GleanMark

N Trademark

N is a USPTO trademark filed by Nagomi Security, Inc.. Status: Pending.

Trademark Facts

MarkN
Serial Number99038012
StatusPending
Filing Date2025-02-12
Mark TypeCombined
Nice Classes042 (Software & IT)
OwnerNagomi Security, Inc.
Attorney of RecordJoshua M Gerben
Prosecution Events21
Latest EventSUNA on 2026-04-28

Goods & Services

Software as a service (SAAS) services featuring software for collecting and searching data, providing data analytics, mapping data, syncing data, providing reports, providing alerts, analyzing cyber threats and risks, optimizing visibility and analyzing system defense capability, detecting and identifying cyber risks, providing cyber security tools, reducing cyber redundancies and overlapping coverage, providing continuous visibility for tool utilization and tool capability mapping; Platform as a service (PAAS) featuring computer software platforms for collecting and searching data, providing data analytics, mapping data, syncing data, providing reports, providing alerts, analyzing cyber threats and risks, optimizing visibility and analyzing system defense capability, detecting and identifying cyber risks, providing cyber security tools, reducing cyber redundancies and overlapping coverage, providing continuous visibility for tool utilization and tool capability mapping; Application service provider featuring application programming interface (API) software for collecting and searching data, providing data analytics, mapping data, syncing data, providing reports, providing alerts, analyzing cyber threats and risks, optimizing visibility and analyzing system defense capability, detecting and identifying cyber risks, providing cyber security tools, reducing cyber redundancies and overlapping coverage, providing continuous visibility for tool utilization and tool capability mapping; Providing temporary use of on-line non-downloadable software and applications for collecting and searching data, providing data analytics, mapping data, syncing data, providing reports, providing alerts, analyzing cyber threats and risks, optimizing visibility and analyzing system defense capability, detecting and identifying cyber risks, providing cyber security tools, reducing cyber redundancies and overlapping coverage, providing continuous visibility for tool utilization and tool capability mapping; Technology consultation in the field of cybersecurity

Related