STEALTHbits Technologies, Inc. logo

STEALTHbits Technologies, Inc.

22 Marks
Corp.
First Filed:Aug 23, 2007Latest Filed:Jan 28, 2021Address:200 Central Ave, Hawthorne, NJ 07506

Portfolio Overview

Registered
6(27%)
Dead
16(73%)

Top Classes

Class 9
Electronics, Software & Scientific Equipment
21(95%)
Class 42
Software, IT Services & Scientific Research
4(18%)
Class 35
Advertising, Business Services & Retail
1(5%)

TTAB Proceedings

Total Proceedings
2
As Plaintiff
2(100%)
As Defendant
0(0%)

Top Firms

THE NELROD COMPANY(Jan 2021)
19

Trademark Activity Timeline(2007 – 2021)

Trademark Portfolio

22 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
WHO? WHAT? WHERE? WHEN?
WHO? WHAT? WHERE? WHEN?
Service Mark
Word
ABANDONED
Owner:
Serial:90495335
Filed:Jan 28, 2021
Classes:42
ANYDATA
ANYDATA
Trademark
Word
ABANDONED
Owner:
Serial:90211060
Filed:Sep 25, 2020
Classes:9
ANYID
ANYID
Trademark
Word
ABANDONED
Owner:
Serial:90211039
Filed:Sep 25, 2020
Classes:9
IDENTITY INDEX
IDENTITY INDEX
Trademark
Word
ABANDONED
Owner:
Serial:90033735
Filed:Jul 2, 2020
Classes:9
IDENTITYINDEX
IDENTITYINDEX
Trademark
Word
ABANDONED
Owner:
Serial:90033753
Filed:Jul 2, 2020
Classes:9
ID INDEX
ID INDEX
Trademark
Word
ABANDONED
Owner:
Serial:90033721
Filed:Jul 2, 2020
Classes:9
IDINDEX
IDINDEX
Trademark
Word
ABANDONED
Owner:
Serial:90033747
Filed:Jul 2, 2020
Classes:9
BRING YOUR OWN VAULT
ABANDONED
Owner:
Serial:88478646
Filed:Jun 18, 2019
Classes:9
BYOV
BYOV
Trademark
Word
REGISTERED
Owner:
Serial:88478649
Filed:Jun 18, 2019
Classes:9
Registration:6486805
Registered:Sep 14, 2021
Goods & Services
Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for management of information technology compliance and information technology governance; Downloadable computer software for managing configuration of computers, software, and network devices
PRIVILEGED ACTIVITY MANAGEMENT
ABANDONED
Owner:
Serial:88478606
Filed:Jun 18, 2019
Classes:9
SBPAM
SBPAM
Trademark
Word
REGISTERED
Owner:
Serial:88478641
Filed:Jun 18, 2019
Classes:9
Registration:6502843
Registered:Sep 28, 2021
Goods & Services
Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for management of information technology compliance and information technology governance; Downloadable computer software for managing configuration of computers, software, and network devices
STEALTHBITS ACTIVITY MONITOR
REGISTERED
Owner:
Serial:88478661
Filed:Jun 18, 2019
Classes:9
Registration:6486806
Registered:Sep 14, 2021
Goods & Services
"ACTIVITY MONITOR"
STEALTHBITS FILE ACTIVITY MONITOR
REGISTERED
Owner:
Serial:88478668
Filed:Jun 18, 2019
Classes:9
Registration:6486807
Registered:Sep 14, 2021
Goods & Services
"FILE ACTIVITY MONITOR"
STEALTHBITS PRIVILEGED ACTIVITY MANAGER
Owner:
Serial:88478630
Filed:Jun 18, 2019
Classes:9
Goods & Services
"PRIVILEGED ACTIVITY MANAGER"
STEALTHRECOVER
STEALTHRECOVER
Trademark
Word
CANCELLED
Owner:
Serial:87337183
Filed:Feb 15, 2017
Classes:9
Registration:5623309
Registered:Dec 4, 2018
Goods & Services
Software that provides rollback and recovery options for objects in active directories
STEALTHDEFEND
STEALTHDEFEND
Trademark
Word
CANCELLED
Owner:
Serial:87111972
Filed:Jul 21, 2016
Classes:9
Registration:5763887
Registered:May 28, 2019
Goods & Services
Software that detects authentication-based attacks in real time by leveraging user behavior analytics to profile user behavior and discerns abnormalities indicative of an attack
STEALTHSEEK
STEALTHSEEK
Trademark
Word
CANCELLED
Owner:
Serial:85803454
Filed:Dec 14, 2012
Classes:9
Registration:4375874
Registered:Jul 30, 2013
STEALTHTOOLS
STEALTHTOOLS
Trademark
Word
CANCELLED
Owner:
Serial:85803424
Filed:Dec 14, 2012
Classes:9
Registration:4375871
Registered:Jul 30, 2013
STEALTHINTERCEPT
STEALTHINTERCEPT
Trademark
Word
CANCELLED
Owner:
Serial:85365451
Filed:Jul 7, 2011
Classes:9
Registration:4330146
Registered:May 7, 2013
WHO? WHAT? WHERE? WHEN?
CANCELLED
Owner:
Serial:76705882
Filed:Jan 3, 2011
Classes:9, 35, 42
Registration:4495022
Registered:Mar 11, 2014
Goods & Services
Class 009: Computer hardware; Computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; computer for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; computer software to automate, control, improve, manage and administer computer security and compliance; computer software for information technology risk and compliance, and information technology governance; and computer software to manage configuration of computers, software and network devices; Class 035: Strategic consultation in the field of computer software, compliance and risk management, network management and network security, information technology risk and compliance, and information technology governance, namely, business analysis and business strategic planning services in the technology industry; Class 042: Computer programming services; technical consultation in the field of computer software, compliance and risk management, network management and network security, information technology risk and compliance, and information technology governance; computer support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems and help desk services
STEALTHAUDIT
STEALTHAUDIT
Trademark
Word
REGISTERED
Owner:
Serial:76681068
Filed:Aug 23, 2007
Classes:9, 42
Registration:3668046
Registered:Aug 18, 2009
Goods & Services
Computer hardware; computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; computer software to automate, control, improve, manage and administer computer security and compliance; computer software for information technology risk and compliance, and information technology governance; and computer software to manage configuration of computers, software, and network devices; [ Computer programming services; technical and strategic consultation in the field of computer software, network management and network security, and information technology governance; and technical support services, namely, providing updates to software applications, building and creating custom solutions utilizing techniques and operations provided within software applications, and providing assistance in the nature of troubleshooting software problems for users of software applications via the world wide web, Internet, and/or telephone ]
STEALTHBITS
STEALTHBITS
Trademark
Word
REGISTERED
Owner:
Serial:76681069
Filed:Aug 23, 2007
Classes:9, 42
Registration:3668047
Registered:Aug 18, 2009
Goods & Services
Computer hardware; computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; computer software to automate, control, improve, manage and administer computer security and compliance; computer software for information technology risk and compliance, and information technology governance; and computer software to manage configuration of computers, software, and network devices; [ Computer programming services; technical and strategic consultation in the field of computer software, network management and network security, and information technology governance; and technical support services, namely, providing updates to software applications, building and creating custom solutions utilizing techniques and operations provided within software applications, and providing assistance in the nature of troubleshooting software problems for users of software applications via the world wide web, Internet, and/or telephone ]

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.