Torq Technologies Ltd.
5 Marks
Other
First Filed:Aug 9, 2022Latest Filed:Mar 11, 2026Address:21 Ha'arbaa St., Tel-Aviv, 6473921, IL
Portfolio Overview
Registered
2(40%)Pending
3(60%)Top Classes
Class 42
Software, IT Services & Scientific ResearchTTAB Proceedings
No litigation activity
Top Firms
BRIDGE INTELLECTUAL PROPERTY...(Sep 2024)
4
Trademark Portfolio
5 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
5
0
Status
2
3
0
0
0
Mark Type
4
0
0
1
0
5
Goods & Services
Software as a service (SAAS) services featuring software for the automation of security operations activities, including incident response investigation, and analysis, threat and vulnerability management, event workflow and response, mitigation and remediation orchestration, and security intelligence reporting; IT services, namely, IT consultancy services relating to installation, maintenance and repair of computer software; Software as a Service (SAAS) services featuring software for automating IT security, protection and restoration services in the nature of securing virtual and physical infrastructure and security operations activities, including incident response investigation, and analysis, threat and vulnerability management, event workflow and response, mitigation and remediation orchestration, and security intelligence reporting; Data security consultancy; Providing temporary use of on-line non-downloadable enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; Computer network security consultation in the field of incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; computer consultancy services in the field of computer software and network software security vulnerabilities; computer consultancy services in the field of computer security systems via a global computer network; monitoring of computer systems operation by remote access for security purposes, namely, integrating vulnerability testing, vulnerability prioritization and remediation, managing testing and scanning tools, providing application risk visibility to detect breakdowns and unauthorized access or data breach, and to ensure proper functioning; Consultancy in the field of security software
Goods & Services
Software as a service (SAAS) services featuring software for the automation of security operations activities, including incident response investigation, and analysis, threat and vulnerability management, event workflow and response, mitigation and remediation orchestration, and security intelligence reporting; IT services, namely, IT consultancy services relating to installation, maintenance and repair of computer software; Software as a Service (SAAS) services featuring software for automating IT security, protection and restoration services in the nature of securing virtual and physical infrastructure and security operations activities, including incident response investigation, and analysis, threat and vulnerability management, event workflow and response, mitigation and remediation orchestration, and security intelligence reporting; Data security consultancy; Providing temporary use of on-line non-downloadable enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; Computer network security consultation in the field of incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; computer consultancy services in the field of computer and network security vulnerabilities; computer consultancy services in the field of computer security systems via a global computer network; monitoring of computer systems operation by remote access for security purposes, namely, integrating vulnerability testing, vulnerability prioritization and remediation, managing testing and scanning tools, providing application risk visibility to detect breakdowns and unauthorized access or data breach, and to ensure proper functioning; Consultancy in the field of security software
Goods & Services
Software as a service (SAAS) services featuring software for the automation of security operations activities, including incident response investigation, and analysis, threat and vulnerability management, event workflow and response, mitigation and remediation orchestration, and security intelligence reporting; IT services, namely, IT consultancy services; Software as a Service (SAAS) services featuring software for automating IT security, protection and restoration services in the nature of securing virtual and physical infrastructure and security operations activities, including incident response investigation, and analysis, threat and vulnerability management, event workflow and response, mitigation and remediation orchestration, and security intelligence reporting; Data security consultancy; Providing temporary use of on-line non-downloadable enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; Computer network security consultation in the field of incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; computer consultancy services in the field of computer and network security vulnerabilities; computer consultancy services in the field of computer security systems via a global computer network; monitoring of computer systems operation by remote access for security purposes, namely, integrating vulnerability testing, vulnerability prioritization and remediation, managing testing and scanning tools, providing application risk visibility to detect breakdowns and unauthorized access or data breach, and to ensure proper functioning; Consultancy in the field of security software | Licensing of software
Goods & Services
Software as a service (SAAS) services featuring software for the automation of security operations activities, including incident response investigation, and analysis, threat and vulnerability management, event workflow and response, mitigation and remediation orchestration, and security intelligence reporting; IT services, namely, IT consultancy services; Software as a Service (SAAS) services featuring software for automating IT security, protection and restoration services in the nature of securing virtual and physical infrastructure and security operations activities, including incident response investigation, and analysis, threat and vulnerability management, event workflow and response, mitigation and remediation orchestration, and security intelligence reporting; Data security consultancy; Providing temporary use of on-line non-downloadable enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; Computer network security consultation in the field of incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; computer consultancy services in the field of computer and network security vulnerabilities; computer consultancy services in the field of computer security systems via a global computer network; monitoring of computer systems operation by remote access for security purposes, namely, integrating vulnerability testing, vulnerability prioritization and remediation, managing testing and scanning tools, providing application risk visibility to detect breakdowns and unauthorized access or data breach, and to ensure proper functioning; Consultancy in the field of security software | Licensing of software