GleanMark

PHISH INSIGHT Trademark

PHISH INSIGHT is a USPTO trademark filed by Trend Micro Kabushiki Kaisha. Status: Registered.

Trademark Facts

MarkPHISH INSIGHT
Serial Number87418304
Registration Number5551737
StatusRegistered
Filing Date2017-04-20
Registration Date2018-08-28
Mark TypeWord
Nice Classes042 (Software & IT)
OwnerTrend Micro Kabushiki Kaisha
Attorney of RecordJoi A. White
Prosecution Events35
Latest EventC15A on 2024-09-06

Goods & Services

Class 042: Software as a service (SAAS) services featuring software and applications for computer, data and network security; providing temporary use of online non-downloadable computer software and applications for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; providing temporary use of online non-downloadable computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; software as a service (SAAS) services featuring computer software and applications for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for educating, training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for educating training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; software as a service (SAAS) services featuring computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; providing temporary use of online non-downloadable computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; software as a service (SAAS) services featuring computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities

Related