policy compliance and regulatory compliance; Downloadable software and software recorded on computer media for monitoring for, detecting and responding to electronic threats to computer network endpoints; Downloadable software and software recorded on computer media using artificial intelligence and behavioral analytics to detect, report, and analyze threats to computer and computer network security; Downloadable software and software recorded on computer media for orchestrating manual and automated workflows and responses to computer and computer network security threats; Downloadable software and software recorded on computer media for collaboration and case management in the fields of detecting, investigating, analyzing, reporting and resolving computer and computer network security threats; Software as a service (SaaS) featuring software for detecting, investigating, resolving, and automating response to computer security and computer network security threats, and for analyzing and reporting associated electronic data; Software as a service (SaaS) featuring software for digital forensics; Software as a service (SaaS)featuring software for computer and computer network security information and event management; Software as a service (SaaS) featuring software for collecting, analyzing, reporting, and storing computer log data; Software as a service (SaaS) featuring software for supporting computer and computer network security policy compliance and regulatory compliance; Software as a service (SaaS) featuring software for monitoring for, detecting and responding to electronic threats to computer network endpoints; Software as a service (SaaS) featuring software using artificial intelligence and behavioral analytics to detect, report, and analyze threats to computer and computer network security; Software as a service (SaaS) featuring software for orchestrating manual and automated workflows and responses to computer and computer network security threats; Software as a service (SaaS) featuring software for collaboration and case management in the fields of detecting, investigating, analyzing, reporting and resolving computer and computer network security threats
ARCHER ENGAGE
ARCHER ENGAGE
Trademark
Word
Previous
REGISTERED
Owner:
Serial:90981319
Filed:Apr 6, 2021
Classes:35
Registration:7626810
Registered:Dec 24, 2024
Goods & Services
Professional services, namely, business consulting in the fields of reviewing the business and data governance practices of others to identify deficiencies and inefficiencies, identifying and suggesting improvements accomplished via use of proprietary technology and changes to best practices, designing and implementing the same, and reviewing the effects of the changes and suggesting further improvements and refinements | IT support services, namely, customizing computer software configurations to the specifications of others; Platform as a service (PAAS) featuring computer software platforms for hosting computer software applications of others used to design, automate, monitor, enforce, and track business processes, collect, store, display. and analyze associated data, and generate reports; Software as a service (SAAS) services featuring software to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; Software as a service (SAAS) services featuring software development tools used to design and deploy software applications used to define and automate business processes
ARCHER ENGAGE
ARCHER ENGAGE
Trademark
Word
Previous
ABANDONED
Owner:
Serial:90626275
Filed:Apr 6, 2021
Classes:9
Goods & Services
Downloadable software used to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; downloadable computer software development tools used to design and deploy software applications used to define and automate business processes
ARCHERENGAGE
ARCHERENGAGE
Trademark
Combined
Previous
ABANDONED
Owner:
Serial:90626281
Filed:Apr 6, 2021
Classes:9
Goods & Services
Downloadable software used to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; downloadable computer software development tools used to design and deploy software applications used to define and automate business processes
ARCHERENGAGE
ARCHERENGAGE
Service Mark
Combined
Previous
REGISTERED
Owner:
Serial:90981335
Filed:Apr 6, 2021
Classes:35, 42
Registration:7663096
Registered:Jan 21, 2025
Goods & Services
Professional services, namely, business consulting in the fields of reviewing the business and data governance practices of others to identify deficiencies and inefficiencies, identifying and suggesting improvements accomplished via use of proprietary technology and changes to best practices, designing and implementing the same, and reviewing the effects of the changes and suggesting further improvements and refinements; IT support services, namely, customizing computer software configurations to the specifications of others; Platform as a service (PAAS) featuring computer software platforms for hosting computer software applications of others used to design, automate, monitor, enforce, and track business processes, collect, store, display. and analyze associated data, and generate reports; Software as a service (SAAS) services featuring software to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; Software as a service (SAAS) services featuring software development tools used to design and deploy software applications used to define and automate business processes
ARCHER
ARCHER
Trademark
Combined
Previous
ITU
PENDING
Owner:
Serial:90411192
Filed:Dec 24, 2020
Classes:9, 35, 42
Goods & Services
Providing downloadable software used to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; downloadable computer software development tools used to design and deploy software applications used to define and automate business processes; none of the foregoing for use in the fields of vehicles, transportation, or logistics; Professional services, namely, identifying and proposing technical solutions and technical support services, namely, business consultation for corporate compliance programs and business risk management; none of the foregoing for use in the fields of vehicles, transportation, or logistics; IT support services, namely, customizing computer software configurations to the specifications of others; Platform as a service (PAAS) featuring computer software platforms for hosting computer software applications of others used to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; Software as a service (SAAS) services featuring software to design, automate, monitor, enforce, and track business processes, collect, store, display, and analyze associated data, and generate reports; Software as a service (SAAS) services featuring software development tools used to design and deploy software applications used to define and automate business processes; none of the foregoing for use in the fields of vehicles, transportation, or logistics.
ARCHER
ARCHER
Trademark
Word
Previous
REGISTERED
Owner:
Serial:88757606
Filed:Jan 13, 2020
Classes:9
Registration:6931447
Registered:Dec 20, 2022
Goods & Services
Downloadable or recorded computer software in the field of risk and compliance management, namely, software used to design, automate, monitor, enforce, and track business processes in the field of risk and compliance management; downloadable or recorded computer database software used to collect, store, analyze and generate reports on risk and compliance management processes; downloadable or recorded computer software development tools used to design and deploy software applications used to define and automate business processes in the field of risk and compliance management; downloadable or recorded computer software used to control user access to information stored on computer networks | Professional services, namely, identifying and proposing technical solutions and technical support services, namely, business consultation for corporate compliance programs and business risk management | Platform as a service (PAAS) featuring computer software platforms for hosting computer software applications of others for use in risk and compliance management; computer services, namely, design of computer software applications for use in risk and compliance management
RSA
RSA
Trademark
Word
Previous
REGISTERED
Owner:
Serial:88149695
Filed:Oct 10, 2018
Classes:9, 35, 41, +1
Registration:5768047
Registered:Jun 4, 2019
Goods & Services
Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, and data security; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, and data security; Identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; Software for automating authentication and governance of identity over the internet and other computer networks; Software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; Software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (SMS), and voice one time password (OTP), biometric software and hardware for providing computer and mobile device user identity authentication; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to authenticate user identity; Computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, software applications, digital devices, digital data, and mobile devices; Software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; Software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; Integrated risk management software for risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for electronic fraud and identity theft detection and prevention; Software for detecting, monitoring, managing and preventing fraud, financial crime, cybercrime, cyber threats, cyber-attacks, security attacks and intrusions; software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Software for managing user identity authentication and access privileges to aid in compliance with regulatory requirements; non-predictable code calculators, namely, computer hardware and computer software that generate security access codes for accessing host data bank computers; and computer software programs that issue and manage digital user indentities and access privileges for electronic commerce and security; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, and data security; Providing on-line employment listings in the fields of computer networks, computer security, information security, electronic security, cyber security, and data security; Software as a service (SaaS) services and cloud computing featuring identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; Software as a service (SaaS) services and cloud computing featuring software for automating authentication and governance of identity over the internet and other computer networks; Software as a service (SaaS) services and cloud computing featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; Software as a service (SaaS) services and cloud computing featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (SMS), and voice one time password (OTP), biometric software and hardware for providing computer and mobile device user identity authentication; Software as a service (SaaS) services and cloud computing featuring computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Software as a service (SaaS) services and cloud computing featuring software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, software applications, digital devices, digital data, and mobile devices; Software as a service (SaaS) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; Software as a service (SaaS) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; Software as a service (SaaS) services and cloud computing featuring integrated risk management software for risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software as a service (SaaS) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software as a service (SaaS) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (SaaS) services and cloud computing featuring software for detecting, monitoring, managing and preventing fraud, financial crime, cybercrime, cyber threats, cyber-attacks, security attacks and intrusions; Software as a service (SaaS) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Software as a service (SaaS) services and cloud computing featuring software for managing user identity authentication and access privileges to aid in compliance with regulatory requirements; Authentication, issuance and validation of digital certificates; Identification verification services, namely, electronic credential verification services using technology to authenticate user identity; Providing user authentication services using multi-factor authentication for e-commerce transactions; Providing fraud detection services in the nature of electronic monitoring of electronic funds transfer, credit and debit card and electronic check transactions activity to detect fraud via the internet and digital platforms; Consulting services in the field of maintaining the security and integrity of databases in the nature of protecting data and information from unauthorized access; Consultation in the field of computer security to prevent data theft and identity theft
RSA
RSA
Service Mark
Word
Previous
REGISTERED
Owner:
Serial:85322184
Filed:May 16, 2011
Classes:42
Registration:4070748
Registered:Dec 13, 2011
Goods & Services
Computer forensic services; Consulting services in the field of cloud computing; Computer services, namely, integration of private and public cloud computing environments; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Computer services, namely, encrypted data recovery services; Data encryption and decoding services; Design and development of electronic data security systems; Internet Protocol (IP) address verification services; Providing electronic verification of on-line orders of digital content and generating electronic permission codes which then allow users to access said digital content; Computer security consultancy
RSA
RSA
Service Mark
Word
Previous
REGISTERED
Owner:
Serial:85322231
Filed:May 16, 2011
Classes:45
Registration:4070749
Registered:Dec 13, 2011
Goods & Services
Authentication, issuance and validation of digital certificates; Identification verification services, namely, providing authentication of personal identification information; Providing user authentication services in e-commerce transactions; Providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Consulting services in the field of maintaining the security and integrity of databases; Regulatory compliance consulting; Consultation in the field of data theft and identity theft
ARCHER
ARCHER
Trademark
Word
Previous
REGISTERED
Owner:
Serial:85122192
Filed:Sep 2, 2010
Classes:35
Registration:4140981
Registered:May 15, 2012
Goods & Services
Computer software for managing risks and ensuring compliance in support of governance mandates | Professional services, namely, identifying and proposing technical solutions and technical support services, namely, business consultation for and implementation of business risk management and corporate compliance programs
NETWITNESS
NETWITNESS
Trademark
Word
Previous
REGISTERED
Owner:
Serial:76313255
Filed:Sep 17, 2001
Classes:9
Registration:2674324
Registered:Jan 14, 2003
Goods & Services
COMPUTER SOFTWARE USED IN COLLECTION, ANALYSIS AND MONITORING OF NETWORK TRAFFIC FOR MAINTENANCE OF NETWORK SECURITY, ENFORCEMENT OF BUSINESS POLICIES, RULES AND PROCEDURES AND PREVENTION OF INTELLECTUAL PROPERTY THEFT OR LOSS, COMPUTER-BASED FRAUD AND CRIME, AND OTHER INCIDENTS OF NETWORK INTRUSION AND MISUSE
RSA
RSA
Trademark
Word
Previous
REGISTERED
Owner:
Serial:75697271
Filed:May 4, 1999
Classes:9
Registration:2464394
Registered:Jun 26, 2001
Goods & Services
NON-PREDICTABLE CODE CALCULATORS, NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT GENERATE SECURITY ACCESS CODES FOR ACCESSING HOST DATA BANK COMPUTERS; AND COMPUTER SOFTWARE PROGRAMS THAT ISSUE AND MANAGE DIGITAL USER INDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC COMMERCE AND SECURITY
SECURID
SECURID
Trademark
Stylized
Previous
REGISTERED
Owner:
Serial:74330353
Filed:Nov 12, 1992
Classes:9
Registration:1778802
Registered:Jun 29, 1993
Goods & Services
computer security device, specifically a non-predictable code calculator for accessing a host data bank computer

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.