WHERE ZERO TRUST BEGINS Trademark
WHERE ZERO TRUST BEGINS is a USPTO trademark filed by INVISINET TECHNOLOGIES, LLC. Status: Registered.
Trademark Facts
| Mark | WHERE ZERO TRUST BEGINS |
|---|---|
| Serial Number | 98788028 |
| Registration Number | 7834953 |
| Status | Registered |
| Filing Date | 2024-10-07 |
| Registration Date | 2025-06-17 |
| Mark Type | Word |
| Nice Classes | 009 (Electronics & Software), 042 (Software & IT) |
| Owner | INVISINET TECHNOLOGIES, LLC |
| Attorney of Record | Richard A. Fagin |
| Prosecution Events | 9 |
| Latest Event | R.PR on 2025-06-17 |
Goods & Services
Recorded software for cybersecurity, computer and network security, and prevention of computer and network risks purposes, namely, software for cyber security and risk vulnerability management, for restricting unauthorized access to computer systems, for detecting and assessing cybersecurity threats, for use in the detection, analysis, mitigation and resolution of cybersecurity threats; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes, namely, software for cyber security and risk vulnerability management, for restricting unauthorized access to computer systems, for detecting and assessing cybersecurity threats, for use in the detection, analysis, mitigation and resolution of cybersecurity threats; Recorded computer application software for network gateways, computer network switches, routers, laptops, desktop computers, computer network servers, mobile devices, and Internet of Things (IoT) enabled devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes, namely, software for cyber security and risk vulnerability management, for restricting unauthorized access to computer systems, for detecting and assessing cybersecurity threats, for use in the detection, analysis, mitigation and resolution of cybersecurity threats; cybersecurity protection devices, namely, cards encoded with security features for identification purposes, radio frequency identification (RFID) tags, electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication, software-based security tokens, software identification tags, dongles being computer hardware for preventing the unauthorized copying or use of computer software, network gateways, computer network switches, and routers; Platform as a service (PAAS) featuring computer software platforms for cybersecurity, computer and network security, and prevention of computer and network risks purposes, namely, software for cyber security and risk vulnerability management, for restricting unauthorized access to computer systems, for detecting and assessing cybersecurity threats, for use in the detection, analysis, mitigation and resolution of cybersecurity threats; Software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes, namely, software for cyber security and risk vulnerability management, for restricting unauthorized access to computer systems, for detecting and assessing cybersecurity threats, for use in the detection, analysis, mitigation and resolution of cybersecurity threats