Mark For: SECUREX™ trademark registration is intended to cover the categories of computer hardware; computer networking hardware; computer network switches, servers and routers; computer hardware containing network security functionality, including firewalls, data encryption, and/or interoperability with network security protocols; computer software for securing mobile devices; computer software for administering, managing, and monitoring network traffic and access, optimizing network performance, performing network diagnostics, detecting malware and network threats, and reporting network security and performance analytics; computer software that provides monitoring, analysis, auditing, management, detecting, classifying, protecting, reporting, and securing of sensitive information and data located in cloud computing environments for computer and mobile applications, computer and mobile platforms, and user interfaces related thereto; computer software for ensuring the security of data located in cloud computing environments; computer software and applications for providing user behavior analytics, security forensics, risk management, data loss prevention, cloud data protection, data governance, compliance monitoring, data rights management, data security, and secure storage and access to data, files and media; computer software platforms for locating, assessing, measuring and remediating suspected malware that targets computing devices; computer software for location based analytics of website and internet traffic; computer software for database management; VPN(virtual private network) operating software; software for computers and mobile devices to secure remote access via the internet to private computer networks; computer software and computer hardware for network security, email and web security, secure access control, user identification, encryption and security management; messaging and network security appliances comprising computer hardware and software for detecting, blocking, and automating the removal of computer viruses and threats, encrypting and authenticating data, preventing data loss, recovering data, securing networks, and detecting, filtering, analyzing, managing and blocking electronic communications; computer hardware and software for data centers for use in collecting, analyzing and reporting of computer network and telecommunications data; computer software and network security hardware for use in detection and prevention of network intrusions and malware and for controlling and managing network user access and for enforcement of network policies; computer software and network security hardware for monitoring, analyzing or reporting of network information, data and traffic; computer software and network security hardware for optimizing computer system resources and availability; downloadable electronic publications in the nature of e-books, compliance guides, data sheets, and reports in the fields of cloud computing and data security for public cloud computing environments; downloadable webcasts, webinars, case studies, audio files, and videos in the fields of cloud computing and data security for cloud computing environments.
Status
2020-02-22 UTC
LIVE APPLICATION Awaiting Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and has not yet been assigned to an examiner.
(Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed Use
No
Current Use
No
Intent To Use
Yes
Filed ITU
Yes
44D Filed
No
44E Current
No
66A Current
No
Current Basis
No
No Basis
No
Attorney Name
Sally M. Abel
Attorney Docket Number
23764-00071
Timeline
2020-02-19
Application Filed
2020-02-22
Location: NEW APPLICATION PROCESSING
2020-02-22
Status: Live/Pending
2020-02-22
Status: New application will be assigned to an examining attorney approximately 3 months after filing date.
SALLY M. ABEL FENWICK & WEST LLP 801 CALIFORNIA STREET SILICON VALLEY CENTER MOUNTAIN VIEW, CA 94041
Good, Services, and Codes
International Codes:
9
U.S. Codes:
021,023,026,036,038
International Codes:
41
U.S. Codes:
100,101,107
International Codes:
42
U.S. Codes:
100,101
International Codes:
43
U.S. Codes:
100,101
Type Code
Type
GS0091
Computer hardware; computer networking hardware; computer network switches, servers and routers; computer hardware containing network security functionality, including firewalls, data encryption, and/or interoperability with network security protocols; computer software for securing mobile devices; computer software for administering, managing, and monitoring network traffic and access, optimizing network performance, performing network diagnostics, detecting malware and network threats, and reporting network security and performance analytics; computer software that provides monitoring, analysis, auditing, management, detecting, classifying, protecting, reporting, and securing of sensitive information and data located in cloud computing environments for computer and mobile applications, computer and mobile platforms, and user interfaces related thereto; computer software for ensuring the security of data located in cloud computing environments; computer software and applications for providing user behavior analytics, security forensics, risk management, data loss prevention, cloud data protection, data governance, compliance monitoring, data rights management, data security, and secure storage and access to data, files and media; computer software platforms for locating, assessing, measuring and remediating suspected malware that targets computing devices; computer software for location based analytics of website and internet traffic; computer software for database management; VPN(virtual private network) operating software; software for computers and mobile devices to secure remote access via the internet to private computer networks; computer software and computer hardware for network security, email and web security, secure access control, user identification, encryption and security management; messaging and network security appliances comprising computer hardware and software for detecting, blocking, and automating the removal of computer viruses and threats, encrypting and authenticating data, preventing data loss, recovering data, securing networks, and detecting, filtering, analyzing, managing and blocking electronic communications; computer hardware and software for data centers for use in collecting, analyzing and reporting of computer network and telecommunications data; computer software and network security hardware for use in detection and prevention of network intrusions and malware and for controlling and managing network user access and for enforcement of network policies; computer software and network security hardware for monitoring, analyzing or reporting of network information, data and traffic; computer software and network security hardware for optimizing computer system resources and availability; downloadable electronic publications in the nature of e-books, compliance guides, data sheets, and reports in the fields of cloud computing and data security for public cloud computing environments; downloadable webcasts, webinars, case studies, audio files, and videos in the fields of cloud computing and data security for cloud computing environments
GS0411
Providing a website featuring blogs and online non-downloadable publications in the nature of e-books, compliance guides, data sheets, and reports in the fields of cloud computing and data security for cloud computing environments; providing a website featuring online non-downloadable webcasts, webinars, case studies, audio files, and videos in the fields of cloud computing and data security for cloud computing environments
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.