ZTRUST Trademark
ZTRUST is a USPTO trademark filed by Vertali Ltd. Status: Registered.
Trademark Facts
| Mark | ZTRUST |
|---|---|
| Serial Number | 98872542 |
| Registration Number | 8000239 |
| Status | Registered |
| Filing Date | 2024-11-25 |
| Registration Date | 2025-10-28 |
| Mark Type | Word |
| Nice Classes | 009 (Electronics & Software), 042 (Software & IT) |
| Owner | Vertali Ltd |
| Attorney of Record | Eric J. Perrott, Esq. |
| Prosecution Events | 15 |
| Latest Event | R.PR on 2025-10-28 |
Goods & Services
Computer software for server-based computing with access to applications installed on a server using a networked local client device; Software installed on a local server for detecting, monitoring and optionally enforcing network access; Software installed on a local server for identifying applications that are permanently or temporarily accepting inbound non-encrypted and/or inbound encrypted connections; Software installed on a local server for identifying applications that are making outbound nonencrypted and/or outbound encrypted connections; Software installed on a local server for identifying network segments that are accessing specific applications without encryption and/or with encryption; Software installed on a local server for managing network segmentation; Software installed on a local server for building a network knowledge base; Software installed on a local server for automatically generating enterprise service management resource definitions and access lists; Software installed on a local server for building policy agent profiles from the enterprise service management resources; Software installed on a local server for monitoring network activity and alert on policy violations; Software installed on a local server for providing proof positive data, including periodic reports; Software installed on a local server for detecting network traffic; Software installed on a local server for accessing lists based on current network traffic; Software installed on a local server for building profiles required to block or permit specific network traffic based on access controls; Software installed on a local server for providing standard commands; Software installed on a local server for compiling reports for compliance; Software as a service (SAAS) services featuring software for detecting, monitoring and optionally enforcing network access; Software as a service (SAAS) services featuring software for identifying applications that are permanently or temporarily accepting inbound non-encrypted and/or inbound encrypted connections; Software as a service (SAAS) services featuring software for identifying applications that are making outbound nonencrypted and/or outbound encrypted connections; Software as a service (SAAS) services featuring software for identifying network segments that are accessing specific applications without encryption and/or with encryption; Software as a service (SAAS) services featuring software for managing network segmentation; Software as a service (SAAS) services featuring software for building a network knowledge base; Software as a service (SAAS) services featuring software for automatically generating enterprise service management resource definitions and access lists; Software as a service (SAAS) services featuring software for building policy agent profiles from the enterprise service management resources; Software as a service (SAAS) services featuring software for monitoring network activity and alert on policy violations; Software as a service (SAAS) services featuring software for providing proof positive data, including periodic reports; Software as a service (SAAS) services featuring software for detecting network traffic; Software as a service (SAAS) services featuring software for accessing lists based on current network traffic; Software as a service (SAAS) services featuring software for building profiles required to block or permit specific network traffic based on access controls; Software as a service (SAAS) services featuring software for providing standard commands; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for detecting, monitoring and optionally enforcing network access; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for identifying applications that are permanently or temporarily accepting inbound non-encrypted and/or inbound encrypted connections; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for identifying applications that are making outbound nonencrypted and/or outbound encrypted connections; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for identifying network segments that are accessing specific applications without encryption and/or with encryption; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for managing network segmentation; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for building a network knowledge base; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for automatically generating enterprise service management resource definitions and access lists; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for building policy agent profiles from the enterprise service management resources; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for monitoring network activity and alert on policy violations; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for providing proof positive data, including periodic reports; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for detecting network traffic; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for accessing lists based on current network traffic; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for building profiles required to block or permit specific network traffic based on access controls; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for providing standard commands