GleanMark

PREEMPTIVE ATTACK STRATEGIES Trademark

PREEMPTIVE ATTACK STRATEGIES is a USPTO trademark filed by Twinstate/Voice.Data.Video.Inc.. Status: Cancelled.

Trademark Facts

MarkPREEMPTIVE ATTACK STRATEGIES
Serial Number86228714
Registration Number4624491
StatusCancelled
Filing Date2014-03-21
Registration Date2014-10-21
Mark TypeWord
Nice Classes042 (Software & IT), 045 (Legal Services)
OwnerTwinstate/Voice.Data.Video.Inc.
Attorney of RecordEmily A. Danchuk
Prosecution Events25
Latest EventCAEX on 2025-05-02

Goods & Services

Security services, namely, providing security assessments for businesses and governmental agencies; Security services, namely, providing security assessments of physical locations, information systems, and working environments; "PREEMPTIVE" AND "STRATEGIES"; Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, remote and on-site management of network assessment tools of others; Consulting in the field of information technology; Consulting in the field of information security engineering; Consulting services in the field of computer-based information systems for businesses; Design and development of electronic data security systems; Development of security systems and contingency planning for information systems; Information technology consulting services; Providing planning and engineering services in the field of information and communications networks; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks

Related