GOSECURE TITAN

GoSecure Inc.

Application Filed: 2020-10-01
Trademark Application Details
Trademark Logo GOSECURE TITAN

Mark For: GOSECURE TITAN® trademark registration is intended to cover the categories of providing temporary use of online non-downloadable software platform for the detection and mitigation of cybersecurity incidents; Software as a service (SAAS) services featuring software for managing responses to cybersecurity incidents; Software as a service (SAAS) services featuring software for remediation of cybersecurity incidents; Computer security consulting, advisory and computer security services in the nature of responding to cybersecurity threats namely, restricting unauthorized access to computer networks, investigating, and analyzing cybersecurity incidents and data breaches, collecting, analyzing and monitoring technical, computer, and network data to identify potential cybersecurity events, risks, and improvements, analyzing cybersecurity data using artificial intelligence, deep learning, and machine learning software and algorithms, development and engineering of computer software systems to monitor, analyze and report on cybersecurity related events, performing computer security threat analysis for protecting data, penetration testing of computers and networks to assess information security vulnerability, and assessments of IT applications, systems, infrastructure, and computer networks to assess information security vulnerability, generating and providing reports related therefore for cybersecurity regulatory compliance with industry standards, analysis of cybersecurity performance, vulnerabilities, and risk.

Status

2020-10-05 UTC
LIVE APPLICATION Awaiting Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and has not yet been assigned to an examiner.


Research OneLook Acronym Finder
Serial Number90229170
Registration Number6610901
Mark Literal ElementsGOSECURE TITAN
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeService Mark
Current LocationNEW APPLICATION PROCESSING 2020-10-05
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 100: Miscellaneous
  • 101: Advertising and Business
Primary International Class
  • 042 - Primary Class
  • (Computer, scientific & legal) Scientific and technological services and research and design relating thereto: industrial analysis and research services; design and development of computer hardware and software; legal services.
Filed UseYes
Current UseYes
Intent To UseNo
Filed ITUNo
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Domestic RepresentativeAndrew D. Skale
Attorney NameAndrew D. Skale
Attorney Docket Number038202409T01

Timeline

2020-09-29Date of First Use
2020-09-29Date of Use In Commerce
2020-10-01Application Filed
2020-10-05Location: NEW APPLICATION PROCESSING
2020-10-05Status: Live/Pending
2020-10-05Status: New application will be assigned to an examining attorney approximately 3 months after filing date.
2020-10-05Transaction Date
2022-01-11Trademark Registered

Trademark Parties (Applicants & Owners)

Party: GoSecure Inc.
AddressSuite 1860 800 René Lévesque O. Montréal, QC CANADA H3B1X9
Legal Entity TypeCorporation
Legal Entity StateCANADA

Documents

ApplicationMULTI2020-10-01
DrawingJPEG2020-10-01
SpecimenJPEG2020-10-01

Attorney of Record

ANDREW D. SKALE
MINTZ, LEVIN, COHN, FERRIS, GLOVSKY AND
3580 CARMEL MOUNTAIN ROAD
SUITE 300
SAN DIEGO, CA 92130

Good, Services, and Codes

International Codes:42
U.S. Codes:100,101
International Codes:45
U.S. Codes:100,101
Type CodeType
GS0421Providing temporary use of online non-downloadable software platform for the detection and mitigation of cybersecurity incidents; Software as a service (SAAS) services featuring software for managing responses to cybersecurity incidents; Software as a service (SAAS) services featuring software for remediation of cybersecurity incidents; Computer security consulting, advisory and computer security services in the nature of responding to cybersecurity threats namely, restricting unauthorized access to computer networks, investigating, and analyzing cybersecurity incidents and data breaches, collecting, analyzing and monitoring technical, computer, and network data to identify potential cybersecurity events, risks, and improvements, analyzing cybersecurity data using artificial intelligence, deep learning, and machine learning software and algorithms, development and engineering of computer software systems to monitor, analyze and report on cybersecurity related events, performing computer security threat analysis for protecting data, penetration testing of computers and networks to assess information security vulnerability, and assessments of IT applications, systems, infrastructure, and computer networks to assess information security vulnerability, generating and providing reports related therefore for cybersecurity regulatory compliance with industry standards, analysis of cybersecurity performance, vulnerabilities, and risk
GS0421Providing temporary use of online non-downloadable software platform for the detection and mitigation of cybersecurity incidents; Software as a service (SAAS) services featuring software for managingresponses to cybersecurity incidents; Software as a service (SAAS) services featuring software for remediation of cybersecurity incidents; Computer security consulting, advisory and computer securityservices in the nature of responding tocybersecurity threats, namely, restricting unauthorized access to computer networks; investigating, and analyzing cybersecurity incidents and data breaches; collecting, analyzing and monitoring technical, computer, and network data to identify potential cybersecurity events, risks, and improvements; analyzing cybersecurity data using artificial intelligence, deep learning, and machine learning software and algorithms; development and engineering of computer software systems to monitor, analyze and report on cybersecurity related events; performing computer security threat analysis for protecting data; penetration testing of computers and networks to assess information security vulnerability; assessments of IT applications, systems, infrastructure, and computer networks to assess information security vulnerability; analysis of cybersecurity performance, vulnerabilities, and risk

Trademark Filing History

DescriptionDateProceeding Number
NEW APPLICATION ENTERED IN TRAM2020-10-05

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed