Secuvant, LLC logo

Secuvant, LLC

7 Marks
LLC
First Filed:Apr 30, 2018Latest Filed:Apr 30, 2018Address:Suite 500, Salt Lake City, UT 84101

Portfolio Overview

Registered
5(71%)
Dead
2(29%)

Top Classes

Class 42
Software, IT Services & Scientific Research
7(100%)

TTAB Proceedings

Total Proceedings
1
As Plaintiff
0(0%)
As Defendant
1(100%)

Top Firms

TechLaw Ventures, PLLC(Apr 2018)
7

Trademark Portfolio

7 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
CYBER7
CYBER7
Service Mark
Word
CANCELLED
Owner:
Serial:87901398
Filed:Apr 30, 2018
Classes:42
Registration:5797178
Registered:Jul 9, 2019
Goods & Services
Computer security consulting and computer system and network security services, namely, detecting, analyzing, and prioritizing cyber security risks and recommending procedures to reduce or prevent security risks
CYBERGRA
CYBERGRA
Service Mark
Word
REGISTERED
Owner:
Serial:87901381
Filed:Apr 30, 2018
Classes:42
Registration:5974809
Registered:Feb 4, 2020
Goods & Services
Computer consulting services and computer security consultancy for gap and risk assessment of computer system and network risk detection, assessment, management, and gap and risk assessment of cybersecurity risks and recommendations for cybersecurity protection improvements
CYBERMDR
CYBERMDR
Service Mark
Word
CANCELLED
Owner:
Serial:87901384
Filed:Apr 30, 2018
Classes:42
Registration:5741912
Registered:Apr 30, 2019
Goods & Services
Computer security consultancy services in the field of managed detection and response to threats, security incident response and forensics and monitoring of security infrastructure including firewalls and intrusion detection and prevention for end-points, anti-virus and malware, information technology systems, computers, mobile devices, cloud services, hosted servers and systems, networks, computer data, data collection logs, internet connections, databases, application servers and back up and other storage devices and services
CYBER RISK IS BUSINESS RISK
REGISTERED
Owner:
Serial:87901374
Filed:Apr 30, 2018
Classes:42
Registration:6121626
Registered:Aug 11, 2020
Goods & Services
"CYBER RISK"
CYBERRPM
CYBERRPM
Service Mark
Word
REGISTERED
Owner:
Serial:87901391
Filed:Apr 30, 2018
Classes:42
Registration:5974810
Registered:Feb 4, 2020
Goods & Services
Computer consulting services and computer security consultancy concerning risk program management of computer system and network risk management planning and policy implementation
S C V
S C V
Service Mark
Combined
REGISTERED
Owner:
Serial:87901367
Filed:Apr 30, 2018
Classes:42
Registration:6121625
Registered:Aug 11, 2020
Goods & Services
Computer security consultancy and information technology security services in the nature of providing network and system risk assessment, testing, monitoring, evaluation and security incident response; cybersecurity consultancy; information technology strategy services, namely, security engineering; design of information technology security systems for clients; information technology security system consulting for clients concerning security gap and risk identification, recommendations and bespoke services; cybersecurity consultancy and information technology mapping services, namely, identifying gaps and risks in information technology systems matching them to recommended controls; cybersecurity consultancy and information technology implementation consulting services concerning security data collection for the purpose of monitoring information technology systems and security control implementation, namely, firewall rules, policies and procedures, cybersecurity threat sensors, and security control systems; security detection services, namely, computer security services, namely, restricting unauthorized access to hard drives, computer networks, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, administering digital certificates, and monitoring of computer systems for protecting data from unauthorized access and computer threat detection; software as a service (SAAS) services featuring software for computer system and network risk detection, assessment, management, gap and risk assessment, and risk management planning and policy implementation; providing temporary use of a non-downloadable web-based software application for computer risk detection, assessment, management, project management, compliance and governance reporting, policy and procedure templates to assist clients in implementing information security policies and procedures, maturity modeling, maturity trending and tracking, risk and gap reporting, threat identification, and risk scoring; computer security consulting services concerning computer security strategy and architecture
SECUVANT
SECUVANT
Service Mark
Word
REGISTERED
Owner:
Serial:87901350
Filed:Apr 30, 2018
Classes:42
Registration:6187555
Registered:Nov 3, 2020
Goods & Services
Computer security consultancy and information technology security services in the nature of providing network and system risk assessment, testing, monitoring, evaluation and security incident response; cybersecurity consultancy; information technology strategy services, namely, security engineering; design of information technology security systems for clients; information technology security system consulting for clients concerning security gap and risk identification, recommendations and bespoke services; cybersecurity consultancy and information technology mapping services, namely, identifying gaps and risks in information technology systems matching them to recommended controls; cybersecurity consultancy and information technology implementation consulting services concerning security data collection for the purpose of monitoring information technology systems and security control implementation, namely, firewall rules, policies and procedures, cybersecurity threat sensors, and security control systems; security detection services, namely, computer security services, namely, restricting unauthorized access to hard drives, computer networks, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, administering digital certificates, and monitoring of computer systems for protecting data from unauthorized access and computer threat detection; software as a service (SAAS) services featuring software for computer system and network risk detection, assessment, management, gap and risk assessment, and risk management planning and policy implementation; providing temporary use of a non-downloadable web-based software application for computer risk detection, assessment, management, project management, compliance and governance reporting, policy and procedure templates to assist clients in implementing information security policies and procedures, maturity modeling, maturity trending and tracking, risk and gap reporting, threat identification, and risk scoring; computer security consulting services concerning computer security strategy and architecture

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.