GleanMark

USPTO Trademark 90070415

USPTO Trademark 90070415 is a USPTO trademark filed by Thinkst Applied Research (Pty) Ltd.. Status: Registered.

Trademark Facts

MarkUSPTO Trademark 90070415
Serial Number90070415
Registration Number6649335
StatusRegistered
Filing Date2020-07-23
Registration Date2022-02-22
Mark TypeDesign
Nice Classes009 (Electronics & Software)
OwnerThinkst Applied Research (Pty) Ltd.
Attorney of RecordJonathan A. Hyman
Prosecution Events21
Latest EventR.PR on 2022-02-22

Goods & Services

Recorded and downloadable computer software in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Downloadable computer software in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Downloadable software, downloadable mobile applications, and downloadable computer programs in the field of IT security all of the foregoing for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer operating programs; Recorded and downloadable computer software applications in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer software platforms in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer software for issuing honeypots, namely, recorded and downloadable computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems, software applications, computer services and computer networks, tokens, namely, digital tokens which detect attempts of unauthorized use of computer systems, software applications, computer services and computer networks, and decoy systems for detecting early attacker warning signs and redirecting cyber-attacks to a safer location for the organization

Related