Sev1Tech, Inc.
4 Marks
Corp.
First Filed:Nov 29, 2017Latest Filed:Feb 5, 2019Address:Suite 306, Woodbridge, VA 22192
Portfolio Overview
Registered
3(75%)Dead
1(25%)Previous
1Top Classes
Class 42
Software, IT Services & Scientific ResearchTTAB Proceedings
No litigation activity
Top Firms
Hopkins IP, LLC(Feb 2019)
5
Trademark Portfolio
5 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
4
1
Status
4
0
0
1
0
Mark Type
3
0
0
2
0
5
Goods & Services
Information Technology consulting services, namely, technological consultation in the technology field of computer hardware systems; advice on designing, selecting, and using IT platforms in the nature of computer hardware and systems; platform support services, namely, trouble-shooting in the nature of diagnosing integrated computer hardware and software solutions problems; support services, namely, trouble-shooting software configuration problems; computer system architecture services for others; IT computer systems analysis; interconnecting computer systems, hardware and software, namely, system integration, networks and software configurations; testing computer software and hardware configurations, namely, testing operational functionality of software, desktops and servers; software installation, configuration, updating and maintenance; IT consulting in the field of information management and strategies, namely, program development and implementation, acquisition strategies and support, Information Technology Infrastructure Library ("ITIL"), enterprise solutions and business automation; providing consulting and support services in the area of cyber security, namely, Virtual Private Network ("VPN") configuration, optimization, and public key infrastructure ("PKI"), evaluation of intrusion detection and prevention risks and capabilities, software application security, firewalls, installation and configuration of intrusion detection and prevention systems, compliance with The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and The Health Information Technology for Economic and Clinical Health Act ("HITECH Act"); and performance of data and network security audits, namely, data breach threat analysis, database security analysis, firewall audits, penetration testing, advising in security architecture, assessment of risks from social engineering, web site security risks and wireless security risks; computer software consultation in the nature of program management and strategic consulting services in the field of Agile Program Management, software development, and Development Operations (DevOps); computer technology support services and advice on the implementation of computer hardware IT and IT systems that align with customer goals and objectives
Goods & Services
"SECURE" AND "CONNECT" AND "IT"; Information Technology consulting services, namely, technological consultation in the technology field of computer hardware systems; advice on designing, selecting, and using IT platforms in the nature of computer hardware and systems; platform support services, namely, trouble-shooting in the nature of diagnosing integrated computer hardware and software solutions problems; support services, namely, trouble-shooting software configuration problems; computer system architecture services for others; IT computer systems analysis; interconnecting computer systems, hardware and software, namely, system integration, networks and software configurations; testing computer software and hardware configurations, namely, testing operational functionality of software, desktops and servers; software installation, configuration, updating and maintenance; IT consulting in the field of information management and strategies, namely, program development and implementation, acquisition strategies and support, Information Technology Infrastructure Library ("ITIL"), enterprise solutions and business automation; providing consulting and support services in the area of cyber security, namely, Virtual Private Network ("VPN") configuration, optimization, and public key infrastructure ("PKI"), evaluation of intrusion detection and prevention risks and capabilities, software application security, firewalls, installation and configuration of intrusion detection and prevention systems, compliance with The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and The Health Information Technology for Economic and Clinical Health Act ("HITECH Act"); and performance of data and network security audits, namely, data breach threat analysis, database security analysis, firewall audits, penetration testing, advising in security architecture, assessment of risks from social engineering, web site security risks and wireless security risks; computer software consultation in the nature of program management and strategic consulting services in the field of Agile Program Management, software development, and Development Operations (DevOps); computer technology support services and advice on the implementation of computer hardware IT and IT systems that align with customer goals and objectives
Goods & Services
Information Technology consulting services, namely, technological consultation in the technology field of computer hardware systems; advice on designing, selecting, and using IT platforms in the nature of computer hardware and systems; platform support services, namely, trouble-shooting in the nature of diagnosing integrated computer hardware and software solutions problems; support services, namely, trouble-shooting software configuration problems; computer system architecture services for others; IT computer systems analysis; interconnecting computer systems, hardware and software, namely, system integration, networks and software configurations; testing computer software and hardware configurations, namely, testing operational functionality of software, desktops and servers; software installation, configuration, updating and maintenance; IT consulting in the field of information management and strategies, namely, program development and implementation, acquisition strategies and support, Information Technology Infrastructure Library ("ITIL"), enterprise solutions and business automation; providing consulting and support services in the area of cyber security, namely, Virtual Private Network ("VPN") configuration, optimization, and public key infrastructure ("PKI"), evaluation of intrusion detection and prevention risks and capabilities, software application security, firewalls, installation and configuration of intrusion detection and prevention systems, compliance with The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and The Health Information Technology for Economic and Clinical Health Act ("HITECH Act"); and performance of data and network security audits, namely, data breach threat analysis, database security analysis, firewall audits, penetration testing, advising in security architecture, assessment of risks from social engineering, web site security risks and wireless security risks; computer software consultation in the nature of program management and strategic consulting services in the field of Agile Program Management, software development, and Development Operations (DevOps); computer technology support services and advice on the implementation of computer hardware IT and IT systems that align with customer goals and objectives
Goods & Services
Computer consulting services; advice on designing, selecting, and using computer hardware and systems; technical support services, namely, trouble-shooting in the nature of diagnosing computer hardware and server problems; technical support services, namely, trouble-shooting computer software problems; computer system design services for others; computer systems analysis; interconnecting computer hardware and software, namely, integrating computer systems, networks and software; testing computer software and hardware, namely, testing operation and functionality of software, computers and servers; software installation, updating and maintenance; consulting in the field of information technology management and strategies, namely, program development and implementation, acquisition strategies and support, Information Technology Infrastructure Library ("ITIL"), enterprise solutions and business automation; providing consulting and support services in the area of cyber security, namely, Virtual Private Network ("VPN") installation, optimization and configuration, public key infrastructure ("PKI"), evaluation of intrusion detection and prevention risks and capabilities, software application security, firewalls, installation and configuration of intrusion detection and prevention systems, compliance with The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and The Health Information Technology for Economic and Clinical Health Act ("HITECH Act"); and performance of data and network security audits, namely, data breach threat analysis, database security analysis, firewall audits, penetration testing, advising in security architecture, assessment of risks from social engineering, web site security risks and wireless security risks