TRAPP TECHNOLOGY, INC.
19 Marks
Corp.
First Filed:Apr 14, 2014Latest Filed:May 2, 2024Address:2600 N. Central Ave., 11th Floor, Phoenix, AZ 85004
Portfolio Overview
Registered
10(53%)Pending
1(5%)Dead
8(42%)Top Classes
Class 42
Software, IT Services & Scientific ResearchClass 38
TelecommunicationsClass 41
Education and EntertainmentTTAB Proceedings
No litigation activity
Top Firms
NOBLITT & NEWSON, PLLC(May 2024)
17
Trademark Activity Timeline(2014 – 2025)
- Filings
- Registrations
Trademark Portfolio
19 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
19
0
Status
10
1
6
2
0
Mark Type
11
0
3
5
0
3
1
1
6
4
Goods & Services
Educational services, namely, arranging, organizing, conducting, and presenting educational classes, non-downloadable webinars, and online instruction, all in the field of computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; Downloadable computer network and security threat management software; computer and network security threat management hardware in the nature of computer hardware for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices; Computer security services, namely, security information and event management (SIEM) in the nature of monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior; managed computer security services, namely, online scanning, detecting, quarantining and eliminating of malware and viruses on computers and electronic devices for the purposes of defending endpoint devices from data tampering and breaches in real-time; software as a service (SAAS) services featuring software for security information and event management (SIEM) being real-time monitoring and threat analysis for protecting data; platform as a service (PAAS) services featuring computer software platforms for performing security information and event management (SIEM) being real-time monitoring and threat analysis for protecting data; providing temporary use of non-downloadable computer software for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; providing temporary use of non-downloadable computer software for the automation of tasks in the field of security and network incident remediation; managed computer security services, namely, security threat analysis in the nature of monitoring, reporting, analyzing, and remediating of events collected from computer network and security devices for the purposes of protecting data and restricting unauthorized network access; computer security consultancy in the field of security incident and breach response and remediation; computer security consulting, namely, computer and network security assessment and testing services to diagnose areas of vulnerability and risk to prioritize remediation; providing temporary use of on-line non-downloadable cloud computing computer and network security software for network and application security for the purposes of protecting data and restricting unauthorized network access; software as a service (SAAS) services featuring software for hosting of computer and network security software for use by others for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; computer software and computer management security services in the field of malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time
Owner:
Serial:98528044
Filed:Apr 30, 2024
Classes:37, 38, 42
Registration:7729269
Registered:Mar 18, 2025
Goods & Services
Providing virtual private network (VPN) services; telecommunications access services; providing telecommunications connections to global computer networks; providing blended bandwidth telecommunications connections to global computer networks; providing telecommunication connections to the internet or databases; telecommunications services for providing multiple-user access to a global computer network; voice over internet protocol (VOIP) services; providing voice and video chat services; providing voice and video conferencing services; hosted PBX services; and wireless PBX services; IT consulting services relating to installation, maintenance and repair of computer hardware; "TECHNOLOGY"; Computer services, namely, cloud hosting provider services; Providing online, nondownloadable computer software platforms for providing access to virtual computer desktops and virtual computer environments through cloud computing; hosting of digital content on the Internet; Infrastructure as a service (IAAS) services, namely, hosting virtual and non-virtual application servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers for use by others; Application service provider (ASP), namely, hosting computer software applications of others; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; IT consulting services relating to installation, maintenance and repair of computer software; IT integration services; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public, private and hybrid cloud computing IT and application systems; Technical support, namely, monitoring technological functions of computer network systems, featuring computer network monitoring, firewall monitoring, and bandwidth usage, connectivity, and availability monitoring on a global computer network; Computer security services, namely, security information and event management (SIEM) being real-time monitoring and threat analysis for protecting data; Managed computer security services, namely, online scanning, detecting, quarantining and eliminating of malware and viruses on computers and electronic devices for the purposes of defending endpoint devices from data tampering and breaches in real-time; Software as a service (SAAS) services featuring a software for security information and event management (SIEM) being real-time monitoring and threat analysis for protecting data; Platform as a service (PAAS) services featuring a computer software platforms for performing SIEM security information and event management (SIEM) being real-time monitoring and threat analysis for protecting data; Managed computer security services, namely, security threat analysis in the nature of monitoring, reporting, analyzing, and remediating of events collected from computer network and security devices for the purposes of protecting data and restricting unauthorized network access; Computer security consultancy in the field of security incident and breach response and remediation; software as a service (SAAS) services featuring software for hosting of computer and network security software for use by others
Goods & Services
Class 038: Providing virtual private network (VPN) services; telecommunications access services; providing telecommunications connections to global computer networks; providing blended bandwidth telecommunications connections to global computer networks; providing telecommunication connections to the internet or databases; telecommunications services for providing multiple-user access to a global computer network; and voice over internet protocol (VOIP) services; providing voice and video chat services; providing voice and video conferencing services; hosted PBX services; and wireless PBX services; Class 042: Computer services, namely, cloud hosting provider services; Providing online, non-downloadable computer software platforms for providing access to virtual computer desktops and virtual computer environments through cloud computing; hosting of digital content on the Internet; Infrastructure as a service (IAAS) services, namely, hosting virtual and non-virtual application servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers for use by others; Application service provider (ASP), namely, hosting computer software applications of others; Computer services, namely, remote and on-site management of the information technology (IT) systems of others; IT consulting services relating to installation, maintenance and repair of computer software; IT integration services; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public, private and hybrid cloud computing IT and application systems; Technical support, namely, monitoring technological functions of computer network systems, featuring computer network monitoring, firewall monitoring, and bandwidth usage, connectivity, and availability monitoring on a global computer network; Computer security services, namely, security information and event management (SIEM) being real-time monitoring and threat analysis for protecting data; Managed computer security services, namely, online scanning, detecting, quarantining and eliminating of malware and virus on computers and electronic devices for the purposes of defending endpoint devices from data tampering and breaches in real-time; Software as a service (SAAS) services featuring software for security information and event management (SIEM) being real-time monitoring and threat analysis for protecting data; Platform as a service (PAAS) services featuring computer software platforms for performing security information and event management (SIEM) being real-time monitoring and threat analysis for protecting data; Managed computer security services, namely, security threat analysis in the nature of monitoring, reporting, analysis, and remediation of events collected from computer network and security devices for the purposes of protecting data and restricting unauthorized network access; Computer security consultancy in the field of security incident and breach response and remediation; and software as a service (SAAS) services featuring software hosting of computer and network security software for use by others
Goods & Services
Downloadable computer network and security threat management software; computer and network security threat management hardware in the nature of security appliances for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices
Goods & Services
Educational services, namely, arranging, organizing, conducting, and presenting educational classes, non-downloadable webinars, and online instruction, all in the field of computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis
Goods & Services
Educational services, namely, arranging, organizing, conducting, and presenting educational classes, non-downloadable webinars, and online instruction, all in the field of computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis
Goods & Services
Downloadable computer network and security threat management software; computer and network security threat management hardware in the nature of security appliances for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices
Goods & Services
Computer security services, namely, security information and event management (SIEM) in the nature of monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior; managed computer security services, namely, malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time; software as a service (SAAS) services featuring a combination of software and hardware for security information and event management (SIEM); platform as a service (PAAS) services featuring a combination of computer software platforms and hardware for performing security information and event management (SIEM); providing temporary use of non-downloadable computer software for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; providing temporary use of non-downloadable computer software for the automation of tasks in the field of security and network incident remediation; managed computer security services, namely, monitoring, reporting, analysis, and remediation of events collected from computer network and security devices for the purposes of protecting data and restricting unauthorized network access; computer security consultancy in the field of security incident and breach response and remediation; computer security consulting, namely, computer and network security assessment and testing services to diagnose areas of vulnerability and risk to prioritize remediation; providing temporary use of on-line non-downloadable cloud computing computer and network security software for network and application security for the purposes of protecting data and restricting unauthorized network access; software as a service (SAAS) services, namely, hosting of computer and network security software for use by others for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; computer software and computer management security services in the field of malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time
Goods & Services
Computer security services, namely, security information and event management (SIEM) in the nature of monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior; managed computer security services, namely, malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time; software as a service (SAAS) services featuring a combination of software and hardware for security information and event management (SIEM); platform as a service (PAAS) services featuring a combination of computer software platforms and hardware for performing security information and event management (SIEM); providing temporary use of non-downloadable computer software for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; providing temporary use of non-downloadable computer software for the automation of tasks in the field of security and network incident remediation; managed computer security services, namely, monitoring, reporting, analysis, and remediation of events collected from computer network and security devices for the purposes of protecting data and restricting unauthorized network access; computer security consultancy in the field of security incident and breach response and remediation; computer security consulting, namely, computer and network security assessment and testing services to diagnose areas of vulnerability and risk to prioritize remediation; providing temporary use of on-line non-downloadable cloud computing computer and network security software for network and application security for the purposes of protecting data and restricting unauthorized network access; software as a service (SAAS) services, namely, hosting of computer and network security software for use by others for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; computer software and computer management security services in the field of malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time
Goods & Services
computer services, namely, cloud hosting provider services; providing virtual computer systems and virtual computer environments through cloud computing; hosting of digital content on the internet; hosting digital content for others on the internet; computer services, namely, providing virtual and non-virtual application servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers to others; application service provider (asp), namely, hosting computer software applications of others; application service provider, namely, hosting, managing, developing, implementing, analyzing, and maintaining applications and software for others in the field of housing and securing data; hosting the software and other computer applications of others on a virtual private server; computer services, namely, remote and on-site management of the information technology (it) systems of others; information technology (it) consulting services; information technology (it) integration services; computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; technical support services, namely, remote and on-site administration and management of in-house and hosted datacenter devices, databases and software applications; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public, private and hybrid cloud computing IT and application systems; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; network security management in the nature computer virus protection services; technical support, namely, monitoring technological functions of computer network systems, featuring computer network monitoring, firewall monitoring, and bandwidth usage, connectivity, and availability monitoring on a global computer network; information, advisory and consulting services related to all of the aforementioned services
Goods & Services
"NETWORKING"

Goods & Services
"IT"

Goods & Services
Providing virtual private network (VPN) services; telecommunications access services; providing telecommunications connections to global computer networks; providing blended bandwidth telecommunications connections to global computer networks; providing telecommunication connections to the internet or databases; telecommunications services for providing multiple-user access to a global computer network; information, advisory and consulting services related to all of the aforementioned services; Computer services, namely, cloud hosting provider services; providing virtual computer systems and virtual computer environments through cloud computing; hosting of digital content on the Internet; hosting digital content for others on the Internet; computer services, namely, providing virtual and non-virtual application servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers to others; application service provider (ASP), namely, hosting computer software applications of others; application service provider, namely, hosting, managing, developing, implementing, analyzing, and maintaining applications and software for others in the field of housing and securing data; hosting the software and other computer applications of others on a virtual private server; computer services, namely, remote and on-site management of the information technology (IT) systems of others; information technology (IT) consulting services; information technology (IT) integration services; computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; technical support services, namely, remote and on-site administration and management of in-house and hosted datacenter devices, databases and software applications; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public, private and hybrid cloud computing IT and application systems; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; network security management in the nature computer virus protection services; monitoring of computer systems for security purposes; technical support, namely, monitoring technological functions of computer network systems, featuring computer network monitoring, firewall monitoring, and bandwidth usage, connectivity, and availability monitoring on a global computer network; information, advisory and consulting services related to all of the aforementioned services