INVERSION6 Trademark
INVERSION6 is a USPTO trademark filed by MRK Technologies, Ltd.. Status: Registered.
Trademark Facts
| Mark | INVERSION6 |
|---|---|
| Serial Number | 97405112 |
| Registration Number | 7844774 |
| Status | Registered |
| Filing Date | 2022-05-11 |
| Registration Date | 2025-06-24 |
| Mark Type | Stylized |
| Nice Classes | 041 (Education & Entertainment), 042 (Software & IT) |
| Owner | MRK Technologies, Ltd. |
| Attorney of Record | Brittany L. Kulwicki |
| Prosecution Events | 47 |
| Latest Event | ASCK on 2026-03-24 |
Goods & Services
Technical consulting in the field of cybersecurity risk management training; Software as a service (SAAS) services featuring software for detecting and protecting against, cyberattacks; Computer security services in the nature of monitoring, analyzing, reporting, and protecting data and information in order to restrict unauthorized access to computer networks and hard drives; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service (SAAS) services featuring software for preventing unauthorized access to computers and computer networks; Providing temporary use of non-downloadable computer anti-virus software; Computer security threat analysis for protecting data; Computer security consultancy in the field of cybersecurity; Providing online non-downloadable computer software for use in threat prevention, threat detection, investigation, response, remediation and analysis relating to the unauthorized access to computer systems, servers, and networks; Providing online non-downloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, networks; Computer services, namely, detection of computer viruses and security threats in the nature of worms, trojans, spyware, adware, malware and unauthorized data and programs on computers; providing temporary use of non-downloadable computer software for providing information, monitoring, and alerts regarding security threats, namely, malware detection, scanning, email security, encryption, endpoint security, firewalls, firewall management and audits, vulnerability scans and assessments, and website security; providing temporary use of non-downloadable computer software for identifying cybersecurity threats, namely, security information and event management solutions (SIEM), deception-based threat detection, security analytics, security monitoring, security operations, and realtime monitoring of computers; providing temporary use of non-downloadable cybersecurity software used to detect and restrict unauthorized access to data and to detect and restrict suspicious activity on computer networks