PROTECTING THE WORLD'S CRITICAL INFRASTRUCTURE Trademark
PROTECTING THE WORLD'S CRITICAL INFRASTRUCTURE is a USPTO trademark filed by OPSWAT Inc.. Status: Pending.
Trademark Facts
| Mark | PROTECTING THE WORLD'S CRITICAL INFRASTRUCTURE |
|---|---|
| Serial Number | 98265626 |
| Status | Pending |
| Filing Date | 2023-11-10 |
| Mark Type | Word |
| Nice Classes | 009 (Electronics & Software), 041 (Education & Entertainment), 042 (Software & IT) |
| Owner | OPSWAT Inc. |
| Attorney of Record | HEATHER SLOTNICK |
| Prosecution Events | 22 |
| Latest Event | OP.I on 2025-07-08 |
Goods & Services
Educational services, namely, providing courses of instruction in the field of cyber security; Downloadable computer software platforms for managing data security and for improving secure data workflow by analyzing, controlling, and securing the data flowing into, on, and through computer networks from portable media, e-mail, web browsing, files, and file transfers; downloadable computer software in the nature of endpoint IT security software in the nature of downloadable computer anti-virus software; downloadable computer anti-virus software to help manage and monitor endpoint IT security software; downloadable computer software developments tools; downloadable computer anti-virus software development tools to help manage and monitor endpoint IT security software; Downloadable computer software for managing device compliance with respect to configurable security policies, managing remediation actions for non-compliant devices, and managing access to cloud and on-premise applications storing enterprise data; Interactive computer kiosk systems comprised primarily of computers, computer hardware, computer peripherals, and computer touchscreens for use in detecting and analyzing security risks in portable media storage devices; Pre-recorded USB flash drives featuring downloadable computer operating system software for detecting and analyzing risks in computing devices; recorded computer anti-virus software; Downloadable computer software platforms for managing data security and monitoring networks by detecting and providing alert notifications of potential threats, vulnerabilities, supply chain violations, and detection of non-compliance of device and network connectivity; Downloadable computer software libraries for supporting endpoint software applications; downloadable computer software libraries for endpoint software application compliance, vulnerability assessment, patch management and removal of potential threats; Computer hardware for managing remote access and device compliance with respect to configurable security policies and for managing remediation actions for non-compliant devices, and managing access to cloud and on-premise applications storing enterprise data; downloadable computer software platforms for managing, detecting, analyzing, and remediating security risks in computing devices and computer networks; Downloadable computer software for managing, detecting, analyzing, and remediating security risks in computing devices and computer networks; downloadable computer software for use in providing visibility, security, control and authentication of computers, portable computers, tablets, smart phones and internet of things (IoT) devices that have access to the owner's primary network and for providing auditing, warning, quarantining and remediation functions where required and necessary to insure security and acceptable use compliance; Self-contained mobile demonstration unit comprised primarily of computers, computer hardware, and computer touchscreens for use in demonstrating the detection and analysis of security risk; computer security consultancy in the nature of providing information and recommendations related to electronic computer security solutions; Platform as a service (PAAS) featuring computer software platforms for managing data security and for improving secure data workflow by analyzing, controlling, and securing the data flowing into, on, and through computer networks from portable media, e-mail, web browsing, files, and file transfers; installation, maintenance, updating, and customizing of computer software; technical support services, namely, troubleshooting of computer software problems; software as a service (SAAS) services featuring software in the nature of endpoint IT security software for anti-virus protection for computer software; software as a service (SAAS) services featuring computer anti-virus software to help manage and monitor endpoint IT security software; Providing on-line non-downloadable software for managing device compliance with respect to configurable security policies, managing remediation actions for non-compliant devices, and managing access to cloud and on-premise applications storing enterprise data; Providing on-line non-downloadable software for managing, detecting, analyzing, and remediating security risks in computing devices and computer networks; Platform as a service (PAAS) featuring computer software platforms for managing, detecting, analyzing, and remediating security risks in computing devices and computer networks; Providing on-line non-downloadable computer software for maintaining libraries and cloud databases for supporting endpoint software applications